last executing test programs: 7m6.200673654s ago: executing program 4 (id=2346): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='task_newtask\x00', r0, 0x0, 0xfffffffffffffffc}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000001c00)=ANY=[@ANYRESOCT=r1, @ANYBLOB="04ac0a821c6bfabbdacfa202266fd2696850b418cbbfc94e222c7c5cf8a16e015a792c768d45b8e5cf4e3f247a5bacefa90b9843e8d05319759f67fd3f4d317afc3a45abcd29881d3b0616b2d3a51ffc401f4e9ca0f840c4180d704f51cf350c5c1c4bf1dddf7e6133654932e55f8080c8fa9b01134f213bcb4811e4e930edbe53fd748a632bfe1cb544f285be17f8e3c5d7d6bd2916a68621dec146760c3ac869b7a306cf1bbac517a869351a2648ce916bb303db224a1b5514de2cb9fddeadce297778343d1d1f9abe0b665f995e2507bd8d895859410e83c87f07e7b6b8f87fa71d46931bdbfc4babf8b84a50f131ddd682dabc8ce3a7ac5622dc87ae39840cd3343e5779cb2dc1b7a65e9e52d3f187c81f27958e5ad03aa4b5e38d4349beef0d4c0e0add4b734e62f6834d1b82a76fb4ffba0ea3fb9eceee42269295c663202c1ef5deb4eb8a12189638b4ef124644ca580cc96e956f0d191e97f6326fbda2e090adbe23bb634c1148f1b196df1a4ca65a2bb040619ab34553fc969cc1c0ba0303701f1528837bfa84b809e7b2766e77050be4d2d54a2bc01ab92fdeb31c59929e46a339f08354c01894d3bfc7a64ce1342489e3efa59810c24074ad82f5b897c36c8c3681edc36388db2f58852ed053086660b0fab16f392469bba83c446402aabd8a1231ae8102a98862bc51bf943f1957b99faf587ae3b61c22c727e54b40ed34d89368d1b6be626e9af8dd0405ee44723d3d2316c4a648f31bbe10a07d312e207313184abec4cda6dd4e58d1c9502753abfc017241c5d154f991bc1537e909a2a25b96fa0a0674e089ce01dcfad7767ba5da4a285c216324a0377317f24e4c7577c4296f3faf1b4506c89cd80d57f85b6c8872dd90c96e41931f983a94781de770682531e8f269cd58438b6acc5247ec40722e9d23e3f7c4063b61afb0b422d2346cef10504273ee5f4edaf43ca72f3e3ee3fd0891c40f6a6308cc24c398d312030745220be242a89ff42e4bf05399d6bbae714c35d447710b1c17d92b45de6b915ecdaff662bfe280b48c011c3ac0d4d33098538c42491f959c85ba763745e8727364c601e419d0426a96b951ff44c85623aebde594eb1c6c78a6ac2e7d6779b05b5cbed5cf0ca78c79e3185e0bbb8779b5229c123dccb55c9647d779e797bb6f86f94c1d3a7e1ca4ebc39aebbac4c52f850243512de3fc8fc3520eaf2e16cef470080cdf028001767428fadf1276e203d2946314f593a9894f868ce65a660238b8fcc140864dbb5c16c708ef93332b8b6b07f4202a19fb621fa6ac97ea4825a02cfd41b6ba1cacb31881a67909c0ec40cadcfd2a6fd96920ce0c7dd4cc55ed62f9464a1adab6c001432318ca1dc4835365a1f9675eded84461b5e94ff4c4b9ece431ed47ba8d5159be9385513150c23d66a8f970111beec034d1e594ba80630dc3b4ec13a4d61cdf5d43d29bab5ccecc6118fdd6c4248d7ec5604e51146bd0ffd71071216e701a74f1a676ff36e3c72aab0dccf7f939c850c9be481b09c94599ab63a39fbcc62e72ad55db17933e505b1edf7430d456a0e3ccd00edad9ee9d589756b902b49b7df46cc858fdf3a1540b1887ccb227f69bbf8715a62c0e32eaf61c1d5228e29b71f7e22150dc0eae11ff3a2a3e8612da464c192bfff2f936d586216612fb950ba2ca64fba0840e65ed00eb5559621adebde3273074f4c67e37b06a3a1bad45b5e032bda71ad5cc28c276d4d7d614881b49e0997eb791e80434ec78978aebd02b361cd0cc813b96e0052b1a8255d13e7e938cbb6d44397303852f2d77f93ce4ff7a3d9b280d8dc3f9bf460acc45b1230f3a25ab81066b6fbd5fd6128423df196cc482ac1051a2ebeb277e7124464669df7b378bcbd2bcdea17425f75b032eb7dcb97ddccadb82dbdd9c7632feefe6e8dc5bcbf868cb135d7bb0c3bfe5e05849a5990a7986210d1fa245c107543c4eedd007f69b19f6d5646c52af68d65d9cbfcf8315a39f73b2e795ab9f19b82f90f497f8073eb99a3774c91d97f9874878042e7f310fb417b9b6be655b8964b83fde919a661d72abcf9adc5a5e08f7355be31c55310c220f866ba9810a44ce4e1041ee3f2fb8498d753bcf617a7295175d6144785fa8a16d4bc4138fa0f46db7b505cc8e56c27d636c83bb8032285b3910eeeb32ac0e61e74dfa6044500b2aa169154d20494a19fcdae3b15bb88d55e71f67e3107d48c34c232ff210c5780beb82bef2b02537955f4567a4d70bb05f6b01d4ba3939ca111c030da1dfdbcef1cc144aa69dee4ec15e95033fea602a1f1194bd04bbb80ecb03766f2c4812dcbdbba47dd7235f6bc8d73679efa11dd27976aabe0845f99d11192cb92c96fdbc34ce57d5881f4cd4ebbb7c7b2c2f5602bd58ec56220aa55d1ad12d76c4253b766db81dcfa5114c021e8ff0a85417fcb242676ddb5c86072e756f9f71efe872e6d5a95c527edcdd46b24e1eb855a09d2797f630acb2e6215008269b234ccf9ba5b01c2937a890918ba79466819a9ab00707684cc0a797f251630171d271bc6b8782be53efabce59dc8256aecc3210af8b27d8e71ef57fddf064efc902a528308f6369703bb1c4aafcff55342764df895c02f7bcadf50e81f1b9d1f6256cd0f18e0630aa806747f4a70f4b900792d00c53c72db014c5e339165c4f228fc286f52d70d134a3f729673a14367234cf025a96ff9cd4104259d070bc6bc321a06e134119bfdf8a393fd0c56fcef7cd2e528e59c06285338f05fb17af6e975918a26254f2a340c8b1ed020e292d2ea92688e42056c601c269b08bd2242cae92ee151e51ef90543de3522120244bd40bc39e50494371692cd5947f7dba6435b463f5b9565727eac8a4ba25dbeb409a6540e4c823ee292158b7d9a045a2614a25e6f52315bf4647de5b0eb465fc329c4e2cd0c562bcdea26f44dddb7bec08c1584e3c557dd93819d65d2538277eda2a9963209ac5a7c0cbb4b3116d4c6a4b1948b704d4f613b8fc893c4bd0fe552555b1a69ef94dc7161f95b21355568f5d45f04ce3dc37f53043fd350e2e52133632d4ea7b134a14903818b375722b8737666545947b6682815ac6c1689166cf01d267f8ac1f72ad1a9499c3730ae2e273db98ad09208025d4ad2bd07d54bd754572d64478cd8266866045836afbce12a09d5af23964a2dcfb43d9e6c81b54aa5aa59d330be798c7994e5d82ddef3339510400a2c15b84179a46f14b21686b3837e062e3baf776ae437d0dd34a173fac19b65f8a7c5b35db0bf8c66a03dcbed492099e3de3a8667c2c22a364623c2ad59ba48b369eb69a0c1930214b21248dc90ac117f8ec63ec740ae4ccbd7f76414e1afd7768ffc54be1d1f87344449c14e0d1ccb3e3680bdb5f6078a4202e9c3300c7f8c76e11267b0c1b05ca640cf0d8ac3d297701fb6e0410dc4f397d13ff9341dc39d7fc1a0b77b484cbeadd5e717280bb5fca45cef07e5d3f2f50d4425a4b37c5273f37ea3b25a3579afbe1b81a1a2e737a6e68ba5de7aed5e9720f0994b10c98d4355d39a53e539a29586feaa4100485d46c5d4dd0643eb10b8633b638d8bf6d7b450c474c0157a624889d53a25e02311f3352311a1ce79dced5f7473918dad091f805460fe91aef0b2ffad558406ddbc3dde76f9cb1fbddcd6276f5d500ea8225f8b45c3497f7d16a05f686836175a9a7672a86e7f90b764505b5cb9fdff2ffbe240cb143bb145ed38886e35a6281e87f3d5b3122b3750329af4de58a3e752af6b3a9077dca22a63ed3b2d49499669c1524973374e359af8a4aa83f87dce16e9677b45678483c29b3ad5fb63a7d6d6c759cf897e0b2377f397ffb4aaadbbd990416ce1ac504365ac86b9ba541af708d77cdde3138023cc2ed4d0f360eaa777363c65145f15218f1d31e803e5ca7e73e6dbfb17083bace8cb3ddcee1162b486bea1900d9b352e69978cceec41c08da92d473f22bb9fa1beb40e8fba73684d2ddcacc3c73b240f194c99f534c05ae5d4da7d571d3c875707b348f99f6a36ae00b36b5164b1179ad3fb6b42a91497f5a8f2059039cf4fc31462eede2e5babdb27aaa4a29860bff94516891271e37d716d362a2de0428f1fe926ca6d39d22077b37480ab9b667febe6dc993b329a35fd17fc93396526dfaf7454aa336effe69350a274cc34dcd81fc89d0d66ccccd51e7a2858e641843ec5321f5712cd5f788976ae3de9bbde3c28330f37dc4975e8aad894de77edaf62464affee89a38d941776854e6df05ac451d418d5259000fbbe8a0eb65c1bf49012f672b503180d19e83211669dabce7383f9a76903b3f5496e7a73630e8f157119115e94d0f480f54ce01d20c5e2d515d52b6e721a116c264f74c4b32869a5b6015da06d8a8e7fd11473283040e16111b109ad3a47a3e07a8efb5779403e6af502ab8c5e96b636a09edd6d52da0509d4ca355cecb408544bceed1adfd7c44a2f29c62275fd9603611a7a7cb68e9eeee42e10ac1677c2bde90e23e152f7a566862db8cd03f8889298de2f6777e8fcbe965cc614a4029b9507412dd7252d3ab47d8f7428f85a10babc051a6c79140a7d3584b26aa7b548637787117a83f0fbe7158c5ade040624ed6d4b5a33df7eefca519cba382b0bd2ed23fdd8d8deb1953e806f4a88c3592e0dcf0297e18a0bb3a08852be3148a066bfd3e0af9bd0e01bb6f1fb8781971dbe51b1130ecbd054aadf58e6b598185f250f880e146cfb03d96308d1f3f03f758afc039d85b139d7878ec7352e8f88717058ee550b4f2347492d1e0a7c377a18690694f14dace786db63995eaa285b4ae876c449bc149c758594ab938e43eca73760a1699b89eea702f84938765017babde0f945f4e7d3c3cb1635ebd169a5b5d2095bf9b19f42b7a8cd016a29241fbd1d208841d034f7b1a84c81aabfb4f2d26e37602efbd289cd8deaadc2a60d4b7a3d9e3c193b448a6966999d2eab7cd7d19778db3b0b92262f676bc2fc68f40936a06aea7547ed7d3495cf79c5e1546b89fbc98074a05d95039e7d5e58fc47ff8016032c393ae0d7db8ff275ba721544060fdf495a9eed759cce57df350abf6de083a70c89b7ed33cdf41d25a3d6a421cbdcb916fe9352caeb5eadb4dcfac925cf7686ba9d9c3c0d45dc1791cdb7d392907e8a31206671eccf15cca107b1d54b3e1da2751f64a0ab769c5c8caabd3ef94fcbedc3a456dcea7f5a9b79c6f1f05dfe135db0163e5eb2484cb8f9a6d8d3eaa62a9f057c6e2538b534dcd73f891ba149965c9847413adf7122adcface687cac5e3bdbf55af330efcbb8d06b707ac78fb26a9f64d49cbaa5e07bd1473e52bfad18daeb8a695f1c319484ac7adcac1e49a8f80770f2c5e89cb85fd998bc96cec81c9494909eccfd679f33c1c3fea8567071f030aae5bd57acfc81bfcd271f4a2104ac2083695a404e248b587281519ca8c7977665ad522ee6183d3d43a030ec592cde0e256cd875c238845a9dfdbf1aff4b8f0b6ffc772146029ef0cff65be2243dd4599427f2647c0f6547a5ffef083f950527ae0bc3762087607c8288958e3099fdec573db44f55645e5333242d58e2e5f43fbd81141e0c3d2537d6dc72175e8fa26fb35d7683639c713fe283661455aff18e410cb816c81e242e7437703340a503b4dd5f438b1bae4bbfc69d541c2b33ca8077b7a4bb88491571084faf443b06bc81391d72872bd4650e58ad40cd6b8c276e4ad9e69b58e3f7e26a9076087c693eb7a389e6f1632988757b2afd91a09a2518b294ed"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000400)=""/64, 0x40}], 0x3}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r5, 0x0, 0x66) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000000140)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xda}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0xc9495724790b983a, 0x80, 0xfe, 0x0, 0x1, 0x0, 0x0, 0x3, 0x14871, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80000000, 0x6}, 0x100040, 0x1, 0x0, 0x1, 0x1000000000000003, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 7m6.05716693s ago: executing program 4 (id=2351): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x36, &(0x7f0000001140)=ANY=[@ANYRES32=r2, @ANYRES8=r3, @ANYRES16=r1, @ANYRESHEX=r3, @ANYRESOCT=r0, @ANYRES64=r1, @ANYRES16=r2, @ANYBLOB="4466e3c5078eb55eee7b2e0f800d86d4284e11f6fabb1dc94182a46cbe06d38fc9375340aa8409555de88519a3f4de167b146b2ebaad9f296660140b35a24b570dd0b520a610a444768aa2412fbd46034f965035ce172ee138361aea0eda84eed6818d2b1f81615cd794a27f082d620618be7592deddbc70d59b50adeb5edb207737a4380eb505dbdf7b1f402189d653657a8db41d5c56b5bb37de9bdcdd8399476fe3fa8cb4eb48e3ace07b14"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="150000001000000002"], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f00000010c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="be5f00000000000000f7b5000000001b000018100000aa221f216bb5d49ececf047a53c4cf3f4da351", @ANYRES32=r5, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x609, 0xb, 0x0, &(0x7f0000000140)="dd80000000000000000400", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0}, 0x94) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES64=r7], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) (async) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r13, 0x4004743d, 0x110e22fff6) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r14}, 0x10) write$cgroup_type(r13, &(0x7f0000000280), 0xfffffeed) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x18) (async, rerun: 64) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 7m6.05272841s ago: executing program 4 (id=2353): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000e570ebc2f864b89272a80000000000000000007ad83ed9e739bc7da820fa6bc2fe6ae18c8b02e41132bb714415d385ac231b0fcaa233514c2f527f27e2d1290de56c4b65f4eedcde4d2273dd0c59bd00298f5b384527eb17bddb77c39d161477def673b1750815759d6e2c3010ddd92689fbc4c119a69f4a997779e9be3a36efb28dbcc150af3bf4eb4aa76282fd668aa2dadc9e02cd98c6f2f1176cf1b1b480", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00'], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000240)=0x6fa6, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000100000001000000", @ANYRES32, @ANYBLOB="1200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000010000000000000000000000000fffffffeffffffff94"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) 7m5.599468719s ago: executing program 4 (id=2365): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001000000ed95c01f504a2ad7bfb49e08b1b559173fb17d3bac42ccba65aa585c9013f28d14cd0969726f252aa465919b117ffda2909a82f8e813a78066c4e9cd50fe5951f152a1cf6be21c8453a765fedcb24ca9e5b43f95ad99f2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x39, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001000000ed95c01f504a2ad7bfb49e08b1b559173fb17d3bac42ccba65aa585c9013f28d14cd0969726f252aa465919b117ffda2909a82f8e813a78066c4e9cd50fe5951f152a1cf6be21c8453a765fedcb24ca9e5b43f95ad99f2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x39, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) (async) close(r5) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) (async) 7m5.301085202s ago: executing program 4 (id=2373): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe24) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e000000040000000800", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009c898bdb9bc62c523b5fa26eb76d2f1e88bc8a473b5e5ead2f662cbfb57c2c27eaaf8e62f10bf59dd4daec33388641a680c2365ee550e9e9628aa6a669ba191cee7c86cb29f840d738bdd8653c882406dc027cd770f6e22ad92975362c873d52de7a97fc093ea92cf08f97e840fc4c07", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000000020"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x8, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11368, 0x0, 0x2000000, 0x6, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r0, 0xffffffffffffffff}, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0)={0x0, r3}, 0x8) perf_event_open(&(0x7f0000000640)={0x6, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x28018, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000073011500000000009500000000000000f96754a655718b389b9c5c8e81e1c3df94751ad2ee857dae40e64c901f88df739e2381b48200e3cfc55eccf7987a40da24f0b000eabd146a7478351bba67be8b1ccf40e3c8f5a5af7a5084cd2a1305d7e4560ea2cd9d0fd5add1f1725f227c1445ad057bf345935ca36967d0f147424a14a91cdca1cee5b58cae675f28e27cdacc50cd03d25fdc1a0a4823abca26408544ec03d8556e4f55f86af12a7ac8d564a86a3cee099ec2d0fb351a"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m4.837624161s ago: executing program 4 (id=2379): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3, 0x0, 0x0, @void, @value=0xff070000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) (async) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) (async) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x6, 0x18}, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2ffffffb703000008000000b70400000000000085000000030000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x8, 0x88, &(0x7f0000000880)=""/136, 0x41000, 0xa, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x4, 0xe, 0x9, 0x4e3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r9], 0x0, 0x10, 0xf}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6m47.434537117s ago: executing program 32 (id=2379): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3, 0x0, 0x0, @void, @value=0xff070000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) (async) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) (async) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x6, 0x18}, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2ffffffb703000008000000b70400000000000085000000030000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x8, 0x88, &(0x7f0000000880)=""/136, 0x41000, 0xa, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x4, 0xe, 0x9, 0x4e3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r9], 0x0, 0x10, 0xf}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6m27.580132256s ago: executing program 1 (id=2727): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)='%-5lx \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfb, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 6m26.673870424s ago: executing program 1 (id=2732): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2, 0x0, 0xd}, 0x18) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) 6m26.459014832s ago: executing program 1 (id=2735): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 6m26.410615505s ago: executing program 1 (id=2736): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000d0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000067071811000000000000dada451521b7d435abe8b3471280ac8484941fd357348ccc59f57914e7bc34662297eea21967c6d7d9e2faf192cb3618cd7dacd07f34076719ee757500061e818948c4f23cf57f5fcbff2df871c8a506480460fc1e48656cea40b77608a7b321efb2f56cb15a06ffdc81a64548cabe1fef1ae997e63744d57b4e244c3a47d4f16ea3d8267a9c0f2a6d41c05f330230730b91d3a951aa2de35a51bbcae79c46ec0a0d73560b694cd2b0e825604b03f6907ab9af18e281a4c41317a775", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b0000307d5dfdd0db3f3830034af8a400040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)='GPL\x00'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r4}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 6m26.320197458s ago: executing program 1 (id=2738): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x40900200, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffcb1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x97f6}, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x64}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x1a, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000440), 0x8, 0x7b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r9 = bpf$TOKEN_CREATE(0x24, &(0x7f00000006c0)={0x0, r0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1e0000000100000003000000017b00001042010045e932cc1f4f95cea9", @ANYRES32=r6, @ANYBLOB='\a\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000003000000020000000200"/24, @ANYRES32=r9, @ANYBLOB], 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, r4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f00000005c0)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 6m26.189575054s ago: executing program 1 (id=2739): perf_event_open(0x0, 0xffffffffffffffff, 0xfffefffffffbffff, 0xffffffffffffffff, 0x7a0f98d470dd00c9) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x23a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xd, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB="0000180000103100000000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 6m11.143530732s ago: executing program 33 (id=2739): perf_event_open(0x0, 0xffffffffffffffff, 0xfffefffffffbffff, 0xffffffffffffffff, 0x7a0f98d470dd00c9) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x23a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xd, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB="0000180000103100000000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.146281972s ago: executing program 2 (id=6983): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3f, 0x2000000000000033, &(0x7f0000000440)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000646c6c2500000000002008207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000a35000008500000006000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="16000000d3ec66ecc053c5da2e5f"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="10000000040000000800000007"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5d, &(0x7f0000000340)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x57, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="99000000000000007bc6b9f803000000bbf8f7bb00000000"], &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x4d, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000800)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x7, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000880)=[r2, r2, r2, r2], &(0x7f0000000980)=[{0x4, 0x2, 0xc, 0xa}, {0x5, 0x1, 0x0, 0x4}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071122600000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2}, &(0x7f00000008c0), &(0x7f0000000900)=r1}, 0x20) 4.088831495s ago: executing program 2 (id=6984): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x80, 0x0, 0x0, 0x0, 0x7602, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x50, 0x0, 0x0, 0x0, 0xffffffff00000001}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0x1, &(0x7f0000000680)="a8df56b6a1daeff00d7d8747c9f3c08c80739865a3a6750c2ea2302a670b2330bf827fbe308076149258bf6e6d5fcd5d5daf55fcdbf0fea17e2e455bbff1ee612c577b119a8dcca19ba9803b940153753addc4af1efd48b049dae10571cde41c263a582ca3ee82f45075373ffa8c3e822a5f1dc2a55f265f"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='percpu_alloc_percpu_fail\x00', r0, 0x0, 0x4}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) 2.837121378s ago: executing program 2 (id=6992): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00 \x00\x00\x00\x00\x00\x00\x00\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000180100002020642500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x7b) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002100)={&(0x7f0000000380)="9477f36394c245ea5329b12eda007b71226f24de6536f95acb710b53db23097b92", &(0x7f00000003c0)=""/23, &(0x7f00000004c0)="6748f89e762fd25f83b4b2d56a1f7ac372278f9cf055f1b8d9e9ba6175686b9c6f793c9113645edf7d79d4af3cfed328ee67dfa7d22c8a7e3fdef46c5f42b68ae7e4eff5479e59c13a90a4fc31ae5aa18a1f0ca1731da90f9449ff02c372e2fc89ed1f200c193ed28964e45e43a79707b9d4ff292774a275f357576f9c12cd92d9af4789e6ba10f664edccd9dff1ba3d401c7c81841a0300633c6b9744759268420df5aa081a81cc8f6f62c9ca0ab9cfa7a7c31b4201e14ef840c509ead74886e25a1e5fae1e7688812874efeeb49e1d7ed7415af61c3d84", &(0x7f00000005c0)="c317af7fae6977fdd9aa6a4bdeb3f6c8032c538e7c724d6fd57ff50781bb5908852bb27c2c9a495b42ff1054c4e278606103ff74e2f5230c", 0x17, r1, 0x4}, 0x38) write$cgroup_int(r0, &(0x7f0000000600), 0x12) r2 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x20, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000002c0)="c6745f6edfa6172518b2e2fcaa2d535d593d458fadf3817caf71b0de1c74ba7fbe0f5d7c62d7020af9230c55af91be7d2d445e3e7c7bdbfea364d16a41ff27804e526f2f01511d00fa08dbe274e951494bbcf64cb50be8845d642ddfb691f2c3f7f37a95095aba2386df5e26876373c975548d", &(0x7f0000001100)=""/4096, 0x4}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002140)={'tunl0\x00', 0x1800}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0x0, r2, 0x0) 2.521164642s ago: executing program 2 (id=6995): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x28}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) (async, rerun: 32) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.452352614s ago: executing program 5 (id=6996): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500"/120], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x2c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000fd0f00000600000000000000", @ANYRES32, @ANYBLOB="0200000000010000000000000000000600000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110080, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b'], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x92, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 2.393403537s ago: executing program 6 (id=6997): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r0}, 0x10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xfda8, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f0000000900)}, 0x20) sendmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000fc0)}, {0x0}, {&(0x7f0000000ac0)="e81fb94f11475988fc3f4d030d595e31070ae42be044a70b456122492530b1ba3009ee0d589a8dec34f6b6ded711", 0x2e}], 0x3}, 0xc0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r8}, 0x18) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.977251285s ago: executing program 6 (id=6998): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1, 0x84}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x77}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) sendmsg$sock(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000140)=@generic={0x8, "3155853425601dad326ffcffd57ffc69a75c19b7c38d7c989404259d916b7e93f081495c255f28542fd50bcfde3c8190b4e75e182a62586acaf1d308fed8931412d0791ae6f7bb36bf3e76cbd1bfff30fa0a2574173f4bab9f6e77b75c5bccb34f66acd02afd87e72b9f172746ebde5282e7f8e2191675853e0f590cb78c"}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000300)="a65282edece3541b1d7a2f538e88d5e834b2bf0fd67d313916d20e783215224fd47b7ce746ade94c2bb92fee3d25cda58693d69c55647de3fd9bde3d2fe8a72937a9a8c989996af676", 0x49}, {&(0x7f0000000380)="fd5506b9b35b598f0ffc11399fe2b6c6127e6930cca3eb3137dffd86437a07e98b5469e45b9407ff8da84b7181b5498738706b8a86435b422ce693be3e3c6b09971e44d56cf55c9e2928ab5145bc2142871dbd68781d6779ce28d0c01f3e84120367b6489e1b5b", 0x67}, {&(0x7f00000004c0)="79d83b904a95a05aca75ed79570140c0b3cc85ef9e1fd2cbc6712f07c9837eb93e45d43e1fdb3ba2267a51927885d20429ada1f91072b4e0cdb1481dc009480babefeb3546ce410c0c6e78393a8b20cde9d1d62a608651a1b3bf488f71f8198d7739346d4027a4a5006b36a72f66bc81d9dbe09a6dd13f41f2c5c1c51cfa8ea7910fafdc568b9dc415d0d21d903aa8e987651e1851f41dabb5686288fe39a3b75369f0e33c0ef354a7c5d38c882dd732940a511c0d18523d32429f50966a5315c1949099c344828bf2a72443d948bf95a283638af2d2", 0xd6}, {&(0x7f0000000400)="7f8853bcc23488918c752f433dc5e2fa49de79848de541ecc2dad61be365fedf24cf79234fda8003929bbc495ed687179a47f86158988aeb705e2721622245fd", 0x40}], 0x4, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0xfffffe01}}], 0x18}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000740)={'netpci0\x00', @local}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 1.934250327s ago: executing program 2 (id=7000): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='+io +blkio -blkio -rlimit -rdma +netf_event +cpu '], 0x3b) close(r4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000002000000f3ff"], 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.928978547s ago: executing program 6 (id=7001): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x59, &(0x7f00000007c0), 0x0, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@bloom_filter={0x1e, 0x3, 0x90ff, 0x2, 0x200, r0, 0x7fffffff, '\x00', r1, r3, 0x3, 0x1, 0x4, 0xb}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x49, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r10 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r11}, &(0x7f0000000180), &(0x7f00000001c0)=r10}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1}, 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0xbe9bac6d2d0f4e0b) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000040)='./file0\x00', r13}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r14, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.86170244s ago: executing program 5 (id=7004): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@fallback=0xffffffffffffffff, 0x5, 0x0, 0xb, &(0x7f0000000040)=[0x0], 0x1, 0x0, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0}, 0x40) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@fallback, r0, 0x23, 0x0, 0xffffffffffffffff, @void, @value=r3, @void, @void, r2}, 0x20) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r0, 0x1}, 0xc) (async) r4 = getpid() r5 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x6, 0x10, 0xca, 0x0, 0x8, 0x80, 0x7, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x9c0a, 0x9}, 0x110000, 0x10001, 0x7ff, 0x6, 0x4, 0x1000, 0xfe01, 0x0, 0xffff61a8, 0x0, 0x40}, r4, 0x3, r1, 0xa) (async) write$cgroup_int(r3, &(0x7f00000002c0)=0x800000, 0x12) (async) r6 = perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x80, 0x1, 0xf3, 0x7, 0xb, 0x0, 0x200, 0x20, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x7}, 0x80, 0x5, 0x1, 0x7, 0x2, 0x8, 0x3, 0x0, 0x5, 0x0, 0xa39}, r1, 0x2, r3, 0x4) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000380)) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x7, 0x44, 0x3e, 0xa308, r3, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x0, @value=r1}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r6, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)=r1}, 0x20) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x6, '\x00', 0x0, r3, 0x1, 0x4, 0x2}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000800)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x6, 0x27, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x82}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='GPL\x00', 0xe03, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @xdp, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x3, 0xe, 0x9, 0x1}, 0x10, 0xffffffffffffffff, r0, 0x7, &(0x7f0000000840)=[r1, r3, r8, r9, r10, r1, r1, r11], &(0x7f0000000880)=[{0x0, 0x2, 0x8, 0x7}, {0x1, 0x1, 0xc, 0x2}, {0x5, 0x3, 0x5, 0x8}, {0x4, 0x5, 0xd, 0x5}, {0x5, 0x2, 0x9, 0x2}, {0x1, 0x3, 0x4, 0x2}, {0x5, 0x5, 0xf, 0x7}], 0x10, 0x7fff}, 0x94) (async) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000009c0)=r3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00), 0x4) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000a40)={'netdevsim0\x00', 0x100}) (async) syz_clone(0x800, &(0x7f0000000a80)="fc78f8ca10e58d3f29eaa0b713a250c3553f4b38b77ed79946a0fd0fbd7080fecf69867e62b954a764f05aa156a1ba90ccd648eb76781aa8a178ca83fa37af1959df8dda3968c91e7fb7cda312aa859482d30c2b6face270f94d714670a932bf2b1167", 0x63, &(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)="c279492c12b826c4ccb8da87dd33559a2a96f641bfd5bd2a933d75a78b7e658bde07d125b24884f0995221b0822bd4ea03cebb92897b4550e425447d19c3aa1088e7ac5c675e38060c81cd017b74d85e95b41a68fd2b91a257d95dc1d29ae99509043138a640b530a8c8ee10ed4ee1509dfcb05c38a6791d2100a64879d0ff2e12f54a437425b265379690ebc8871324372c9c636760fd5589020060ac2110158b4eff7bece8362789fc57fafce6c751f7e104f3e9c734a18eb55cec7d4dfa76791f919f1f69c9b5d383228c661bc01800b147428548c3171420c525dafcecfa0afa3b39a28dc3de4888b47f13") (async) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80), 0x4) (async) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0x0, '\x00', 0x0, r3, 0x2, 0x4, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f80)={0x6, 0x5, &(0x7f0000000c80)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @exit, @map_val={0x18, 0x5, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000cc0)='syzkaller\x00', 0xa06, 0x76, &(0x7f0000000d00)=""/118, 0x40f00, 0x1c, '\x00', 0x0, 0x25, r12, 0x8, &(0x7f0000000dc0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000e80)=[r7, r1, r3, r9, r1, r1, 0x1, r10, r9, r13], &(0x7f0000000ec0)=[{0x2, 0x3, 0xa, 0x3}, {0x2, 0x5, 0x7, 0x6}, {0x5, 0x3, 0xc, 0x9}, {0x5, 0x1, 0xd, 0x2}, {0x4, 0x5, 0xb, 0xa}, {0x4, 0x1, 0xf, 0x4}, {0x4, 0xb, 0x6, 0x6}, {0x2, 0x1, 0x8, 0x8}, {0x2, 0x4, 0x7, 0xa}], 0x10, 0x8}, 0x94) (async) socketpair(0x3, 0x3, 0x4, &(0x7f0000001040)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@volatile={0x8, 0x0, 0x0, 0x9, 0x1}, @typedef={0xf, 0x0, 0x0, 0x8, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x9}]}, {0x0, [0x30, 0x5f, 0x30, 0x5f, 0x30, 0x61]}}, &(0x7f0000001100)=""/127, 0x48, 0x7f, 0x0, 0x7, 0x10000, @value=r1}, 0x28) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r14, &(0x7f0000001380)={&(0x7f0000001200)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001280)=""/96, 0x60}], 0x1, &(0x7f0000001340)}, 0x10063) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001480)={r5, 0x20, &(0x7f0000001440)={&(0x7f00000013c0), 0x0, 0x0, &(0x7f0000001400)=""/44, 0x2c}}, 0x10) (async) perf_event_open(&(0x7f00000014c0)={0x4, 0x80, 0x4, 0x7c, 0xbb, 0x9, 0x0, 0x7, 0x44040, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x20400, 0x2c7e78be, 0xfffffff9, 0x0, 0x8, 0xfffffff8, 0x95ff, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001840)={0x1b, 0x0, 0x0, 0x3, 0x0, r13, 0x6d77, '\x00', 0x0, r1, 0x0, 0x2, 0x1}, 0x50) 1.739285695s ago: executing program 5 (id=7006): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd637f4b22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd634995c2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x66) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) 1.472323647s ago: executing program 6 (id=7008): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'veth1_macvtap\x00', @random="6bc0000000f4"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0x66) 1.191668059s ago: executing program 3 (id=7010): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="b70000008100003bbfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105400000000001d400500000000004704000001ed00000f030000000000001d440000000000006b0a00fe000000007313000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff31a8fd3c0fd8b7ff831028e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646c0200000000000000020000e35208b0bb0d2cd829e654400e2438ec649dc76128610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda82fc9c4d7ecc7a803bf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714f62ba7a54f0c33d39000d0bfed3a6a59ff616236fd8f2477184bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06fa2e04cfe0649226c697d9e8eaade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00023ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a83469620c6e74e1f46132559c4f8700a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88f15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a920099c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40fc5d2f55ff07c53147de202ce517b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661061173f359e9052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff26b61aac8aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3ba18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e26534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336dfaa6d5d164301190bc2d4c04087729033342045804a28082abc3b4762302a271722fb515f31e0dd115a292f1e68481a62c49d15ea5460a29c60b1058fb7aa9bf4ee3cbe11b03711a15d730646b72d074dab1e8c429339f3460d324c17a4a8bfc7d7eab45bef00664d6dc82300000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xcc28311f37f1a151, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @value=r0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x400a80, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="020000000400000004000000010000001410"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x60000000}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events.local\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000380)=r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e01000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001680)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 1.091607913s ago: executing program 3 (id=7011): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x3, 0x1, 0x0, 0xf, 0x4000000, [{0x7}]}, @struct={0xc}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000002200)=""/4110, 0x3d, 0x100e, 0x1}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r4, &(0x7f0000000580)="70b397a2c666db343e34e71cc388942921c7f75ed5d47b720e3a641b9766cdbc1b592337365b96a93dcdd37f3125e901d8caec11ec831a876b5ba642e50a6c3ffa9731e382aeffbff47822f7a16a7f9b804ee4340f6e0b8720a7be7813be4771db482710f728f56251b12ca607f68e0a13ba178b91a6421affaae2993fa4eb8b92010121165c72a6762e685498b08eb1197d136c418396acd9b450475f2939b10bcaf4e9fd302683cbc8c56e7152db0341e975a80e4aadd2ea9217b263494b615595dea3d7", &(0x7f0000000680)=""/238}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.021691246s ago: executing program 0 (id=7012): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500004b1ae389ffffffffffe100000000000000f7ffffffffffffff"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f00000004c0)}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1, 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000717c33ba830a6fda79cabe8eb53e6e00"/43], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000020000000002000005000000000000000001000000000000000000000001"], 0x0, 0x66}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="0400000004000000040000000200010000000000", @ANYRES32, @ANYBLOB="0000000000000000000000800000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18060000000000010000000000000000851000000200000020000000000000009500007b0000000085000000130000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x80) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc000b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa2c200007"], 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) getpid() 985.105998ms ago: executing program 6 (id=7013): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="050000000600000008000000ae00000000000000e97367e5eadf91a9467a2e78ca7cf1408cf0a48bd601237ce687306b98b65aa685061fe38e37641728cda47789209d26ea83b2ce8e6f5551a2189bc264b42008a5fd0417e937d9602451930d934f74da80584a81f3c60232068b8d91998653c908597577f4677f169296bd19c5e4ade8beeaf355bf87537c80976a43b50743ee1856280000cb27682f680cbc9d8714d175baaaa40040202bd0bbf5d23bfc5439f656c360cdcacc95c709feb5a09b2dbeae1ab15f240decc2584cb7e8c8167533e9bc013dd963047f15ce52706202926a14aa8cf4af65", @ANYRES32=0x1, @ANYBLOB="ff27070200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x124, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) (async) sendmsg$inet(r7, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000180)=ANY=[], 0x93) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) 837.914314ms ago: executing program 3 (id=7014): syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000e"], 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000008000000020000000400000005"], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000fbffffff00000000030000007302a223040007000000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000a00)=""/4096, 0x0, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[r0, r1, r0, r1, r1, r0, r0, r0, r1], &(0x7f0000000200)=[{0x2, 0x4, 0xf, 0x3}]}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x4d, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x4e, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000740)={0x0, r2}, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000e3fe3b0000003c00000011c7fe81333669250000000000000f0000000000000000000200000000000000000000000e00"/70], 0x0, 0x56, 0x0, 0x0, 0x5}, 0x28) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff85000000040000001811b2a90000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708f8ff00000000bfa2000050cf72f48b3b50e7c2828fc6117f510000000007020000f8ffffffb703000008000000b7040000000000008500a29613159200000300000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 737.662908ms ago: executing program 0 (id=7015): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x5844, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x6, 0x0, 0xb}, {0x65}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xc, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x4}}], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r3}, 0x18) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) 698.87239ms ago: executing program 6 (id=7016): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, 0x0, &(0x7f0000000240)}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[], 0xfdef) sendmsg$sock(r5, &(0x7f0000000480)={&(0x7f0000000400)=@l2tp6={0xa, 0x0, 0x1, @local, 0x4}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000500)="df8f23661039a1edeab0fc7a19530234f0c7284962d3345307da4bea10db26e38c411c652325f4183d84db42a4e88fb936df588966b925559cd5b0dd9456ea4fb13ed14a6fb7c09c8617faf0e133d2aeba12c87eda91c8d4bf8cd59e", 0x5c}, {&(0x7f0000000600)="3fd07c0e8ab6b7400f7e2be7ae1dffe0898091bdedeba5528bf6e6424a9ea06bb95f41103a1f6a606980538f8bd1c5292128473f34fa2b724cdc570d8a6cf280e72236f523dee04e94adb4004c4975436e3d64b6205270f6916daea5e66d6a0581fabe02d7d5a2e84c135579cb1b823750899ff6d76801dd245570d4279d0a094a6a07aadabf8f47b7e178189e82b3e21afd0e81c2d5ca375c63e3eede2906bfe21c9d5dfa1f4398d5970d9ce00de18b37f2dd024931dfb0b8095a6201aea4f74e3c1197cf505c2704652e9dff76acfb884a49c5e84e27dedad56a4bbac1da54371d08", 0xe3}, {&(0x7f0000000700)="03c1002172fb21b40d4296e722b2f680686372f95a5c57936a99a0377600fad15de27cf634a288e5fa89740f92a2ce0fb58ad98f61cf05d68b0a8898515f12e98072ff3bc097522abfdb9d181f7a11b13b52612e35c84730aaede7b59778acc75ecdcce49f99da700c26f49a60f34e7b0c684234206dfd9543e99dafc0dae04525337ded75499a7dad0857e446fbfba9469298c14aecf61faa1a4c4c8d2a8a9cc733f08519ed27a09691f3c362", 0xad}, {&(0x7f00000007c0)="1474aa657b46b567e687c0ae0818bf699e53f3a80d3bf833824468a13b13d767bc3b5b5f8927e7be69359018a857ec53486f044842469d355ceec2f0a5c82b12cb72e82e2ee2807c43c9dcf1530952ae48c955ba88f3060b6849b300d0180c06630ad8a832a8fc7edf6922260b88c23021554e23f5d575ab", 0x78}, {&(0x7f0000000840)="685fbf62cd06b1ea56411eb3640bdd16b52cf8c6f404cec75e6aa473ee66444068f0dac5cb0ed50fd4eb9d2ca9150f8ddcea6aeac972d8d9792826a97a0358a8f97e15523e8f328c59b93e6e91544bf770a9eaaa06bc1be66d1bce8afc75cc6a2f6caec58597b1296430bfe73ae9676798f5801b6509af12eb51d6bdbc49cb43938bc125b50e14104893", 0x8a}, {&(0x7f0000000340)="207db429b886c84ac6a9215e65c7902bab54c42464296a305f2f", 0x1a}, {&(0x7f0000001c00)="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", 0x1000}], 0x7, &(0x7f0000000a00)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xffff9d8f}}], 0x60}, 0x60004881) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x10498a, 0xc8, 0x3, 0x0, 0x1}, 0x0, 0x8000000000, 0xffffffffffffffff, 0xe) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) 696.62269ms ago: executing program 5 (id=7017): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='xprtrdma_fixup\x00', r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 668.031871ms ago: executing program 0 (id=7018): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280), 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') 612.255763ms ago: executing program 5 (id=7019): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000000)="8cecdb43a69d49f24c69317634e908af3f6bd10b0616655bfce45dd10b781a5e625d270683bff140daf54783bb9c5b0af3", &(0x7f0000000040)=""/118}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001000)=[{0x0}], 0x1}, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001240)={r0, 0x58, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xe, 0x40, 0x3, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x3, r4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x9, &(0x7f0000001040)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x5}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @generic={0x9, 0x9, 0x8, 0x2, 0x9a}, @generic={0x0, 0x7, 0x9, 0x6876}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @alu={0x7, 0x1, 0xd, 0x6, 0x2, 0x80, 0xfffffffffffffffc}], &(0x7f0000001140)='syzkaller\x00', 0x6, 0xf, &(0x7f0000001180)=""/15, 0x41100, 0x18, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001280)={0x0, 0xd, 0x712c, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001340)=[r4, r0, r0], &(0x7f0000001380)=[{0x5, 0x3, 0x4, 0x2}, {0x1, 0x1, 0x6, 0x2}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r6}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000003000), 0x201, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 567.446406ms ago: executing program 3 (id=7020): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000540)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x14, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0xf) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000600)=""/152, 0x26, 0x98, 0x1}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = syz_clone(0x20000, &(0x7f00000007c0)="dbca633ccdc4fd62a69f24c6d794a670e59ab57dc219870f91154c503562c573c3bbb09a1ea5778b6ea5038353625240f56070afda4414b840afe7eab5c5eba755e7cbd33fa03ba365127a630962065788e515d1760f5783c3b0eb787b403d0d6a413a9ccaa99d52f0b37f10e1dcc53360fb5e4e3b981d4cd7e2ca5b1723ea404541fdb246fddcdb1117bcce7874653e16de6a51923d2d51635b154886ae761c127da6daa5af29563a8ed418acda8e9412c288a30ed52ffdefee9235faaf208f9e20fdda2f1cac14076a63f719ab567bbe11c95aee9b97d123f8b6491f48177c01f65324c2cf41dd92a14cf97fc7", 0xee, &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f0000000900)="56f0a352a744794c133ab69cebe4d821405b14d8a0256817e89c2290bf59acf763fbae033fd9e221015d6be148f3c6f9b6a19bd4624ce24e23104e8d54a5ca7069a1ef2d4383") perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0xe, 0xb, 0x3, 0x0, 0x400, 0xb0808, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000380), 0x4}, 0x100042, 0x7, 0x1542, 0x0, 0x3, 0x1, 0x10, 0x0, 0x1, 0x0, 0xec9}, r5, 0x0, r4, 0x2) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/uts\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000800b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x42, &(0x7f0000000040), 0x3b) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_vmscan_throttled\x00', r1, 0x0, 0x5}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 499.169908ms ago: executing program 0 (id=7021): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="7a0a00ff000000007110760000000000951e00000400000053cf771920b501a5821e158f444250e98b61465c518750919c39f19e614f88560a6384efa48859070046f81adf13043ef7a7b8d653aaea0c229117876a1c906eae9092af86"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000280)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x3e, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x5b, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x2e4, 0x0, 0xffffffffffffffff, 0x612c, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x250000, 0x0, r2, 0xffffffee, '\x00', r1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8b, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r6, 0x58, &(0x7f00000008c0)}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'vlan1\x00', 0x7c2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r5, &(0x7f0000000040)}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 241.989849ms ago: executing program 3 (id=7022): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{}, 0x0, 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x60, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="7a0a00ff00000000711043000000000095000000000000000b44c146b9162779ae713b31e59d22c10080dc4afd5584fe146d0167de3cd228921652b7a06f51b8dd7ecc6ac0cad2b575808aafc7ac733b456c4ce275bb8d8d3fc3f06dc161e201a1892f02888e2c2fb5b89cd940d7182358b52c4d08c6ae9dc7ebf5c8998606ff433c9eb70d5b74132eb7a14ede4462af169cd6289dba3f05ebaa775abafb3d06a5250eb3556b2978565a7cee4564de81d27770246698e3bff8"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r1}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x201, 0x26409, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 237.946959ms ago: executing program 5 (id=7023): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000000f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='cpuhp_exit\x00', r5, 0x0, 0xfffffffffffffffe}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000680)=ANY=[@ANYBLOB='+cpu'], 0x5) write$cgroup_subtree(r8, &(0x7f0000000500)=ANY=[@ANYBLOB='-cpu'], 0x5) r9 = openat$cgroup_type(r6, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r9, &(0x7f0000000080), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRESHEX=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r10 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xca, &(0x7f0000000800)=""/202}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000000480)=ANY=[@ANYBLOB="8eeb0ebf295fe08fc95f0137ca001c00000006000000040000000200000604400000030000000100000005000000ed064ee10000005f7217c1f64f950221404ecca2767b6312b75de97a77553f57ebce"], &(0x7f0000003680)=""/4093, 0xffffffffffffffe5, 0xffd, 0x0, 0x9}, 0x28) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000180)=ANY=[@ANYRES16], 0x0}, 0x94) 184.225782ms ago: executing program 3 (id=7024): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x6}, 0x9, 0x7, 0x5, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb001c00000006000000040000000200000604400000030000000100000005000000000000000000005f7217c1f64f950221404ecca2767b6312b75de97a77553f57ebce21891a10946bc3dd1700b1d5bc"], &(0x7f0000003680)=""/4096, 0x3a, 0x1000, 0x1}, 0x28) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r11 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r11) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) close(r1) 182.528902ms ago: executing program 0 (id=7025): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x8000000001eb, 0x10001}, 0x2018, 0x0, 0x0, 0x2, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='GPL\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) (async) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r4) (async) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) (async) close(r6) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 89.075216ms ago: executing program 2 (id=7026): socketpair(0x25, 0x805, 0x84, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0082dfb02292de40b7651caf70d3ba61e2dafe46e977dfa377d32c8de0ceb21cdd307a5c4b2f9002b432a64fad73bd4d1847c7ebd685a7475d5574ca356ce8ec7fb925244eff865f1d8201ce51d87328dfa8be58bf3ca77e80cd27864cd70a07a30f0ea46b29892d7af9909406ad", @ANYRES64=r0, @ANYRES16=r3, @ANYRESHEX=r2, @ANYRESHEX=r1, @ANYRESHEX=r1], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c19"], &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000003c0), 0xa}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00'}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1fd, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, r4, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {&(0x7f0000000640)="399c76c550e9ae5ecfb11c897b5fc37d0dbc840b7a7783a8e2978abdc5ece5b2356883a031fb475ae9ae34decf88c24096e86254f7b49339d25df2eadb454b65d66123a35c627f1fb6c822cea4147484f563683c5448", 0x56}], 0x3, &(0x7f0000000940), 0x0, 0x4048000}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000240)=0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) write$cgroup_int(r6, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x1886e5ad6ab3e97, 0x0, 0x0, 0x3, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 0 (id=7027): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000400000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000048500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000000), &(0x7f0000000140)=r1}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010b00000000009500000015000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x80) kernel console output (not intermixed with test programs): _to_hsr: link becomes ready [ 30.562745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.635333][ T699] device veth0_vlan entered promiscuous mode [ 30.670998][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.745656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.754170][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.762098][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.776547][ T699] device veth1_macvtap entered promiscuous mode [ 30.785389][ T802] device sit0 left promiscuous mode [ 30.864454][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.892417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.900533][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.909724][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.924133][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.031131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.062256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.082871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.092134][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.101188][ T807] device sit0 entered promiscuous mode [ 31.402861][ T49] device bridge_slave_1 left promiscuous mode [ 31.431009][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.475268][ T49] device bridge_slave_0 left promiscuous mode [ 31.525932][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.585583][ T49] device veth1_macvtap left promiscuous mode [ 31.624182][ T49] device veth0_vlan left promiscuous mode [ 32.334929][ T24] audit: type=1400 audit(1764134360.750:123): avc: denied { relabelfrom } for pid=878 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.440465][ T24] audit: type=1400 audit(1764134360.770:124): avc: denied { relabelto } for pid=878 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.103445][ T899] vxcan1: tun_chr_ioctl cmd 1074025677 [ 33.108942][ T899] vxcan1: linktype set to 0 [ 33.227532][ T895] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.300974][ T895] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.350345][ T895] device bridge_slave_0 entered promiscuous mode [ 33.404648][ T895] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.418643][ T895] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.426180][ T895] device bridge_slave_1 entered promiscuous mode [ 33.625395][ T895] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.632484][ T895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.639755][ T895] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.646802][ T895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.759452][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.770150][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.801951][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.814193][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.840743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.864170][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.871232][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.940342][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.956338][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.963528][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.971480][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.979535][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.002517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.038020][ T895] device veth0_vlan entered promiscuous mode [ 34.057550][ T24] audit: type=1400 audit(1764134362.470:125): avc: denied { ioctl } for pid=936 comm="syz.2.119" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.067331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.114121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.137971][ T895] device veth1_macvtap entered promiscuous mode [ 34.167776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.182372][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.193650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.202002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.210178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.280794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.303736][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.328629][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.337523][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.428106][ T49] device bridge_slave_1 left promiscuous mode [ 34.448712][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.467503][ T49] device bridge_slave_0 left promiscuous mode [ 34.487561][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.521434][ T49] device veth1_macvtap left promiscuous mode [ 34.576404][ T49] device veth0_vlan left promiscuous mode [ 34.815732][ T964] device syzkaller0 entered promiscuous mode [ 34.851453][ T985] device veth0_vlan left promiscuous mode [ 34.860435][ T985] device veth0_vlan entered promiscuous mode [ 34.930315][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.946891][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.961181][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.027580][ T991] device syzkaller0 entered promiscuous mode [ 35.425762][ T1006] device pim6reg1 entered promiscuous mode [ 35.730736][ T1046] device wg2 entered promiscuous mode [ 35.783228][ T24] audit: type=1400 audit(1764134364.200:126): avc: denied { create } for pid=1031 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 36.111303][ T1069] syz.3.150[1069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.474532][ T1082] device sit0 left promiscuous mode [ 36.834956][ T1085] device syzkaller0 entered promiscuous mode [ 36.841604][ T1086] device sit0 entered promiscuous mode [ 37.372277][ T49] device bridge_slave_1 left promiscuous mode [ 37.380518][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.401517][ T24] audit: type=1400 audit(1764134365.820:127): avc: denied { create } for pid=1145 comm="syz.2.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 37.421892][ T49] device bridge_slave_0 left promiscuous mode [ 37.429039][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.447884][ T49] device veth1_macvtap left promiscuous mode [ 37.460577][ T49] device veth0_vlan left promiscuous mode [ 38.463479][ T1178] syz.3.179[1178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.463533][ T1178] syz.3.179[1178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.780770][ T1178] device veth0_vlan left promiscuous mode [ 38.931258][ T1178] device veth0_vlan entered promiscuous mode [ 39.077975][ T1195] device veth1_macvtap left promiscuous mode [ 39.114012][ T1195] device veth1_macvtap entered promiscuous mode [ 39.120357][ T1195] device macsec0 entered promiscuous mode [ 39.267135][ T24] audit: type=1400 audit(1764134367.680:128): avc: denied { ioctl } for pid=1204 comm="syz.0.187" path="socket:[18354]" dev="sockfs" ino=18354 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.876020][ T24] audit: type=1400 audit(1764134368.290:129): avc: denied { create } for pid=1235 comm="syz.3.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 40.104509][ T1252] device veth0_vlan left promiscuous mode [ 40.113100][ T1252] device veth0_vlan entered promiscuous mode [ 40.508027][ T24] audit: type=1400 audit(1764134368.920:130): avc: denied { append } for pid=1302 comm="syz.1.215" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.585091][ T1307] device veth0_vlan left promiscuous mode [ 40.595775][ T1307] device veth0_vlan entered promiscuous mode [ 40.783583][ T24] audit: type=1400 audit(1764134369.200:131): avc: denied { create } for pid=1310 comm="syz.0.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 41.496427][ T1347] device syzkaller0 entered promiscuous mode [ 42.246648][ T1404] device pim6reg1 entered promiscuous mode [ 43.101125][ T24] audit: type=1400 audit(1764134371.510:132): avc: denied { create } for pid=1424 comm="syz.2.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 43.178928][ T1431] device sit0 entered promiscuous mode [ 43.826488][ T1483] device bridge0 entered promiscuous mode [ 44.101536][ T1510] device veth0_vlan left promiscuous mode [ 44.120439][ T1510] device veth0_vlan entered promiscuous mode [ 44.260941][ T24] audit: type=1400 audit(1764134372.670:133): avc: denied { create } for pid=1513 comm="syz.4.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 44.400613][ T1522] device sit0 left promiscuous mode [ 45.144729][ T24] audit: type=1400 audit(1764134373.560:134): avc: denied { create } for pid=1560 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 46.348916][ T1610] syz.3.300 uses obsolete (PF_INET,SOCK_PACKET) [ 46.680642][ T1621] syz.3.304[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.685582][ T1621] syz.3.304[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.840990][ T1629] device sit0 left promiscuous mode [ 47.323981][ T1648] device veth0_vlan left promiscuous mode [ 47.345855][ T1648] device veth0_vlan entered promiscuous mode [ 47.781699][ T1669] device veth0_vlan left promiscuous mode [ 47.787763][ T1669] device veth0_vlan entered promiscuous mode [ 47.899332][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.907830][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.916027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.669852][ T1724] device syzkaller0 entered promiscuous mode [ 49.247463][ T1733] device syzkaller0 entered promiscuous mode [ 49.828530][ T1763] device veth0_virt_wifi entered promiscuous mode [ 51.662570][ T1831] p: renamed from pim6reg1 [ 52.608602][ T24] audit: type=1400 audit(1764134381.020:135): avc: denied { create } for pid=1853 comm="syz.2.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 53.448330][ T1888] device pim6reg1 entered promiscuous mode [ 53.630225][ T1900] device pim6reg1 entered promiscuous mode [ 54.626551][ T24] audit: type=1400 audit(1764134383.030:136): avc: denied { create } for pid=1926 comm="syz.2.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 56.198520][ T1982] device syzkaller0 entered promiscuous mode [ 57.754764][ T24] audit: type=1400 audit(1764134386.170:137): avc: denied { create } for pid=2050 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 57.775024][ T2055] device pim6reg1 entered promiscuous mode [ 57.855333][ T2057] device sit0 entered promiscuous mode [ 58.401099][ T24] audit: type=1400 audit(1764134386.820:138): avc: denied { create } for pid=2076 comm="syz.4.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 60.860961][ T2216] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 61.693711][ T2245] : renamed from vlan1 [ 62.071263][ T2259] device syzkaller0 entered promiscuous mode [ 63.076693][ T24] audit: type=1400 audit(1764134391.490:139): avc: denied { create } for pid=2303 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 68.520421][ T24] audit: type=1400 audit(1764134396.930:140): avc: denied { create } for pid=2513 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 68.709614][ T24] audit: type=1400 audit(1764134397.120:141): avc: denied { create } for pid=2513 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 71.197945][ T2603] bridge0: port 3(ip6gretap0) entered blocking state [ 71.210542][ T2603] bridge0: port 3(ip6gretap0) entered disabled state [ 71.230733][ T2603] device ip6gretap0 entered promiscuous mode [ 71.237017][ T2603] bridge0: port 3(ip6gretap0) entered blocking state [ 71.243752][ T2603] bridge0: port 3(ip6gretap0) entered forwarding state [ 71.321346][ T2614] syz.0.586[2614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.321405][ T2614] syz.0.586[2614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.357240][ T2607] device veth1_macvtap left promiscuous mode [ 71.448179][ T2618] device pim6reg1 entered promiscuous mode [ 72.825352][ T2678] device syzkaller0 entered promiscuous mode [ 74.684629][ T2758] device sit0 left promiscuous mode [ 75.245450][ T24] audit: type=1400 audit(1764134403.660:142): avc: denied { create } for pid=2784 comm="syz.3.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 75.481361][ T2789] device syzkaller0 entered promiscuous mode [ 75.683268][ T2802] device pim6reg1 entered promiscuous mode [ 77.061020][ T24] audit: type=1400 audit(1764134405.470:143): avc: denied { create } for pid=2843 comm="syz.4.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 77.662492][ T2866] device pim6reg1 entered promiscuous mode [ 79.350460][ T2902] device wg2 left promiscuous mode [ 81.335777][ T2977] device wg2 entered promiscuous mode [ 81.545639][ T2993] device syzkaller0 entered promiscuous mode [ 83.562076][ T3099] tun0: tun_chr_ioctl cmd 1074025678 [ 83.612215][ T3099] tun0: group set to 1 [ 83.933345][ T3112] device veth0_vlan left promiscuous mode [ 83.960655][ T3112] device veth0_vlan entered promiscuous mode [ 84.015552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.042870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.077733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.326727][ T3126] device sit0 entered promiscuous mode [ 84.804097][ T3139] device syzkaller0 entered promiscuous mode [ 86.755298][ T24] audit: type=1400 audit(1764134415.170:144): avc: denied { create } for pid=3174 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 88.485076][ T3251] device veth0_vlan left promiscuous mode [ 88.530616][ T3251] device veth0_vlan entered promiscuous mode [ 88.603724][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.632496][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.661278][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.035369][ T3282] device sit0 entered promiscuous mode [ 89.382962][ T3311] device syzkaller0 entered promiscuous mode [ 89.395350][ T3312] device pim6reg1 entered promiscuous mode [ 89.623683][ T3338] : renamed from bond_slave_0 [ 90.663399][ T95] udevd[95]: worker [297] terminated by signal 33 (Unknown signal 33) [ 90.679672][ T95] udevd[95]: worker [297] failed while handling '/devices/virtual/block/loop0' [ 90.751721][ T95] udevd[95]: worker [2222] terminated by signal 33 (Unknown signal 33) [ 90.816023][ T95] udevd[95]: worker [2222] failed while handling '/devices/virtual/block/loop1' [ 91.021916][ T3401] device sit0 left promiscuous mode [ 91.175235][ T3405] device sit0 entered promiscuous mode [ 92.014658][ T24] audit: type=1400 audit(1764134420.430:145): avc: denied { create } for pid=3469 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.440815][ T3480] device syzkaller0 entered promiscuous mode [ 92.543378][ T1528] syzkaller0: tun_net_xmit 48 [ 93.007992][ T24] audit: type=1400 audit(1764134421.420:146): avc: denied { write } for pid=3523 comm="syz.1.839" name="cgroup.subtree_control" dev="cgroup2" ino=369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 93.043396][ T24] audit: type=1400 audit(1764134421.420:147): avc: denied { open } for pid=3523 comm="syz.1.839" path="" dev="cgroup2" ino=369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 93.080007][ T24] audit: type=1400 audit(1764134421.430:148): avc: denied { ioctl } for pid=3523 comm="syz.1.839" path="" dev="cgroup2" ino=369 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 94.161742][ T3613] device wg2 left promiscuous mode [ 96.116967][ T3670] device pim6reg1 entered promiscuous mode [ 97.994994][ T3712] device syzkaller0 entered promiscuous mode [ 98.537905][ T3737] device pim6reg1 entered promiscuous mode [ 99.887430][ T3813] device syzkaller0 entered promiscuous mode [ 99.965276][ T3819] device syzkaller0 entered promiscuous mode [ 100.396404][ T3855] device syzkaller0 entered promiscuous mode [ 100.981149][ T3881] device sit0 entered promiscuous mode [ 101.627710][ T3905] device pim6reg1 entered promiscuous mode [ 101.780269][ T3915] device pim6reg1 entered promiscuous mode [ 102.872991][ T4041] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.881183][ T4041] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.888661][ T4041] device bridge_slave_0 entered promiscuous mode [ 102.937653][ T4041] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.944819][ T4041] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.952383][ T4041] device bridge_slave_1 entered promiscuous mode [ 102.995540][ T4067] syz.1.964[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.995614][ T4067] syz.1.964[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.998647][ T4064] syz.1.964[4064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.033588][ T4064] syz.1.964[4064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.039402][ T4062] device syzkaller0 entered promiscuous mode [ 103.279263][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.287139][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.326277][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.345161][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.354571][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.361631][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.369362][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.378269][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.393572][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.400741][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.420616][ T4089] : renamed from vlan0 [ 103.429196][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.450728][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.467252][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.511155][ T4092] device sit0 entered promiscuous mode [ 103.762327][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.962037][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.970743][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.978503][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.990850][ T4041] device veth0_vlan entered promiscuous mode [ 104.038468][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.190951][ T4041] device veth1_macvtap entered promiscuous mode [ 104.482568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.493929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.502851][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.511495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.943502][ T49] device bridge_slave_1 left promiscuous mode [ 104.949766][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.028641][ T49] device bridge_slave_0 left promiscuous mode [ 105.034850][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.134250][ T49] device veth1_macvtap left promiscuous mode [ 105.632243][ T4194] : renamed from vlan1 [ 105.644533][ T24] audit: type=1400 audit(1764134434.060:149): avc: denied { create } for pid=4190 comm="syz.3.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 106.337761][ T4238] device syzkaller0 entered promiscuous mode [ 106.910625][ T4253] device sit0 entered promiscuous mode [ 107.679307][ T4270] syz.3.1018[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.679393][ T4270] syz.3.1018[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.844088][ T4273] device pim6reg1 entered promiscuous mode [ 111.771902][ T4378] device pim6reg1 entered promiscuous mode [ 112.152091][ T4382] device veth1_macvtap left promiscuous mode [ 113.228314][ T24] audit: type=1400 audit(1764134441.640:150): avc: denied { create } for pid=4428 comm="syz.1.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 113.593201][ T4441] device pim6reg1 entered promiscuous mode [ 113.951532][ T4451] device sit0 left promiscuous mode [ 114.110481][ T4460] sock: sock_set_timeout: `syz.2.1069' (pid 4460) tries to set negative timeout [ 114.120306][ T4451] device sit0 entered promiscuous mode [ 116.012860][ T4510] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.021817][ T4510] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.133217][ T4510] device bridge_slave_1 left promiscuous mode [ 116.191431][ T4510] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.285086][ T4510] device bridge_slave_0 left promiscuous mode [ 116.292932][ T4510] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.884031][ T24] audit: type=1400 audit(1764134445.300:151): avc: denied { create } for pid=4523 comm="syz.0.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 116.981518][ T4531] device syzkaller0 entered promiscuous mode [ 117.196191][ T4541] device veth0_vlan left promiscuous mode [ 117.211562][ T4541] device veth0_vlan entered promiscuous mode [ 117.240005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.268312][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.290886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 117.651454][ T4575] device syzkaller0 entered promiscuous mode [ 119.502153][ T4725] device syzkaller0 entered promiscuous mode [ 120.121944][ T4800] device pim6reg1 entered promiscuous mode [ 120.725188][ T24] audit: type=1400 audit(1764134449.140:152): avc: denied { create } for pid=4853 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 121.841463][ T4950] device syzkaller0 entered promiscuous mode [ 121.992205][ T4980] device pim6reg1 entered promiscuous mode [ 122.163560][ T24] audit: type=1400 audit(1764134450.580:153): avc: denied { create } for pid=4988 comm="syz.3.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 122.218677][ T4994] device sit0 left promiscuous mode [ 122.244397][ T4994] device sit0 entered promiscuous mode [ 123.105727][ T5034] device veth1_macvtap left promiscuous mode [ 123.145402][ T5034] device veth1_macvtap entered promiscuous mode [ 123.152086][ T5034] device macsec0 entered promiscuous mode [ 123.731025][ T5073] device pim6reg1 entered promiscuous mode [ 123.761577][ T5077] syz.0.1232[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.761624][ T5077] syz.0.1232[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.808433][ T5080] device syzkaller0 entered promiscuous mode [ 124.292234][ T5111] device veth0_vlan left promiscuous mode [ 124.328862][ T5111] device veth0_vlan entered promiscuous mode [ 124.432729][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.470977][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.520745][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 124.730121][ T5124] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 124.738421][ T5124] syzkaller0: linktype set to 0 [ 125.107341][ T5162] device wg2 entered promiscuous mode [ 125.712292][ T24] audit: type=1400 audit(1764134454.130:154): avc: denied { create } for pid=5178 comm="syz.4.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.030450][ T5194] device sit0 left promiscuous mode [ 127.775212][ T5241] device syzkaller0 entered promiscuous mode [ 129.691937][ T5347] device pim6reg1 entered promiscuous mode [ 130.687611][ T5397] device pim6reg1 entered promiscuous mode [ 130.829999][ T5414] bridge0: port 3(ip6gretap0) entered disabled state [ 130.837264][ T5414] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.845414][ T5414] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.857445][ T5414] device bridge0 left promiscuous mode [ 130.884761][ T5419] device ip6gretap0 left promiscuous mode [ 130.909355][ T5419] bridge0: port 3(ip6gretap0) entered disabled state [ 130.954924][ T5419] device bridge_slave_1 left promiscuous mode [ 130.963227][ T5419] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.020462][ T5419] device bridge_slave_0 left promiscuous mode [ 131.026736][ T5419] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.357356][ T5492] device veth0_vlan left promiscuous mode [ 132.418711][ T5492] device veth0_vlan entered promiscuous mode [ 132.485640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.494005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 132.501834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.118558][ T5529] device veth0_vlan left promiscuous mode [ 133.152921][ T5529] device veth0_vlan entered promiscuous mode [ 133.178528][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.196168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.246883][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.500258][ T5559] syzkaller0: mtu greater than device maximum [ 134.102253][ T5590] device syzkaller0 entered promiscuous mode [ 134.766091][ T5618] device veth0_vlan left promiscuous mode [ 134.774835][ T5618] device veth0_vlan entered promiscuous mode [ 135.749762][ T5657] device sit0 left promiscuous mode [ 136.439302][ T5716] device sit0 left promiscuous mode [ 137.827917][ T5779] device syzkaller0 entered promiscuous mode [ 138.107436][ T5817] device sit0 left promiscuous mode [ 138.164541][ T5819] device sit0 entered promiscuous mode [ 138.383717][ T5823] device sit0 entered promiscuous mode [ 138.935442][ T5860] device syzkaller0 entered promiscuous mode [ 140.359581][ T5941] device pim6reg1 entered promiscuous mode [ 140.500162][ T5951] device sit0 left promiscuous mode [ 140.818292][ T5957] device syzkaller0 entered promiscuous mode [ 141.557766][ T6007] device pim6reg1 entered promiscuous mode [ 141.648990][ T6024] device syzkaller0 entered promiscuous mode [ 143.468789][ T6105] device pim6reg1 entered promiscuous mode [ 143.714796][ T6121] device veth0_vlan left promiscuous mode [ 143.724626][ T6121] device veth0_vlan entered promiscuous mode [ 143.744060][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.754223][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.763421][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 143.825688][ T6123] syz.2.1534[6123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.825775][ T6123] syz.2.1534[6123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.062309][ T6145] device sit0 entered promiscuous mode [ 144.569860][ T6168] device sit0 left promiscuous mode [ 145.154103][ T6175] device sit0 entered promiscuous mode [ 145.263546][ T6199] device veth1_macvtap left promiscuous mode [ 145.274664][ T6199] device macsec0 entered promiscuous mode [ 145.603554][ T6227] device sit0 left promiscuous mode [ 145.765525][ T6229] sock: sock_set_timeout: `syz.0.1561' (pid 6229) tries to set negative timeout [ 145.956937][ T6228] device syzkaller0 entered promiscuous mode [ 145.992141][ T6227] device sit0 entered promiscuous mode [ 146.476510][ T6261] device pim6reg1 entered promiscuous mode [ 146.694307][ T6289] device pim6reg1 entered promiscuous mode [ 147.076862][ T6303] device wg2 entered promiscuous mode [ 147.658343][ T6337] device sit0 entered promiscuous mode [ 147.943463][ T6341] device syzkaller0 entered promiscuous mode [ 148.384762][ T6368] device syzkaller0 entered promiscuous mode [ 148.514869][ T6382] device sit0 entered promiscuous mode [ 149.046153][ T24] audit: type=1400 audit(1764134477.460:155): avc: denied { create } for pid=6398 comm="syz.3.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 149.203160][ T6414] device sit0 left promiscuous mode [ 149.359701][ T6417] device sit0 entered promiscuous mode [ 150.346162][ T6467] device sit0 left promiscuous mode [ 150.722058][ T6471] device syzkaller0 entered promiscuous mode [ 150.741348][ T6475] device sit0 entered promiscuous mode [ 150.910766][ T6481] device veth0_vlan left promiscuous mode [ 150.917880][ T6481] device veth0_vlan entered promiscuous mode [ 150.925007][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.943484][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.961240][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.850156][ T6499] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.857908][ T6499] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.865426][ T6499] device bridge_slave_0 entered promiscuous mode [ 151.880450][ T6499] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.889107][ T6499] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.896591][ T6499] device bridge_slave_1 entered promiscuous mode [ 152.144821][ T6513] device wg2 entered promiscuous mode [ 152.175302][ T6499] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.182361][ T6499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.189624][ T6499] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.196664][ T6499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.363392][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.395587][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.460938][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.540176][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.555955][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.563021][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.577965][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.591771][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.598813][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.606261][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.620646][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.653791][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.662368][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.670692][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.678179][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.693624][ T6499] device veth0_vlan entered promiscuous mode [ 152.723073][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.767296][ T6499] device veth1_macvtap entered promiscuous mode [ 152.851612][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.880775][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.929704][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.950617][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.708758][ T9] device veth0_vlan left promiscuous mode [ 154.132828][ T6569] device wg2 left promiscuous mode [ 154.300965][ T6583] 8021q: VLANs not supported on  [ 155.042288][ T6631] device sit0 left promiscuous mode [ 155.118622][ T6631] device sit0 entered promiscuous mode [ 155.183065][ T6628] device sit0 entered promiscuous mode [ 155.347319][ T6640] device syzkaller0 entered promiscuous mode [ 155.612015][ T6666] device sit0 left promiscuous mode [ 155.628990][ T6664] device sit0 entered promiscuous mode [ 155.657706][ T6668] device pim6reg1 entered promiscuous mode [ 155.758996][ T6677] device veth0_vlan left promiscuous mode [ 155.795930][ T6677] device veth0_vlan entered promiscuous mode [ 156.176475][ T6706] device syzkaller0 entered promiscuous mode [ 156.436724][ T6717] device sit0 left promiscuous mode [ 156.470424][ T6717] device sit0 entered promiscuous mode [ 157.632270][ T6765] device syzkaller0 entered promiscuous mode [ 159.139094][ T6875] device pim6reg1 entered promiscuous mode [ 159.332669][ T6898] syz.3.1751[6898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.332727][ T6898] syz.3.1751[6898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.134270][ T6920] device syzkaller0 entered promiscuous mode [ 160.518900][ T6943] device syzkaller0 entered promiscuous mode [ 160.665329][ T24] audit: type=1400 audit(1764134489.080:156): avc: denied { create } for pid=6956 comm="syz.3.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 160.826250][ T6968] device veth1_macvtap left promiscuous mode [ 161.378455][ T7002] device syzkaller0 entered promiscuous mode [ 161.446347][ T7006] device sit0 left promiscuous mode [ 163.057466][ T7062] device sit0 left promiscuous mode [ 163.476869][ T7094] device sit0 entered promiscuous mode [ 164.007030][ T7110] device syzkaller0 entered promiscuous mode [ 164.086683][ T7114] device pim6reg1 entered promiscuous mode [ 166.588677][ T7217] device syzkaller0 entered promiscuous mode [ 167.122790][ T7257] device syzkaller0 left promiscuous mode [ 167.366130][ T7266] syz.2.1863[7266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.368238][ T7266] syz.2.1863[7266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.266689][ T24] audit: type=1400 audit(1764134497.680:157): avc: denied { associate } for pid=7364 comm="syz.4.1890" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 169.740413][ T7390] device wg2 entered promiscuous mode [ 169.895316][ T7404] device sit0 entered promiscuous mode [ 170.389200][ T7451] device syzkaller0 entered promiscuous mode [ 171.328433][ T7517] device pim6reg1 entered promiscuous mode [ 171.961050][ T7534] device syzkaller0 entered promiscuous mode [ 172.182302][ T7539] device pim6reg1 entered promiscuous mode [ 172.335257][ T7554] device veth1_macvtap left promiscuous mode [ 172.350629][ T7554] device macsec0 entered promiscuous mode [ 172.443501][ T7559] device pim6reg1 entered promiscuous mode [ 172.655339][ T24] audit: type=1400 audit(1764134501.070:158): avc: denied { read } for pid=7560 comm="syz.4.1947" dev="nsfs" ino=4026532368 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 172.769531][ T24] audit: type=1400 audit(1764134501.100:159): avc: denied { open } for pid=7560 comm="syz.4.1947" path="cgroup:[4026532368]" dev="nsfs" ino=4026532368 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.219474][ T24] audit: type=1400 audit(1764134502.630:160): avc: denied { create } for pid=7663 comm="syz.0.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 174.758882][ T7715] device sit0 left promiscuous mode [ 174.926860][ T7719] device sit0 entered promiscuous mode [ 175.252083][ T7726] device pim6reg1 entered promiscuous mode [ 176.912777][ T7830] device veth0_vlan left promiscuous mode [ 176.929625][ T7830] device veth0_vlan entered promiscuous mode [ 177.047355][ T7837] device pim6reg1 entered promiscuous mode [ 177.164120][ T7849] tap0: tun_chr_ioctl cmd 2147767506 [ 177.534101][ T7913] device syzkaller0 entered promiscuous mode [ 178.160817][ T7956] device syzkaller0 entered promiscuous mode [ 178.197525][ T7961] device pim6reg1 entered promiscuous mode [ 179.265173][ T7997] device veth0_vlan left promiscuous mode [ 179.373265][ T7997] device veth0_vlan entered promiscuous mode [ 179.381994][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.404683][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.496855][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 180.576985][ T8044] syz.3.2072[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.577044][ T8044] syz.3.2072[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.600707][ T8083] device syzkaller0 entered promiscuous mode [ 181.941532][ T8124] syz.1.2093[8124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.941591][ T8124] syz.1.2093[8124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.008666][ T8190] device syzkaller0 entered promiscuous mode [ 183.807465][ T8240] device veth0_vlan left promiscuous mode [ 183.885833][ T8240] device veth0_vlan entered promiscuous mode [ 186.047244][ T8339] device syzkaller0 entered promiscuous mode [ 186.262951][ T8357] device sit0 left promiscuous mode [ 187.187863][ T8407] device sit0 left promiscuous mode [ 187.997233][ T8446] device sit0 left promiscuous mode [ 188.036979][ T8446] device sit0 entered promiscuous mode [ 188.301144][ T8474] device pim6reg1 entered promiscuous mode [ 188.386623][ T8495] @: renamed from bond_slave_0 [ 188.889097][ T8508] device syzkaller0 entered promiscuous mode [ 190.471419][ T8592] device veth1_macvtap entered promiscuous mode [ 190.478524][ T8592] device macsec0 entered promiscuous mode [ 190.510357][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.807456][ T8623] device sit0 left promiscuous mode [ 190.860951][ T8623] device sit0 entered promiscuous mode [ 191.758439][ T8670] syz.2.2241[8670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.759527][ T8670] syz.2.2241[8670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.811471][ T8718] device sit0 left promiscuous mode [ 194.001222][ T8751] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.009379][ T8751] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.169046][ T8761] device bridge_slave_1 left promiscuous mode [ 194.175296][ T8761] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.184649][ T8761] device bridge_slave_0 left promiscuous mode [ 194.191073][ T8761] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.573300][ T8773] device sit0 left promiscuous mode [ 194.589371][ T8776] device veth0_vlan left promiscuous mode [ 194.641103][ T8776] device veth0_vlan entered promiscuous mode [ 194.968417][ T8796] pimreg: tun_chr_ioctl cmd 1074025673 [ 194.974179][ T8786] pimreg: tun_chr_ioctl cmd 1074025677 [ 194.979638][ T8786] pimreg: linktype set to 805 [ 195.093325][ T8788] pimreg: tun_chr_ioctl cmd 1074025677 [ 195.098823][ T8788] pimreg: linktype set to 805 [ 195.127887][ T8795] device veth0_vlan left promiscuous mode [ 195.194608][ T8795] device veth0_vlan entered promiscuous mode [ 195.820719][ T8813] device syzkaller0 entered promiscuous mode [ 195.911785][ T24] audit: type=1400 audit(1764134524.320:161): avc: denied { ioctl } for pid=8824 comm="syz.0.2284" path="uts:[4026532457]" dev="nsfs" ino=4026532457 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.872923][ T8933] device syzkaller0 entered promiscuous mode [ 197.946092][ T24] audit: type=1400 audit(1764134526.360:162): avc: denied { create } for pid=8935 comm="syz.2.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 198.113919][ T8943] device macsec0 entered promiscuous mode [ 199.828672][ T9002] device pim6reg1 entered promiscuous mode [ 200.449758][ T24] audit: type=1400 audit(1764134528.860:163): avc: denied { create } for pid=9032 comm="syz.3.2343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 200.772071][ T9073] device syzkaller0 entered promiscuous mode [ 201.645830][ T9127] GPL: port 1(erspan0) entered blocking state [ 201.661498][ T9127] GPL: port 1(erspan0) entered disabled state [ 201.697674][ T9127] device erspan0 entered promiscuous mode [ 201.760906][ T9139] GPL: port 1(erspan0) entered blocking state [ 201.767064][ T9139] GPL: port 1(erspan0) entered forwarding state [ 202.318280][ T9159] device syzkaller0 entered promiscuous mode [ 202.697918][ T9183] device wg2 entered promiscuous mode [ 203.280218][ T9225] device syzkaller0 entered promiscuous mode [ 203.325113][ T9231] syz.2.2401[9231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.325152][ T9231] syz.2.2401[9231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.337806][ T9231] syz.2.2401[9231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.349872][ T9231] syz.2.2401[9231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.444035][ T9231] device wg2 entered promiscuous mode [ 203.604704][ T9254] device sit0 entered promiscuous mode [ 204.992358][ T9322] device wg2 left promiscuous mode [ 205.763505][ T9358] device sit0 left promiscuous mode [ 205.801866][ T9358] device sit0 entered promiscuous mode [ 210.988615][ T9393] device syzkaller0 entered promiscuous mode [ 219.350697][ T9418] device pim6reg1 entered promiscuous mode [ 220.090138][ T9433] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.131342][ T9433] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.151798][ T9433] device bridge_slave_0 entered promiscuous mode [ 220.160265][ T9] GPL: port 1(erspan0) entered disabled state [ 220.171387][ T9] device erspan0 left promiscuous mode [ 220.177975][ T9] GPL: port 1(erspan0) entered disabled state [ 220.193205][ T9433] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.200502][ T9433] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.209795][ T9433] device bridge_slave_1 entered promiscuous mode [ 221.269863][ T9464] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.277347][ T9464] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.295107][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.310693][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.342220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.361194][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.369458][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.376506][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.384656][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.395776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.403956][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.410983][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.418361][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.426558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.434469][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.479061][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.488066][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.517704][ T9433] device veth0_vlan entered promiscuous mode [ 221.532224][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.547417][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.556539][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.564150][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.618801][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.627141][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.637184][ T9433] device veth1_macvtap entered promiscuous mode [ 221.647680][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.655558][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.670978][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.739740][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.748274][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.599576][ T9564] device veth0_vlan left promiscuous mode [ 223.633418][ T9564] device veth0_vlan entered promiscuous mode [ 224.367310][ T9650] device pim6reg1 entered promiscuous mode [ 227.235229][ T9780] device wg2 entered promiscuous mode [ 227.408954][ T9792] batadv0: tun_chr_ioctl cmd 2147767521 [ 227.434917][ T9792] batadv0: tun_chr_ioctl cmd 1074025692 [ 227.933008][ T9809] device syzkaller0 entered promiscuous mode [ 229.822348][ T9948] device pim6reg1 entered promiscuous mode [ 232.442115][ T24] audit: type=1400 audit(1764134560.860:164): avc: denied { create } for pid=10004 comm="syz.1.2634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 232.710728][ T24] audit: type=1400 audit(1764134561.110:165): avc: denied { create } for pid=10022 comm="syz.0.2639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 233.265167][T10042] device bridge_slave_1 left promiscuous mode [ 233.349513][T10042] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.400124][T10042] device bridge_slave_0 left promiscuous mode [ 233.470406][T10042] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.979442][T10076] device syzkaller0 entered promiscuous mode [ 234.020624][ T7889] syzkaller0: tun_net_xmit 48 [ 235.289409][T10140] syz.2.2669[10140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.289458][T10140] syz.2.2669[10140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.499784][T10131] device syzkaller0 entered promiscuous mode [ 237.088780][T10219] device sit0 entered promiscuous mode [ 238.060083][T10283] GPL: port 1(erspan0) entered blocking state [ 238.072938][T10283] GPL: port 1(erspan0) entered disabled state [ 238.085051][T10283] device erspan0 entered promiscuous mode [ 238.130453][T10286] GPL: port 1(erspan0) entered blocking state [ 238.136563][T10286] GPL: port 1(erspan0) entered forwarding state [ 238.993469][T10327] device veth0_vlan left promiscuous mode [ 239.010802][T10327] device veth0_vlan entered promiscuous mode [ 239.044612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.057967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.075717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.084491][T10396] device syzkaller0 entered promiscuous mode [ 255.587632][ T95] udevd[95]: worker [9403] terminated by signal 33 (Unknown signal 33) [ 255.607961][ T95] udevd[95]: worker [9403] failed while handling '/devices/virtual/block/loop5' [ 255.720701][ T95] udevd[95]: worker [9411] terminated by signal 33 (Unknown signal 33) [ 255.728995][ T95] udevd[95]: worker [9411] failed while handling '/devices/virtual/block/loop3' [ 255.731424][T10438] syz.5.2756[10438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.749433][T10438] syz.5.2756[10438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.909249][ T95] udevd[95]: worker [9409] terminated by signal 33 (Unknown signal 33) [ 255.939656][ T95] udevd[95]: worker [9409] failed while handling '/devices/virtual/block/loop2' [ 256.025868][T10436] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.040629][T10436] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.048095][T10436] device bridge_slave_0 entered promiscuous mode [ 256.055225][T10436] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.066979][T10436] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.074702][T10436] device bridge_slave_1 entered promiscuous mode [ 256.601671][T10436] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.608808][T10436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.616086][T10436] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.623122][T10436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.653955][T10468] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 256.707500][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.807792][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.039784][T10471] device veth0_vlan left promiscuous mode [ 257.096431][T10471] device veth0_vlan entered promiscuous mode [ 257.223907][ T336] device bridge_slave_1 left promiscuous mode [ 257.240480][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.307622][ T336] device bridge_slave_0 left promiscuous mode [ 257.317126][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.341831][ T336] device veth1_macvtap left promiscuous mode [ 257.445934][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.453580][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.517553][T10481] device wg2 left promiscuous mode [ 257.527676][T10487] device wg2 entered promiscuous mode [ 257.544817][T10492] device syzkaller0 entered promiscuous mode [ 257.580561][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.588868][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.597308][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.604358][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.615663][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.632846][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.641331][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.648361][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.699742][T10436] device veth0_vlan entered promiscuous mode [ 257.722959][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.741027][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.755766][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.769914][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.780686][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.788956][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.799492][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.811379][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.819547][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.827124][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.856229][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.864714][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.874135][T10436] device veth1_macvtap entered promiscuous mode [ 257.887412][T10517] device wg2 entered promiscuous mode [ 257.914522][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.922630][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.935754][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.957858][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.973361][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.583064][T10557] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 258.635536][T10557] device syzkaller0 entered promiscuous mode [ 258.799907][T10564] device veth0_vlan left promiscuous mode [ 258.808508][T10564] device veth0_vlan entered promiscuous mode [ 258.826503][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.834818][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.842927][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.854003][T10568] device wg2 entered promiscuous mode [ 260.635718][T10657] device syzkaller0 entered promiscuous mode [ 261.063596][T10696] device syzkaller0 entered promiscuous mode [ 261.327394][T10719] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.334605][T10719] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.402787][T10719] device bridge_slave_1 left promiscuous mode [ 261.409267][T10719] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.531455][T10719] device bridge_slave_0 left promiscuous mode [ 261.582140][T10719] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.263523][T10782] syz.3.2852[10782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.263587][T10782] syz.3.2852[10782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.382588][T10784] device pim6reg1 entered promiscuous mode [ 262.772658][T10810] device wg2 left promiscuous mode [ 262.963071][T10812] device wg2 entered promiscuous mode [ 263.142680][T10822] device sit0 entered promiscuous mode [ 264.121926][T10876] device sit0 left promiscuous mode [ 264.133583][T10871] device pim6reg1 entered promiscuous mode [ 264.206015][T10876] device sit0 entered promiscuous mode [ 264.323855][T10877] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.343400][T10877] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.361527][T10877] device bridge_slave_0 entered promiscuous mode [ 264.378208][T10877] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.388319][T10877] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.417550][T10877] device bridge_slave_1 entered promiscuous mode [ 264.567765][T10877] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.574842][T10877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.582125][T10877] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.589146][T10877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.613943][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.625248][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.681470][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.697957][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.766416][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.773492][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.802773][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.811226][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.818281][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.826240][T10907] device wg2 left promiscuous mode [ 264.833532][T10907] syz.2.2890[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.833576][T10907] syz.2.2890[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.846356][T10907] syz.2.2890[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.851435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.859125][T10907] syz.2.2890[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.889888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.922194][T10907] device wg2 entered promiscuous mode [ 264.942851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.985952][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.997914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.007702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.016676][T10877] device veth0_vlan entered promiscuous mode [ 265.108448][T10877] device veth1_macvtap entered promiscuous mode [ 265.142088][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.165722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.190580][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.285526][T10926] device pim6reg1 entered promiscuous mode [ 265.298140][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.311706][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.320214][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.328828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.392956][ T336] GPL: port 1(erspan0) entered disabled state [ 265.412455][ T336] device erspan0 left promiscuous mode [ 265.417933][ T336] GPL: port 1(erspan0) entered disabled state [ 265.913199][T10948] device veth0_vlan left promiscuous mode [ 265.942149][T10948] device veth0_vlan entered promiscuous mode [ 266.032010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.108314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.125148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.293980][ T336] device bridge_slave_1 left promiscuous mode [ 266.300213][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.321605][ T336] device bridge_slave_0 left promiscuous mode [ 266.327893][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.998971][T10982] : renamed from team_slave_1 [ 267.321170][T10997] : renamed from syzkaller0 [ 268.412388][T11060] bridge0: port 3(veth1_to_batadv) entered blocking state [ 268.419551][T11060] bridge0: port 3(veth1_to_batadv) entered disabled state [ 268.561302][T11060] device veth1_to_batadv entered promiscuous mode [ 268.589033][T11060] bridge0: port 3(veth1_to_batadv) entered blocking state [ 268.596292][T11060] bridge0: port 3(veth1_to_batadv) entered forwarding state [ 269.741975][T11143] device syzkaller0 entered promiscuous mode [ 270.633639][T11200] device sit0 left promiscuous mode [ 270.743098][T11205] device sit0 entered promiscuous mode [ 272.859176][T11332] device sit0 left promiscuous mode [ 273.704824][T11366] device pim6reg1 entered promiscuous mode [ 274.693864][T11431] device veth1_macvtap left promiscuous mode [ 274.738528][T11431] device sit0 entered promiscuous mode [ 275.770935][T11500] device veth0_vlan left promiscuous mode [ 275.781979][T11500] device veth0_vlan entered promiscuous mode [ 275.820455][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.838956][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.857061][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.090047][T11523] device pim6reg1 entered promiscuous mode [ 277.230482][T11607] device pim6reg1 entered promiscuous mode [ 277.827652][T11628] device syzkaller0 entered promiscuous mode [ 278.778847][T11662] sock: sock_set_timeout: `syz.6.3104' (pid 11662) tries to set negative timeout [ 280.324392][T11731] device sit0 entered promiscuous mode [ 280.992930][T11770] device sit0 left promiscuous mode [ 281.066541][T11770] device sit0 entered promiscuous mode [ 281.570969][T11798] device wg2 entered promiscuous mode [ 282.154472][T11811] Q6\bY4: renamed from lo [ 282.220695][T11813] device pim6reg1 entered promiscuous mode [ 282.359515][T11835] device syzkaller0 entered promiscuous mode [ 282.730710][T11864] device syzkaller0 entered promiscuous mode [ 282.759954][T11857] device sit0 left promiscuous mode [ 283.584171][T11891] device pim6reg1 entered promiscuous mode [ 283.597904][T11887] ref_ctr_offset mismatch. inode: 0x952 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 283.690843][T11905] syz.0.3169[11905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.690893][T11905] syz.0.3169[11905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.016341][T11917] device syzkaller0 entered promiscuous mode [ 286.079013][T11988] device wg2 left promiscuous mode [ 286.727152][ T24] audit: type=1400 audit(1764134615.140:166): avc: denied { create } for pid=12015 comm="syz.0.3199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 287.842405][T12051] bridge0: port 3(veth1_to_batadv) entered disabled state [ 287.851627][T12051] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.863622][T12051] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.983435][T12063] device veth1_to_batadv left promiscuous mode [ 287.990028][T12063] bridge0: port 3(veth1_to_batadv) entered disabled state [ 288.007197][T12063] device bridge_slave_1 left promiscuous mode [ 288.013492][T12063] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.021851][T12063] device bridge_slave_0 left promiscuous mode [ 288.028562][T12063] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.121054][T12074] @: renamed from bond_slave_0 [ 288.429595][T12068] device syzkaller0 entered promiscuous mode [ 289.429071][T12142] syz.6.3231[12142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.429123][T12142] syz.6.3231[12142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.928409][T12193] device pim6reg1 entered promiscuous mode [ 290.448927][T12237] device sit0 entered promiscuous mode [ 291.346128][T12276] device syzkaller0 entered promiscuous mode [ 293.117442][T12337] syzkaller0: refused to change device tx_queue_len [ 293.127133][T12334] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 293.135112][T12334] syzkaller0: linktype set to 0 [ 293.217728][T12355] device syzkaller0 entered promiscuous mode [ 293.378585][T12360] device pim6reg1 entered promiscuous mode [ 293.474234][T12374] device syzkaller0 entered promiscuous mode [ 295.757579][T12498] device sit0 left promiscuous mode [ 295.842660][T12510] device pim6reg1 entered promiscuous mode [ 296.068588][T12545] device sit0 left promiscuous mode [ 296.300449][T12549] device sit0 entered promiscuous mode [ 296.695626][T12559] Q6\bY4: renamed from lo [ 297.036471][T12604] device sit0 entered promiscuous mode [ 297.695880][T12623] device pim6reg1 entered promiscuous mode [ 299.211410][T12688] device sit0 left promiscuous mode [ 300.925725][T12778] device pim6reg1 entered promiscuous mode [ 301.564175][T12802] device sit0 entered promiscuous mode [ 301.621413][ T24] audit: type=1400 audit(1764134630.040:167): avc: denied { create } for pid=12803 comm="syz.6.3416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 301.698786][T12806] device pim6reg1 entered promiscuous mode [ 302.042469][T12828] device pim6reg1 entered promiscuous mode [ 302.692169][T12877] device syzkaller0 entered promiscuous mode [ 303.270540][T12902] device veth0_vlan left promiscuous mode [ 303.320726][T12902] device veth0_vlan entered promiscuous mode [ 303.342462][T12918] device syzkaller0 entered promiscuous mode [ 303.353719][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.362091][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.371821][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.926746][T12958] tun0: tun_chr_ioctl cmd 1074812118 [ 303.984660][T12960] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 304.015304][T12960] device syzkaller0 entered promiscuous mode [ 304.532248][T12992] device veth1_macvtap left promiscuous mode [ 304.590402][T12992] device macsec0 entered promiscuous mode [ 306.292937][T13050] device syzkaller0 entered promiscuous mode [ 310.620025][T13131] device syzkaller0 entered promiscuous mode [ 311.038889][T13159] device syzkaller0 entered promiscuous mode [ 311.053137][ T4649] syzkaller0: tun_net_xmit 48 [ 312.721070][T13264] device veth0_vlan left promiscuous mode [ 312.732901][T13264] device veth0_vlan entered promiscuous mode [ 317.139713][T13344] device veth1_macvtap left promiscuous mode [ 318.304211][T13373] device pim6reg1 entered promiscuous mode [ 319.033767][T13411] device pim6reg1 entered promiscuous mode [ 320.502399][T13452] device pim6reg1 entered promiscuous mode [ 327.265204][T13673] device syzkaller0 entered promiscuous mode [ 328.181661][ T24] audit: type=1400 audit(1764134656.600:168): avc: denied { read } for pid=13756 comm="syz.3.3678" name="cgroup.subtree_control" dev="cgroup2" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 328.300574][T13766] device syzkaller0 entered promiscuous mode [ 328.639691][T13777] device pimreg0 entered promiscuous mode [ 328.821321][T13781] device wg2 entered promiscuous mode [ 329.013782][T13790] device wg2 left promiscuous mode [ 329.299530][T13803] : renamed from vlan0 [ 329.419419][T13827] device sit0 left promiscuous mode [ 329.444658][T13829] device pim6reg1 entered promiscuous mode [ 329.465595][T13827] device sit0 entered promiscuous mode [ 329.639035][T13835] device wg2 entered promiscuous mode [ 329.651058][T13841] device sit0 left promiscuous mode [ 329.710371][T13853] tun0: tun_chr_ioctl cmd 1074025678 [ 329.715686][T13853] tun0: group set to 1 [ 329.721029][T13850] device pim6reg1 entered promiscuous mode [ 329.807346][T13860] device veth0_vlan left promiscuous mode [ 329.813732][T13860] device veth0_vlan entered promiscuous mode [ 329.824864][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.835984][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.846490][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.722471][T13914] device syzkaller0 entered promiscuous mode [ 333.930996][T14034] syz.0.3755[14034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.931074][T14034] syz.0.3755[14034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.980923][T14042] device pim6reg1 entered promiscuous mode [ 334.192069][T14048] device pim6reg1 entered promiscuous mode [ 334.654334][T14062] device syzkaller0 entered promiscuous mode [ 336.452306][T14124] : renamed from team_slave_1 [ 336.511971][T14135] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 336.565066][T14135] syzkaller0: persist disabled [ 337.179223][T14163] device syzkaller0 entered promiscuous mode [ 337.578045][T14166] : renamed from vlan0 [ 338.046638][T14209] device syzkaller0 entered promiscuous mode [ 338.478975][T14245] device sit0 entered promiscuous mode [ 339.782578][T14272] device syzkaller0 entered promiscuous mode [ 340.232263][T14278] device syzkaller0 entered promiscuous mode [ 340.526729][T14297] : renamed from vlan1 [ 341.035208][T14341] syz.0.3840[14341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.035260][T14341] syz.0.3840[14341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.185965][T14358] syz.3.3844[14358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.389774][T14358] syz.3.3844[14358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.444430][T14352] device syzkaller0 entered promiscuous mode [ 341.555200][T14379] device pim6reg1 entered promiscuous mode [ 341.649860][T14392] device pim6reg1 entered promiscuous mode [ 343.137118][T14436] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 343.150386][T14436] syzkaller0: linktype set to 1 [ 343.178528][T14436] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 343.251923][T14436] syzkaller0: tun_chr_ioctl cmd 35108 [ 343.280064][T14440] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 343.300362][T14436] syzkaller0: tun_chr_ioctl cmd 1074025672 [ 343.317937][T14436] syzkaller0: ignored: set checksum disabled [ 343.639742][T14454] device pim6reg1 entered promiscuous mode [ 345.279267][T14545] device sit0 left promiscuous mode [ 346.041172][T14589] : renamed from vlan1 [ 347.506296][T14640] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.515646][T14640] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.622791][T14656] device syzkaller0 entered promiscuous mode [ 348.045476][T14667] device syzkaller0 entered promiscuous mode [ 349.101936][T14741] syz.5.3952[14741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.101988][T14741] syz.5.3952[14741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.443365][T14760] device pim6reg1 entered promiscuous mode [ 349.874762][T14776] device sit0 entered promiscuous mode [ 350.597099][T14835] device pim6reg1 entered promiscuous mode [ 350.788230][T14851] device veth0_vlan left promiscuous mode [ 350.838836][T14851] device veth0_vlan entered promiscuous mode [ 350.911504][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.924892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.945032][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.425936][T14877] device pim6reg1 entered promiscuous mode [ 351.738006][ T24] audit: type=1400 audit(1764134680.150:169): avc: denied { mounton } for pid=14891 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 351.968105][T14891] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.050362][T14891] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.058309][T14891] device bridge_slave_0 entered promiscuous mode [ 352.119998][T14891] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.127493][T14891] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.135179][T14891] device bridge_slave_1 entered promiscuous mode [ 352.530679][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.565543][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.580660][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.589047][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.671326][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.678501][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.695684][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.708967][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.722979][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.730022][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.750370][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 352.781138][T14940] device wg2 left promiscuous mode [ 352.808742][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.883068][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.939259][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.993998][T14891] device veth0_vlan entered promiscuous mode [ 353.048695][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.057187][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.064709][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.202041][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.210405][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 353.221473][T14891] device veth1_macvtap entered promiscuous mode [ 353.366329][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 353.380956][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 353.407718][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.440490][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 353.448780][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.473040][ T24] audit: type=1400 audit(1764134681.890:170): avc: denied { unmount } for pid=14891 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 354.390483][T15033] : renamed from team_slave_1 [ 354.729399][T15064] device syzkaller0 entered promiscuous mode [ 355.051146][T15081] device veth0_vlan left promiscuous mode [ 355.086433][T15081] device veth0_vlan entered promiscuous mode [ 355.117755][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.126960][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 355.135457][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 355.169635][T15084] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 355.215711][T15084] device syzkaller0 entered promiscuous mode [ 355.554762][T15145] syz.0.4062[15145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.554807][T15145] syz.0.4062[15145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.681443][T15170] device pim6reg1 entered promiscuous mode [ 355.868204][T15178] device pim6reg1 entered promiscuous mode [ 355.954375][T15178] device syzkaller0 entered promiscuous mode [ 356.044006][T15192] device veth0_vlan left promiscuous mode [ 356.050926][T15192] device veth0_vlan entered promiscuous mode [ 356.158505][T15199] device wg2 left promiscuous mode [ 356.170068][T15199] device wg2 entered promiscuous mode [ 356.291803][T15209] device sit0 entered promiscuous mode [ 357.823446][ T24] audit: type=1400 audit(1764134686.240:171): avc: denied { create } for pid=15308 comm="syz.2.4108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 358.417641][T15316] device veth0_vlan left promiscuous mode [ 358.438461][T15316] device veth0_vlan entered promiscuous mode [ 358.565067][T15321] device sit0 left promiscuous mode [ 358.722369][T15326] device sit0 entered promiscuous mode [ 361.265756][T15449] device sit0 entered promiscuous mode [ 361.704379][T15459] device syzkaller0 entered promiscuous mode [ 362.459912][T15491] device macsec0 left promiscuous mode [ 362.565931][T15491] device macsec0 entered promiscuous mode [ 362.572608][T15491] device veth1_macvtap entered promiscuous mode [ 367.048473][T15657] device syzkaller0 entered promiscuous mode [ 368.022016][T15694] device syzkaller0 entered promiscuous mode [ 368.211544][T15727] device sit0 left promiscuous mode [ 368.324439][T15727] device sit0 entered promiscuous mode [ 368.708189][T15744] device syzkaller0 entered promiscuous mode [ 370.036693][T15785] device wg2 entered promiscuous mode [ 370.053019][T15785] device ip6gretap0 entered promiscuous mode [ 370.397027][T15801] device wg2 left promiscuous mode [ 370.414756][T15801] device wg2 entered promiscuous mode [ 370.671459][T15803] device syzkaller0 entered promiscuous mode [ 373.077349][T15888] device pim6reg1 entered promiscuous mode [ 374.762202][T15976] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.769457][T15976] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.894117][T15984] device bridge_slave_1 left promiscuous mode [ 374.901637][T15984] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.951626][T15984] device bridge_slave_0 left promiscuous mode [ 374.980786][T15984] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.058172][T15996] device wg2 entered promiscuous mode [ 375.344502][T16010] device sit0 left promiscuous mode [ 375.395230][T16010] device sit0 entered promiscuous mode [ 375.469217][T16023] device pim6reg1 entered promiscuous mode [ 376.374154][T16076] device veth0_vlan left promiscuous mode [ 376.386369][T16076] device veth0_vlan entered promiscuous mode [ 377.434271][T16126] device syzkaller0 entered promiscuous mode [ 377.863147][T16156] device syzkaller0 entered promiscuous mode [ 378.244335][T16169] Q6\bY4: renamed from lo [ 378.426886][T16205] device sit0 entered promiscuous mode [ 378.863596][T16232] device sit0 left promiscuous mode [ 378.903772][T16238] device pim6reg1 entered promiscuous mode [ 379.265087][T16264] device veth0_vlan left promiscuous mode [ 379.284770][T16264] device veth0_vlan entered promiscuous mode [ 379.725726][T16287] device sit0 entered promiscuous mode [ 380.354086][T16306] device syzkaller0 entered promiscuous mode [ 380.437539][T16312] syz.6.4392[16312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.437585][T16312] syz.6.4392[16312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.511864][T16312] device syzkaller0 entered promiscuous mode [ 381.682588][T16361] device pim6reg1 entered promiscuous mode [ 381.803327][T16363] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.814994][T16368] cgroup: fork rejected by pids controller in /syz5 [ 381.842307][T16363] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.854680][T16363] device bridge_slave_0 entered promiscuous mode [ 381.906091][T16363] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.919937][T16363] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.928238][T16363] device bridge_slave_1 entered promiscuous mode [ 381.983221][T16363] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.990282][T16363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.997526][T16363] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.004568][T16363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.061839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.069680][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.078028][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.130842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.139437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.147807][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.154859][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.163437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.171799][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.179964][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.187005][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.260719][T16363] device veth0_vlan entered promiscuous mode [ 382.268241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.277838][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.285804][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 382.293872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.301846][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.310026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.318283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.326553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.334572][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.341966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.445088][T16374] device syzkaller0 entered promiscuous mode [ 382.476598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 382.485382][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 382.508778][T16363] device veth1_macvtap entered promiscuous mode [ 382.539517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.547321][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 382.555788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.581505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 382.589705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 382.665998][T16372] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.683187][T16372] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.693823][T16372] device bridge_slave_0 entered promiscuous mode [ 382.734892][T16372] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.742426][T16372] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.750190][T16372] device bridge_slave_1 entered promiscuous mode [ 382.864699][T16372] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.871779][T16372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.879045][T16372] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.886220][T16372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.910659][T16396] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 382.937302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.945499][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.955435][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.965218][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.973536][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.980577][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.012739][T16372] device veth0_vlan entered promiscuous mode [ 383.019660][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 383.027968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.040144][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.050956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.058726][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.070566][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.077596][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.087344][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.095379][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.116736][T16372] device veth1_macvtap entered promiscuous mode [ 383.179271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 383.187718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.196728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.226722][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 383.253283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.274438][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 383.300556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 383.318915][T16417] device wg2 left promiscuous mode [ 383.340662][T16424] syz.3.4427[16424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.340736][T16424] syz.3.4427[16424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.416628][ T304] device bridge_slave_1 left promiscuous mode [ 383.500549][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.508212][ T304] device bridge_slave_0 left promiscuous mode [ 383.514535][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.529880][ T304] device veth0_vlan left promiscuous mode [ 383.537296][ T304] device veth1_macvtap left promiscuous mode [ 383.544090][ T304] device veth0_vlan left promiscuous mode [ 383.673407][T16420] device pim6reg1 entered promiscuous mode [ 383.696185][T16429] device macsec0 entered promiscuous mode [ 383.763917][T16431] device syzkaller0 entered promiscuous mode [ 384.354266][T16450] device syzkaller0 entered promiscuous mode [ 385.672585][T16497] device sit0 left promiscuous mode [ 385.832544][T16497] device sit0 entered promiscuous mode [ 386.085273][T16535] device syzkaller0 entered promiscuous mode [ 386.448258][T16544] device pim6reg1 entered promiscuous mode [ 386.828640][T16562] device veth1_macvtap left promiscuous mode [ 387.813805][T16594] device syzkaller0 entered promiscuous mode [ 388.114662][T16619] device pim6reg1 entered promiscuous mode [ 388.224193][T16643] device pim6reg1 entered promiscuous mode [ 388.371967][T16654] cgroup: fork rejected by pids controller in /syz0 [ 388.585562][T16770] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 388.591833][T16770] syzkaller0: linktype set to 1 [ 388.603406][T16770] syzkaller0: tun_chr_ioctl cmd 35108 [ 388.624672][T16770] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 388.854925][T16784] device pim6reg1 entered promiscuous mode [ 388.909308][T16777] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.916775][T16777] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.924582][T16777] device bridge_slave_0 entered promiscuous mode [ 388.954437][T16777] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.963291][T16777] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.002235][T16777] device bridge_slave_1 entered promiscuous mode [ 389.214071][T16805] device pim6reg1 entered promiscuous mode [ 389.582607][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 389.598078][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.679354][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 389.738512][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.797679][ T779] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.804777][ T779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.862524][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 389.871019][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.879242][ T779] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.886287][ T779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.893991][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 389.902148][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.910092][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 389.959663][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 389.967989][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.985493][T16777] device veth0_vlan entered promiscuous mode [ 390.002316][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 390.010954][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.019299][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 390.027400][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.056573][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.064201][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.072213][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 390.080765][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.106791][T16777] device veth1_macvtap entered promiscuous mode [ 390.122076][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.129976][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.138292][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.146662][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 390.155472][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.941557][T16884] device wg2 entered promiscuous mode [ 392.426038][T16945] device syzkaller0 entered promiscuous mode [ 392.742533][ T304] device veth1_macvtap left promiscuous mode [ 393.241640][T16980] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.248855][T16980] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.775940][T16994] device veth0_vlan left promiscuous mode [ 393.802048][T16994] device veth0_vlan entered promiscuous mode [ 393.814437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.842172][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 393.853992][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 396.410688][T17074] device pim6reg1 entered promiscuous mode [ 398.212619][T17118] device pim6reg1 entered promiscuous mode [ 398.288512][T17118] device veth1_macvtap left promiscuous mode [ 400.282436][T17225] device pim6reg1 entered promiscuous mode [ 400.353859][T17238] syz.0.4627[17238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.353915][T17238] syz.0.4627[17238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.637204][T17245] device veth0_vlan left promiscuous mode [ 400.655166][T17245] device veth0_vlan entered promiscuous mode [ 400.767165][T17249] : renamed from vlan0 [ 401.199971][T17274] bridge0: port 3(ip6gretap0) entered blocking state [ 401.318169][T17274] bridge0: port 3(ip6gretap0) entered disabled state [ 401.399980][T17274] device ip6gretap0 entered promiscuous mode [ 401.572684][T17282] : renamed from vlan0 [ 402.486024][T17335] tap0: tun_chr_ioctl cmd 1074025677 [ 402.570834][T17335] tap0: linktype set to 776 [ 403.954324][T17425] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.964109][T17425] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.528533][T17434] device syzkaller0 entered promiscuous mode [ 404.556624][T17446] device veth0_vlan left promiscuous mode [ 404.582465][T17446] device veth0_vlan entered promiscuous mode [ 404.660328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.681288][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 404.700810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.288822][T17553] syz.2.4709[17553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.288867][T17553] syz.2.4709[17553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.597932][T17553] device veth0_vlan left promiscuous mode [ 407.703251][T17553] device veth0_vlan entered promiscuous mode [ 407.775321][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.788614][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.833178][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.035711][T17578] device syzkaller0 entered promiscuous mode [ 408.325446][ T24] audit: type=1400 audit(1764134736.740:172): avc: denied { setattr } for pid=17589 comm="syz.5.4718" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 409.113975][T17631] device veth0_vlan left promiscuous mode [ 409.188005][T17631] device veth0_vlan entered promiscuous mode [ 410.399162][T17708] device syzkaller0 entered promiscuous mode [ 410.423322][T17710] device sit0 left promiscuous mode [ 411.154317][T17728] device syzkaller0 entered promiscuous mode [ 411.493078][T17732] device syzkaller0 entered promiscuous mode [ 412.028551][T17770] device syzkaller0 entered promiscuous mode [ 412.035680][T17762] device sit0 entered promiscuous mode [ 412.215042][T17789] device pim6reg1 entered promiscuous mode [ 412.246152][T17786] device syzkaller0 entered promiscuous mode [ 414.006072][T17851] device syzkaller0 entered promiscuous mode [ 414.273901][T17856] device sit0 entered promiscuous mode [ 414.604986][T17869] device syzkaller0 entered promiscuous mode [ 415.760791][T17901] device sit0 left promiscuous mode [ 417.205684][T17972] device veth0_vlan left promiscuous mode [ 417.287883][T17972] device veth0_vlan entered promiscuous mode [ 417.397088][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.420557][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 417.443728][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.558453][T17976] device syzkaller0 entered promiscuous mode [ 417.601776][T17980] device sit0 left promiscuous mode [ 418.501427][T18051] device sit0 left promiscuous mode [ 418.515632][T18051] device sit0 entered promiscuous mode [ 418.596488][T18062] device wg2 entered promiscuous mode [ 420.219580][T18154] device macsec0 entered promiscuous mode [ 420.289808][T18167] device veth0_vlan left promiscuous mode [ 420.330169][T18167] device veth0_vlan entered promiscuous mode [ 420.557859][T18179] device syzkaller0 entered promiscuous mode [ 421.799323][T18209] device syzkaller0 entered promiscuous mode [ 422.295837][T18223] device veth0_vlan left promiscuous mode [ 422.314054][T18223] device veth0_vlan entered promiscuous mode [ 422.337654][T18221] device veth0_vlan left promiscuous mode [ 422.350390][T18221] device veth0_vlan entered promiscuous mode [ 422.389382][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.398641][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 422.406266][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 422.413872][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.422745][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.430276][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.807381][T18310] device pim6reg1 entered promiscuous mode [ 425.683072][T18389] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 425.688929][T18389] syzkaller0: linktype set to 1 [ 426.009761][T18422] syz.5.4957[18422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.009821][T18422] syz.5.4957[18422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.096259][ T24] audit: type=1400 audit(1764134755.510:173): avc: denied { attach_queue } for pid=18435 comm="syz.5.4960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 427.350540][T18447] device veth0_vlan left promiscuous mode [ 427.365797][T18447] device veth0_vlan entered promiscuous mode [ 428.051222][T18462] device pim6reg1 entered promiscuous mode [ 428.640988][T18491] device veth1_macvtap left promiscuous mode [ 428.680259][T18491] device macsec0 entered promiscuous mode [ 429.923730][T18514] device wg2 entered promiscuous mode [ 434.132294][ T24] audit: type=1400 audit(1764134762.540:174): avc: denied { create } for pid=18576 comm="syz.2.5002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 437.835351][T18645] device syzkaller0 entered promiscuous mode [ 439.977703][T18675] device sit0 left promiscuous mode [ 440.031038][T18676] device sit0 entered promiscuous mode [ 441.570607][T18693] device sit0 entered promiscuous mode [ 442.313101][T18703] device pim6reg1 entered promiscuous mode [ 442.756708][T18719] device veth0_vlan left promiscuous mode [ 442.850103][T18719] device veth0_vlan entered promiscuous mode [ 446.546905][T18785] syz.0.5060[18785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.546981][T18785] syz.0.5060[18785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.928027][T18800] syz.6.5065[18800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.989401][T18793] device syzkaller0 entered promiscuous mode [ 447.028972][T18801] syz.6.5065[18801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.029032][T18801] syz.6.5065[18801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.100716][T18800] syz.6.5065[18800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.782634][T18816] device sit0 entered promiscuous mode [ 453.106382][T18895] device pim6reg1 entered promiscuous mode [ 453.126284][T18894] device sit0 left promiscuous mode [ 453.192187][T18897] device sit0 entered promiscuous mode [ 456.890822][T18950] device sit0 left promiscuous mode [ 456.994876][T18946] device syzkaller0 entered promiscuous mode [ 457.052729][T18950] device sit0 entered promiscuous mode [ 460.050237][T18980] device wg2 entered promiscuous mode [ 460.542213][T18986] device syzkaller0 entered promiscuous mode [ 461.833194][T18997] device syzkaller0 entered promiscuous mode [ 462.796203][T19007] device syzkaller0 entered promiscuous mode [ 463.949957][T19036] device pim6reg1 entered promiscuous mode [ 464.409786][T19052] device sit0 entered promiscuous mode [ 464.933721][T19077] device pim6reg1 entered promiscuous mode [ 468.117430][T19103] device wg2 entered promiscuous mode [ 469.836045][T19174] device veth0_vlan left promiscuous mode [ 469.873843][T19174] device veth0_vlan entered promiscuous mode [ 470.908759][T19206] device syzkaller0 entered promiscuous mode [ 472.435996][T19348] device team_slave_1 entered promiscuous mode [ 472.577802][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 472.598055][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 473.364034][T19361] device syzkaller0 entered promiscuous mode [ 473.372637][T19368] device sit0 left promiscuous mode [ 473.384588][T19373] device sit0 entered promiscuous mode [ 473.977132][T19415] device pim6reg1 entered promiscuous mode [ 474.146241][T19431] device wg2 left promiscuous mode [ 474.237398][T19440] device macsec0 left promiscuous mode [ 474.427158][T19456] device veth1_macvtap entered promiscuous mode [ 474.441223][T19456] device macsec0 entered promiscuous mode [ 474.452648][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 474.642555][T19470] device pim6reg1 entered promiscuous mode [ 474.750385][T19476] device sit0 left promiscuous mode [ 475.030395][T19491] device veth0_vlan left promiscuous mode [ 475.050520][T19491] device veth0_vlan entered promiscuous mode [ 475.078037][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.109022][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 475.148724][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.352980][T19513] device sit0 left promiscuous mode [ 475.556903][T19519] device sit0 entered promiscuous mode [ 475.760868][T19528] device veth0_vlan left promiscuous mode [ 475.776497][T19528] device veth0_vlan entered promiscuous mode [ 476.015143][T19537] device syzkaller0 entered promiscuous mode [ 476.719686][T19587] : renamed from vlan0 [ 477.900437][T19637] device veth0_vlan left promiscuous mode [ 477.970582][T19637] device veth0_vlan entered promiscuous mode [ 479.766976][T19708] device syzkaller0 entered promiscuous mode [ 480.291577][T19728] device syzkaller0 entered promiscuous mode [ 495.277709][T19873] device pim6reg1 entered promiscuous mode [ 495.571047][T19908] : renamed from bond_slave_0 [ 495.783856][T19920] GPL: port 1(erspan0) entered blocking state [ 495.790030][T19920] GPL: port 1(erspan0) entered disabled state [ 495.796789][T19920] device erspan0 entered promiscuous mode [ 495.806880][T19919] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 495.818137][T19915] GPL: port 1(erspan0) entered blocking state [ 495.824352][T19915] GPL: port 1(erspan0) entered forwarding state [ 497.856641][T19973] device macsec0 left promiscuous mode [ 497.911743][T19970] device veth1_macvtap entered promiscuous mode [ 497.920398][T19970] device macsec0 entered promiscuous mode [ 498.135761][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.208228][T19978] device syzkaller0 entered promiscuous mode [ 498.725180][T20002] device sit0 left promiscuous mode [ 498.833759][T20011] device sit0 entered promiscuous mode [ 499.593943][T20049] device syzkaller0 entered promiscuous mode [ 499.632355][T20070] device veth0_vlan left promiscuous mode [ 499.639121][T20070] device veth0_vlan entered promiscuous mode [ 499.684550][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.694112][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 499.701928][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.841458][T20076] device syzkaller0 entered promiscuous mode [ 500.163688][ T24] audit: type=1400 audit(1764134828.580:175): avc: denied { create } for pid=20095 comm="syz.3.5439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 503.679858][T20198] device syzkaller0 entered promiscuous mode [ 503.810299][T20201] device bridge0 entered promiscuous mode [ 505.660683][T20294] device syzkaller0 entered promiscuous mode [ 506.357175][T20320] device syzkaller0 entered promiscuous mode [ 507.319427][T20335] device syzkaller0 entered promiscuous mode [ 507.921436][T20381] device veth1_macvtap left promiscuous mode [ 507.941519][T20381] device macsec0 left promiscuous mode [ 508.068076][T20381] device veth1_macvtap entered promiscuous mode [ 508.076842][T20381] device macsec0 entered promiscuous mode [ 508.093541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 508.791281][T20419] device syzkaller0 entered promiscuous mode [ 509.639919][T20464] device syzkaller0 entered promiscuous mode [ 510.130247][T20490] device sit0 left promiscuous mode [ 510.437568][T20498] device veth1_macvtap entered promiscuous mode [ 510.481750][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 513.932819][T20640] device syzkaller0 entered promiscuous mode [ 514.200588][T20655] : renamed from team_slave_1 [ 515.053403][T20694] syz.3.5600[20694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.053486][T20694] syz.3.5600[20694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.659792][T20747] device pim6reg1 entered promiscuous mode [ 515.712135][T20757] device veth0_vlan left promiscuous mode [ 515.746628][T20757] device veth0_vlan entered promiscuous mode [ 515.803469][T20762] device veth0_vlan left promiscuous mode [ 515.811612][T20762] device veth0_vlan entered promiscuous mode [ 515.821381][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.831942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 515.851857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.863064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.871881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 515.879519][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.915588][T20774] device syzkaller0 entered promiscuous mode [ 515.974702][T20785] device pim6reg1 entered promiscuous mode [ 516.054207][T20792] device veth0_vlan left promiscuous mode [ 516.060931][T20792] device veth0_vlan entered promiscuous mode [ 516.410619][T20803] device pim6reg1 entered promiscuous mode [ 516.873249][T20826] device sit0 entered promiscuous mode [ 517.470107][T20841] device pim6reg1 entered promiscuous mode [ 517.707308][T20851] device veth0_vlan left promiscuous mode [ 517.714992][T20851] device veth0_vlan entered promiscuous mode [ 517.729372][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.749451][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 517.753909][T20855] syz.6.5650[20855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.757032][T20855] syz.6.5650[20855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.770270][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 519.817434][T20917] device wg2 left promiscuous mode [ 519.958393][T20917] device wg2 entered promiscuous mode [ 520.000971][T20930] device syzkaller0 entered promiscuous mode [ 520.134375][T20935] device syzkaller0 entered promiscuous mode [ 521.072935][T21016] device wg2 left promiscuous mode [ 524.217711][T21156] device syzkaller0 entered promiscuous mode [ 524.530498][T21166] device pim6reg1 entered promiscuous mode [ 524.968493][T21180] device veth0_vlan left promiscuous mode [ 524.999628][T21180] device veth0_vlan entered promiscuous mode [ 525.057090][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 525.074162][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 525.094070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 525.253486][T21193] device syzkaller0 entered promiscuous mode [ 525.651006][T21209] device pim6reg1 entered promiscuous mode [ 526.841215][T21271] device sit0 left promiscuous mode [ 526.947826][T21271] device sit0 entered promiscuous mode [ 528.110606][T21321] device syzkaller0 entered promiscuous mode [ 528.513038][T21348] device syzkaller0 entered promiscuous mode [ 529.163626][T21370] device syzkaller0 entered promiscuous mode [ 532.080725][T21466] geneve1: tun_chr_ioctl cmd 1074025672 [ 532.110303][T21466] geneve1: ignored: set checksum enabled [ 532.370943][T21472] device syzkaller0 entered promiscuous mode [ 532.593612][T21493] device veth0_vlan left promiscuous mode [ 532.625709][T21493] device veth0_vlan entered promiscuous mode [ 534.414395][T21552] device syzkaller0 entered promiscuous mode [ 535.374615][T21633] device veth0_vlan left promiscuous mode [ 535.381227][T21633] device veth0_vlan entered promiscuous mode [ 535.392177][T21636] device pim6reg1 entered promiscuous mode [ 535.398553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 535.408590][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 535.416716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 535.562067][T21643] device syzkaller0 entered promiscuous mode [ 535.774776][T21651] device bridge_slave_1 left promiscuous mode [ 535.781249][T21651] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.788713][T21651] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.011088][T21684] device wg2 left promiscuous mode [ 536.200617][T21687] device veth1_macvtap left promiscuous mode [ 536.206976][T21687] device macsec0 left promiscuous mode [ 536.359362][T21698] device veth1_macvtap entered promiscuous mode [ 536.431323][T21698] device macsec0 entered promiscuous mode [ 536.633264][T21719] device veth1_macvtap left promiscuous mode [ 538.015941][T21786] device pim6reg1 entered promiscuous mode [ 540.122621][T21863] device veth0_vlan left promiscuous mode [ 540.131007][T21863] device veth0_vlan entered promiscuous mode [ 540.772540][T21893] syz.2.5939[21893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.772598][T21893] syz.2.5939[21893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.209007][T21893] device veth0_vlan left promiscuous mode [ 541.311054][T21893] device veth0_vlan entered promiscuous mode [ 541.980562][ T24] audit: type=1400 audit(1764134870.360:176): avc: denied { create } for pid=21935 comm="syz.2.5950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 542.504419][T21970] device wg2 entered promiscuous mode [ 543.256128][T22004] device dummy0 entered promiscuous mode [ 543.586113][T22057] device syzkaller0 entered promiscuous mode [ 544.148910][T22087] device veth0_vlan left promiscuous mode [ 544.167147][T22087] device veth0_vlan entered promiscuous mode [ 544.196163][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.205908][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.213605][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.404664][T22103] device syzkaller0 entered promiscuous mode [ 545.494952][T22148] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.502506][T22148] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.509997][T22148] device bridge_slave_0 entered promiscuous mode [ 545.517307][T22148] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.524693][T22148] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.532557][T22148] device bridge_slave_1 entered promiscuous mode [ 545.658206][T22148] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.665466][T22148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.672743][T22148] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.679759][T22148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.736850][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 545.744643][ T779] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.751958][ T779] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.786434][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.795105][ T779] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.802158][ T779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.819448][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.827898][ T779] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.834978][ T779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.842537][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.850797][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.871581][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 545.934541][T22148] device veth0_vlan entered promiscuous mode [ 545.964581][T22181] device veth1_macvtap entered promiscuous mode [ 545.973491][T22181] device macsec0 entered promiscuous mode [ 546.018181][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.034310][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.080436][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.134561][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.148898][T22148] device veth1_macvtap entered promiscuous mode [ 546.210792][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.219241][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.227501][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.305914][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 546.314442][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 546.323169][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 546.331604][ T779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 546.586271][T22193] : renamed from team_slave_1 [ 547.182171][T22231] device veth1_macvtap left promiscuous mode [ 547.188489][T22231] device macsec0 left promiscuous mode [ 547.191137][ T24] audit: type=1400 audit(1764134875.600:177): avc: denied { create } for pid=22237 comm="syz.0.6038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 547.299987][ T49] device veth1_macvtap left promiscuous mode [ 547.311737][ T49] device veth0_vlan left promiscuous mode [ 549.030253][T22301] device veth0_vlan left promiscuous mode [ 549.058667][T22301] device veth0_vlan entered promiscuous mode [ 550.384040][T22383] device veth1_macvtap left promiscuous mode [ 550.390281][T22383] device macsec0 left promiscuous mode [ 551.336672][T22398] device veth0_vlan left promiscuous mode [ 551.349978][T22398] device veth0_vlan entered promiscuous mode [ 551.386872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.405325][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.413086][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 554.340640][T22522] device wg2 left promiscuous mode [ 556.016089][T22581] device veth1_macvtap left promiscuous mode [ 556.022576][T22581] device macsec0 left promiscuous mode [ 556.089663][T22589] device veth1_macvtap entered promiscuous mode [ 556.096022][T22589] device macsec0 entered promiscuous mode [ 556.139981][T22588] device sit0 left promiscuous mode [ 556.159191][T22593] device sit0 entered promiscuous mode [ 559.861920][T22763] device veth1_macvtap entered promiscuous mode [ 559.948063][T22763] device macsec0 entered promiscuous mode [ 560.035739][T22765] device veth1_macvtap left promiscuous mode [ 560.774728][T22811] device wg2 left promiscuous mode [ 561.612576][T22859] device syzkaller0 entered promiscuous mode [ 563.725130][T22915] device sit0 left promiscuous mode [ 565.192973][T22989] device ip6gretap0 left promiscuous mode [ 565.224470][T22989] bridge0: port 3(ip6gretap0) entered disabled state [ 565.304984][T22989] device bridge_slave_1 left promiscuous mode [ 565.313934][T22989] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.321569][T22989] device bridge_slave_0 left promiscuous mode [ 565.327707][T22989] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.043680][T23022] device wg2 entered promiscuous mode [ 566.295257][T23022] device syzkaller0 entered promiscuous mode [ 566.727036][T23064] syz.0.6265[23064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.727088][T23064] syz.0.6265[23064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.037981][T23148] device pim6reg1 entered promiscuous mode [ 568.506476][T23189] device pim6reg1 entered promiscuous mode [ 569.093396][T23245] device syzkaller0 entered promiscuous mode [ 569.506467][T23269] device pim6reg1 entered promiscuous mode [ 569.798632][T23286] device syzkaller0 entered promiscuous mode [ 570.320013][T23304] device pim6reg1 entered promiscuous mode [ 570.414447][T23302] device wg2 entered promiscuous mode [ 570.902448][T23331] syz.3.6344[23331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.902499][T23331] syz.3.6344[23331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.423343][T23331] device veth0_vlan left promiscuous mode [ 571.524262][T23331] device veth0_vlan entered promiscuous mode [ 571.976102][T23380] device pim6reg1 entered promiscuous mode [ 572.001689][T23383] device syzkaller0 entered promiscuous mode [ 572.215079][T23392] device sit0 entered promiscuous mode [ 573.524937][T23417] device syzkaller0 entered promiscuous mode [ 575.249898][T23513] device veth0_vlan left promiscuous mode [ 575.266545][T23513] device veth0_vlan entered promiscuous mode [ 575.363773][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 575.372668][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 575.380553][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.435723][T23548] device syzkaller0 entered promiscuous mode [ 577.798424][T23574] device wg2 left promiscuous mode [ 577.850519][T23575] device wg2 entered promiscuous mode [ 579.097255][T23598] device veth0_vlan left promiscuous mode [ 579.205161][T23598] device veth0_vlan entered promiscuous mode [ 579.371506][ T95] udevd[95]: worker [21294] terminated by signal 33 (Unknown signal 33) [ 579.539554][T23614] device syzkaller0 entered promiscuous mode [ 580.309293][T23664] device syzkaller0 entered promiscuous mode [ 580.321172][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 581.288795][T23719] device syzkaller0 entered promiscuous mode [ 581.405565][T23739] device pim6reg1 entered promiscuous mode [ 581.993340][T23755] device wg2 left promiscuous mode [ 582.671224][T23772] device syzkaller0 entered promiscuous mode [ 583.531787][T23811] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.539021][T23811] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.546907][T23811] device bridge0 left promiscuous mode [ 585.648619][T23868] device syzkaller0 entered promiscuous mode [ 587.006618][T23932] device pim6reg1 entered promiscuous mode [ 587.506074][T23965] device veth0_vlan left promiscuous mode [ 587.520961][T23965] device veth0_vlan entered promiscuous mode [ 587.818176][T23990] device sit0 left promiscuous mode [ 587.900219][T23990] device sit0 entered promiscuous mode [ 588.748869][T24039] device sit0 entered promiscuous mode [ 589.009801][T24049] syzkaller1: tun_chr_ioctl cmd 21731 [ 589.040341][T24049] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 589.164969][T24055] : renamed from vlan0 [ 591.078940][T24146] device sit0 left promiscuous mode [ 591.244203][T24150] device sit0 entered promiscuous mode [ 591.348429][T24162] device syzkaller0 entered promiscuous mode [ 591.382632][T24173] aaaaaaaaa: renamed from vlan1 [ 591.462249][T24194] device sit0 left promiscuous mode [ 593.050373][T24261] device pim6reg1 left promiscuous mode [ 593.288505][T24270] device wg2 left promiscuous mode [ 595.098934][T24344] device pim6reg1 entered promiscuous mode [ 595.162723][T24352] device syzkaller0 entered promiscuous mode [ 595.653501][T24373] device syzkaller0 entered promiscuous mode [ 596.084156][T24392] device pim6reg1 entered promiscuous mode [ 596.631916][T24407] device macsec0 entered promiscuous mode [ 598.752583][T24479] device wg2 entered promiscuous mode [ 599.721851][T24502] device pim6reg1 entered promiscuous mode [ 600.206564][T24510] device syzkaller0 entered promiscuous mode [ 601.610437][T24603] device pim6reg1 entered promiscuous mode [ 601.791562][T24611] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.798832][T24611] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.806457][T24611] device bridge_slave_0 entered promiscuous mode [ 601.819249][T24611] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.827975][T24611] bridge0: port 2(bridge_slave_1) entered disabled state [ 601.835594][T24611] device bridge_slave_1 entered promiscuous mode [ 601.945658][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 601.953498][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 601.971469][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 601.981426][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.989761][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.997596][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.007033][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 602.015487][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 602.024195][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.031259][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.039036][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 602.047508][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 602.055877][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 602.064068][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 602.081454][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 602.121333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 602.150027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 602.179435][T24611] device veth0_vlan entered promiscuous mode [ 602.227514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 602.247592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 602.264218][T24611] device veth1_macvtap entered promiscuous mode [ 602.345772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 602.371677][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.420053][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 602.509463][ T49] GPL: port 1(erspan0) entered disabled state [ 602.518800][ T49] device erspan0 left promiscuous mode [ 602.525530][ T49] GPL: port 1(erspan0) entered disabled state [ 602.593900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 602.614535][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 602.627756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 602.636515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 603.049215][T24638] device syzkaller0 entered promiscuous mode [ 603.098244][ T49] device veth1_macvtap left promiscuous mode [ 603.110485][ T49] device veth0_vlan left promiscuous mode [ 603.327035][T24643] device wg2 entered promiscuous mode [ 606.366528][T24731] device sit0 entered promiscuous mode [ 607.171359][T24776] device sit0 left promiscuous mode [ 607.247513][T24776] device sit0 entered promiscuous mode [ 608.608082][T24842] device pim6reg1 entered promiscuous mode [ 608.807603][T24850] syz.2.6795[24850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 608.807685][T24850] syz.2.6795[24850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.975062][T24940] device syzkaller0 entered promiscuous mode [ 611.030790][T24963] syz.0.6826[24963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.030931][T24963] syz.0.6826[24963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.183527][T24968] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.202153][T24968] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.390178][T24989] device sit0 entered promiscuous mode [ 612.178388][T25012] device macsec0 entered promiscuous mode [ 614.002365][T25104] device erspan0 entered promiscuous mode [ 615.497552][T25173] device sit0 entered promiscuous mode [ 616.514559][T25224] device sit0 left promiscuous mode [ 616.691343][T25229] device wg2 left promiscuous mode [ 616.748775][T25229] device wg2 entered promiscuous mode [ 618.367884][T25297] device sit0 entered promiscuous mode [ 618.816062][T25305] device sit0 left promiscuous mode [ 620.114785][T25396] syz.6.6956[25396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.114866][T25396] syz.6.6956[25396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.131437][T25394] device sit0 left promiscuous mode [ 620.194367][T25406] device wg2 left promiscuous mode [ 620.622498][T25419] device syzkaller0 entered promiscuous mode [ 620.789519][T25428] device sit0 left promiscuous mode [ 620.848054][T25428] device sit0 entered promiscuous mode [ 621.181606][T25431] device sit0 left promiscuous mode [ 621.323569][T25439] device veth0_vlan left promiscuous mode [ 621.344012][T25439] device veth0_vlan entered promiscuous mode [ 621.417368][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.426125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 621.434291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): aaaaaaaaa: link becomes ready [ 621.824863][T25473] -1: renamed from syzkaller0 [ 625.734345][T25597] device wg2 entered promiscuous mode [ 626.530164][T25638] device veth0_vlan left promiscuous mode [ 626.542203][T25638] device veth0_vlan entered promiscuous mode [ 626.557669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 626.567653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 626.580469][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.687329][ T7861] ------------[ cut here ]------------ [ 626.693009][ T7861] kernel BUG at kernel/bpf/arraymap.c:993! [ 626.698840][ T7861] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 626.704906][ T7861] CPU: 1 PID: 7861 Comm: kworker/1:37 Tainted: G W syzkaller #0 [ 626.713836][ T7861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 626.723896][ T7861] Workqueue: events prog_array_map_clear_deferred [ 626.730326][ T7861] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 626.736560][ T7861] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 95 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 95 e9 ff 0f 0b e8 c5 95 e9 ff <0f> 0b e8 be 95 e9 ff 0f 0b e8 b7 95 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 626.756285][ T7861] RSP: 0018:ffffc90003d97c18 EFLAGS: 00010293 [ 626.762344][ T7861] RAX: ffffffff817a0e7b RBX: ffff88810b6720d0 RCX: ffff888110824f00 [ 626.770310][ T7861] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 626.778272][ T7861] RBP: ffffc90003d97c98 R08: dffffc0000000000 R09: fffffbfff0c5d4e9 [ 626.786234][ T7861] R10: fffffbfff0c5d4e9 R11: 1ffffffff0c5d4e8 R12: 00000000fffffff0 [ 626.794202][ T7861] R13: ffff888109aa9e80 R14: 0000000000000001 R15: ffff888109aa9e00 [ 626.802198][ T7861] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 626.811115][ T7861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 626.817803][ T7861] CR2: 0000000100000000 CR3: 000000011f3e8000 CR4: 00000000003506a0 [ 626.825853][ T7861] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 626.833933][ T7861] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 626.841893][ T7861] Call Trace: [ 626.845180][ T7861] ? bpf_prog_7cb884b31948e20f+0xb/0x730 [ 626.850822][ T7861] fd_array_map_delete_elem+0x14c/0x250 [ 626.856355][ T7861] prog_array_map_clear_deferred+0x9e/0x140 [ 626.862233][ T7861] process_one_work+0x6e1/0xba0 [ 626.867070][ T7861] worker_thread+0xa6a/0x13b0 [ 626.871740][ T7861] kthread+0x346/0x3d0 [ 626.875793][ T7861] ? worker_clr_flags+0x190/0x190 [ 626.880806][ T7861] ? kthread_blkcg+0xd0/0xd0 [ 626.885386][ T7861] ret_from_fork+0x1f/0x30 [ 626.889798][ T7861] Modules linked in: [ 626.898068][ T7861] ---[ end trace cbe7d595c8daaaad ]--- [ 626.903629][ T7861] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 626.912527][ T7861] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 95 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 95 e9 ff 0f 0b e8 c5 95 e9 ff <0f> 0b e8 be 95 e9 ff 0f 0b e8 b7 95 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 626.932395][ T7861] RSP: 0018:ffffc90003d97c18 EFLAGS: 00010293 [ 626.938462][ T7861] RAX: ffffffff817a0e7b RBX: ffff88810b6720d0 RCX: ffff888110824f00 [ 626.947433][ T7861] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 626.955491][ T7861] RBP: ffffc90003d97c98 R08: dffffc0000000000 R09: fffffbfff0c5d4e9 [ 626.963565][ T7861] R10: fffffbfff0c5d4e9 R11: 1ffffffff0c5d4e8 R12: 00000000fffffff0 [ 626.971713][ T7861] R13: ffff888109aa9e80 R14: 0000000000000001 R15: ffff888109aa9e00 [ 626.979767][ T7861] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 626.988715][ T7861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 626.995487][ T7861] CR2: 00007feb8baa6d58 CR3: 000000011f3e8000 CR4: 00000000003506a0 [ 627.003517][ T7861] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 627.011518][ T7861] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 627.019492][ T7861] Kernel panic - not syncing: Fatal exception [ 627.025627][ T7861] Kernel Offset: disabled [ 627.029943][ T7861] Rebooting in 86400 seconds..