last executing test programs: 11m40.582730847s ago: executing program 32 (id=311): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x20005}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0xfffffffffffffda0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) close(0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000009e0000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000200)=r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) 11m40.564328879s ago: executing program 33 (id=313): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)='\\[].-') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0xc02, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000a2d70e5fc4f17e4075664efc181ec2b1c404f17511c9fae27f4f5f300ec454c43c3b3f73607176ea66683e8136de2a3c7815e2090000000000000049c5a1b695da1f29804bb702904a3e27ded0c803e5c4dd2e8c25d2e28dab97c016f8bb02676a175c3a04296794e6a751228d86d342ac7dcd669ec4df7ad6cc1ac6f1ec3053f9d0c778372b4a7d6b55519e6bd42eab7f42a2cf7a5b529e784fcd943f30d6f800b8092797d8202a3f249ea84fc17d1026461e82fc0f927a5dda7ec77207f050a99506c45f1255520f497aedf7e5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x13, 0x10, 0x2, 0x0, 0x2101, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11m40.541671281s ago: executing program 34 (id=317): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000900)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES16=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r9, &(0x7f0000000780), 0x2, 0x0) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg(r8, &(0x7f0000000700)={&(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/166, 0xa6}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f0000000200)=""/14, 0xe}, {&(0x7f00000004c0)=""/192, 0xc0}, {&(0x7f0000000580)=""/124, 0x7c}], 0x6, &(0x7f0000000680)=""/69, 0x45}, 0x4001a0e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) 11m40.524938783s ago: executing program 35 (id=318): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES16=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="000000000000004e10ef34f4c9ea4300000000000000000000000000eb14f742eb05c1f4bf25e3e4d4bfa8e9c62e0d9b1f5a8c2a788b4261312b2866b7475f7590cc6636506afa903170785b194986387eba75c1014ba606d692633c6d755d51f896902bdd2f858280168b0cb58fe4383386e964242c6612b83a0568750518af6d049bf86214fb727db5ed2e4215e00a8aded8b778ed8eb24b2fa835cf216f18782c5a2dbe8cdfe910cb681e1e70fb2fa323d94ccd7c93ff688484"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="000000000000004e10ef34f4c9ea4300000000000000000000000000eb14f742eb05c1f4bf25e3e4d4bfa8e9c62e0d9b1f5a8c2a788b4261312b2866b7475f7590cc6636506afa903170785b194986387eba75c1014ba606d692633c6d755d51f896902bdd2f858280168b0cb58fe4383386e964242c6612b83a0568750518af6d049bf86214fb727db5ed2e4215e00a8aded8b778ed8eb24b2fa835cf216f18782c5a2dbe8cdfe910cb681e1e70fb2fa323d94ccd7c93ff688484"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@fallback=r4}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@fallback=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r5, 0x2) (async) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r5, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x18, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000500000000000000030000001858000000000000000000000000000018110000", @ANYRES32], &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x3, 0x3, 0xb, 0x3}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd9075084f34b", 0x73, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) 11m40.482167536s ago: executing program 36 (id=316): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x790801f3) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6, 0x0, 0xfd}]}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800001b000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b706000014000000b7030000000d0000850000006e000000bca900000000000035090100000000009500000000000000bf9800000000000056080000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3m43.893806296s ago: executing program 7 (id=6315): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600001785"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r5, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r6 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x1a, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x38277774757a12bd}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r7}, &(0x7f0000000280), &(0x7f00000002c0)='%pi6 \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES16, @ANYRESHEX=r3, @ANYRESHEX=r5, @ANYRES32, @ANYRESOCT, @ANYBLOB="83343a70df5803"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x2, 0x33, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3m43.286233524s ago: executing program 7 (id=6324): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000008000000000000000000850000002a000000850000000593da000000000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic={0x4, 0xb, 0x0, 0xfff, 0xb}], &(0x7f0000000040)='GPL\x00', 0x3, 0x37, &(0x7f0000000080)=""/55, 0x40f00, 0x6, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x8, 0x6, 0x4}, 0x10, 0xffffffffffffffff, 0x0, 0x6, 0x0, &(0x7f0000000340)=[{0x3, 0x3, 0x9, 0x1}, {0x4, 0x4, 0xa, 0x9bfa0977c52bc898}, {0x1, 0x3, 0x0, 0x4}, {0x5, 0x5, 0x6, 0x2}, {0x5, 0x2, 0xc, 0x3}, {0x2, 0x3, 0x5, 0x8}], 0x10, 0x581e169c}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=0x1, 0xc, 0x0, 0x6, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0x1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={@ifindex=r9, r1, 0x29, 0x2000, 0x0, @value=r10, @void, @void, @void, r8}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 3m34.379072502s ago: executing program 8 (id=6327): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000007e000066000000ffffff80180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000a5000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000007e000066000000ffffff80180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000a5000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 3m34.308953349s ago: executing program 7 (id=6329): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000004b8af8ff0000001b2eba0a3e945d8189f300bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1b011, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3ff}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @generic={0xb, 0x6, 0x2, 0x2, 0x2}, @map_idx={0x18, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xb9, &(0x7f0000000740)=""/185, 0x41100, 0x3c, '\x00', r8, 0x0, r10, 0x8, &(0x7f0000000200)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x1, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000800)=[r3, r3, r2, r7], &(0x7f0000000840)=[{0x4, 0x4, 0x7}], 0x10, 0xe2d}, 0x94) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 3m34.308443639s ago: executing program 8 (id=6330): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r1}, &(0x7f00000003c0), &(0x7f0000000400)=r2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1}, 0x2100) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000840)='J', 0x1}], 0x1}, 0x0) sendmsg(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="3c25bad07607ab4ff4e6ce192a46a569759c8398dd027638a46c2a04af3821b747f0630b61a8e8ff7f2b7cba4de93934fd1108cdd91e35e42b19ffcfd8490b95ff56ab083fde5c6cd97a5faa4fe9539909", 0x51}], 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5, 0x0, 0x20}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) 3m34.016642366s ago: executing program 6 (id=6336): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc5}, 0x9920, 0xc8, 0x0, 0x0, 0x40000, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r3, &(0x7f0000000000), 0xe) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r6}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) unlink(&(0x7f0000000140)='./cgroup\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r8, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000540)="b9ff03076804268c989e14f088a847e089061416e0885a040000000000008100", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 3m33.805198687s ago: executing program 9 (id=6341): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100001800ffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x0, 0x0, 0x0, 0x4}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'ip6erspan0\x00', 0x4000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0x66) 3m33.371595437s ago: executing program 7 (id=6344): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="850000002e0000001600000000f390bdcd8000000000000095400000000004792a8a7c612f3ed23fe89ce9237346cc7d8a6a80b8d1cff038ae414012ed885b5f4055ce6b5b8fcce0f2b2bbb92abad3797913dac21449ea57e28d9c0225a156a8cb149db73af87ed8990baf626f48be2fe03353d427fd516954fd8234680afbf1bfca8ad9ef2f47737e623fb65a631aa2ab8e8e2ff8470889e35dde790ec8c2d19309ab3884f923955048402282711ed1cd51c2710d4ae8853a8dd21a21dcf862178a16fae7cec1a209b7efb4d8027019a631959c5daab8d6bce9ddb40e0b376e0d9c91f8957b2219a00f1834c3f2c4f47414710e0f8cb5645e"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f90cf0100000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b0000000500000005"], 0x48) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0xa810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xd8c7, 0xfff}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xb000000000000000, 0xffffffffffffffff, 0x0) (async, rerun: 64) mkdir(0x0, 0x100) (async) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='cpu.stat\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="512da41b6104738a2f4a3bae50fc71496af8327922", 0x15}, {0x0}, {&(0x7f0000000540)="a3a6b76232be7608600bf21513fdd1219612205c952aa9ad7447ca89253c1f58bc19794fb1c7f4ebdd677efa8d8567b99065588f062dd1e4961e862b67b359512d225bf9749efb5ebc26a88cbb7e20faec4177ec596c2e98", 0x58}], 0x4}, 0x2000010) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/uts\x00') (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 3m33.370731748s ago: executing program 9 (id=6345): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00\a\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) write$cgroup_subtree(r3, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffe00}, 0x50) syz_clone(0x8001500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) (async) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00\a\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) (async) write$cgroup_subtree(r3, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffe00}, 0x50) (async) syz_clone(0x8001500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 3m33.369801848s ago: executing program 8 (id=6346): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r4}, &(0x7f0000000600), &(0x7f00000006c0)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@generic={&(0x7f0000000680)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) recvmsg(r7, &(0x7f0000000000)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000280)=""/147, 0x93}, {&(0x7f0000000340)=""/74, 0x4a}, {&(0x7f00000004c0)=""/194, 0xc2}, {&(0x7f0000000680)=""/244, 0xf4}, {&(0x7f00000003c0)=""/80, 0x50}, {&(0x7f0000000780)=""/233, 0xe9}], 0x6, &(0x7f0000000a00)=""/252, 0xfc}, 0x2041) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 3m33.367696928s ago: executing program 5 (id=6347): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES64=0x0, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x8, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000000c0), 0x0}, 0x20) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000005c0)=""/244, &(0x7f0000000880), &(0x7f0000000200), 0xa7c}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 3m33.34243926s ago: executing program 7 (id=6348): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x15, 0x80000, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89f0, &(0x7f0000000900)={'tunl0\x00', @random='\x00\x00\x00 \x00'}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="02000000040000000800000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x3d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r9}, 0x10) 3m33.233105571s ago: executing program 5 (id=6349): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="e38b99460aabdc1776821734b5a50bd70ddb0a665eec530f255a98d346e4baf0d3bd7b8545a69f5243ad4b41323811f79e0bd8a14714b6886433438745d6264081f6fee78ed0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x6041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0], 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff68}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)='io.pressure\x00', 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="04000000040000fff93a290005a28e4d52624251b6af3fe9b8b21998b6b5d34c6d88161042b414f694c5c49360735510358598e0b867f5c35db3f276b68fb31b1a3b517d6c9f5bd05a7e11cb2cd8d86bdf8ca7f701004cd8ee3c40ef0aabb53ece8e8ce446ee719b84601fd9ab466398319385d5bae13721758010bde5981e19a929d8807ae69b050b3ab48f0e6f473ea934060000009500009b2072372d2595b72d9235e6b59b5e3bf12012a5"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r6, 0x22, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={@map=r6, r7, 0x26, 0x0, 0x0, @void, @value=r9, @void, @void, r8}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x5}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r10, r1, 0x1a, 0x10, 0x0, @void, @value=r2, @void, @void, r8}, 0x20) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x40047438, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4000, r5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') 3m33.078391966s ago: executing program 6 (id=6350): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) close(r0) 3m33.075708846s ago: executing program 5 (id=6351): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r5) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={&(0x7f0000000200)="890291eea873de1e845a7589f56df95f47516c3545", &(0x7f0000000340)=""/99, &(0x7f00000003c0)="d72b72c32c69b14e8aeda7614bab68fc193c1f1b22e6b8a92848c5b814c36a6a1b071e883b1055b489e6e4a5ffdf03f719d269ba999caab615d57a91ac6a8aa6d73b914321ef090b9e88d281a53173bf33f160cf25d4b99ac587612979dbaf841fa38c475cf8039e19183c1659a812e3a440278ef3540480aaf878cc287f3642d49455ceeb34ced928bde1998de69cd9", &(0x7f0000000500)="ef849af8f7977ee73394f803ac97a6e10a492f330f09ab4c8c543e9367717712db4fc5f07f6a1ef1b38bf6b6a3040c7b28539240c8ff33ecd99dc7e96905e960b377f561c04c9563358acb1652e2", 0x3ff, r5, 0x4}, 0x38) (async) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa121, 0x0, @perf_config_ext={0x1000000000}, 0x110200, 0xc8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) 3m33.074242146s ago: executing program 5 (id=6352): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000a80)={0x0, 0xfffffffffffffe2a, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63239747cb7f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x6, [@const={0x3}, @var={0x7, 0x0, 0x0, 0xe, 0x5, 0x2}, @enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x10, 0x3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1}}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x61, 0x5f, 0x61, 0x5f]}}, &(0x7f0000000480)=""/203, 0x7a, 0xcb, 0x1, 0x7}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000036fd15986864ae00"/25, @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="01000000040000000200"/28], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) socketpair$unix(0x4, 0x5, 0x0, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 3m32.978718925s ago: executing program 7 (id=6353): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000957ecd6e16facac518b970f49a90fd3534f7564e199087f66239df500c06588476b279678b89bed4e3988b458c8d3694520043fb4ea3e35d376bf9ee79"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000003000000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x18) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) 3m32.940288289s ago: executing program 6 (id=6354): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000731c8d300000000000000400000000000000000030584f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3m32.789528173s ago: executing program 8 (id=6355): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xf6}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2022) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r1}, &(0x7f00000004c0), &(0x7f0000000500)='%-010d \x00'}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000000)="b9ff0300600d698cff9e14f008", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, r0, 0x0) (async) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x120c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) close(r6) 3m32.788744213s ago: executing program 6 (id=6356): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x3a, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000100181100", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x4105, 0x0, 0x3, 0xd}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) syz_clone(0x800900, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r6, @ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230041) close(r0) 3m32.787073753s ago: executing program 9 (id=6357): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x401, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESDEC=r0, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESDEC=r0, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) 3m32.654762446s ago: executing program 6 (id=6358): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000080000000800000001000000000000001892724bc5d13c3808", @ANYRESDEC, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x7, 0x4, 0x80, 0xe, 0x28}, 0x50) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff17, 0x0, 0x0, 0x10, 0x4}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000900)=ANY=[@ANYBLOB="050000000000000071113700000000008510000002000000850000007d00000095003300000000009500a5050000000074b129a58bf0c345f1c4b85ff812f0ae110e7783f2345a683404f3cbea9135821c3827083cc5fbbadec00f1aeee7cadc3688c17b31d58580c895d4494f21ce02126ecdcbd69f967f59ddc76f3b304446b28b283f23d5fb42f22d25bdcd0b71e313a883bdf50c5878efa7882b85ad76c3e81f75e717185963a7c303c72d3cd120bb1595282023b5c61c3f3b26f80b4c4100976f5e054df097f3e5e120138b840ab183a51018345d491a89c1867ea2d4fed70e7d"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) write$cgroup_int(r3, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000140)=ANY=[@ANYRES8, @ANYBLOB="0000000000000000b700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095000000", @ANYRES32=r0, @ANYRES8=r4, @ANYRESOCT=r0], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x2ddb98a954995982, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000e2000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x94) 3m32.645031367s ago: executing program 8 (id=6359): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000280)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x10, 0x17, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000d4b60000000000000101000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c0000000500000000000000184800000800000000000000000000002a825000ffffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x78}, 0x94) 3m32.577289333s ago: executing program 9 (id=6360): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x54, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x64, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x54, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x64, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120e00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) close(0xffffffffffffffff) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x401, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x4, r7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611214000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) socketpair(0x8, 0x2, 0x1ff, &(0x7f0000000280)) (async) socketpair(0x8, 0x2, 0x1ff, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b113e000000000095"], 0x0}, 0x90) 3m32.568468584s ago: executing program 8 (id=6361): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', r2, 0xffffffffffffffff, 0x4}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x4, [@typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @fwd={0x9}, @volatile={0x2, 0x0, 0x0, 0x9, 0x4}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x1, 0x0, 0x5}, {0xc, 0x4, 0x2}, {0x7, 0x4, 0x9}, {0xb, 0x3, 0xaad}, {0x8, 0x0, 0x10}, {0x6, 0x5}, {0x2, 0x4, 0x3}]}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x23, 0x2}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000000380)=""/165, 0xc8, 0xa5, 0x1, 0x2, 0x10000, @value=r0}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x6, 0x101, 0x3, 0x20, 0x1, 0x0, '\x00', r2, r3, 0x1, 0x1, 0x0, 0x4}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'macvlan0\x00', 0x800}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000004000000020000000000000c02000000000000000200000d010000000a00000000000000000000000200000000005f"], 0x0, 0x44}, 0x28) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x26, 0x6, 0x0, &(0x7f00000002c0)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) close(r10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r13], 0x18, 0x10}, 0x0) close(r11) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) 3m32.491988121s ago: executing program 6 (id=6362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x26, 0x2, 0xf9, 0x0, 0xfffffffffffffffb, 0x202f, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000340), 0x8}, 0x2, 0x100, 0x1, 0x3, 0x32, 0x3, 0x5, 0x0, 0x1, 0x0, 0xf23}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='fib6_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYRESOCT=r3], &(0x7f0000000340)='syzkaller\x00', 0x14, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000280)}, 0xd) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0xfffffffffffffffd}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) 3m32.416771329s ago: executing program 9 (id=6363): r0 = gettid() r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x8, 0xd, 0x6, 0x2, 0x0, 0x8, 0x20, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, @perf_config_ext={0x100000000, 0x6}, 0xd000, 0x4, 0x99, 0x2, 0x7f, 0xcac, 0x5, 0x0, 0x3ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x1) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0xc, 0x9, 0x2, 0x0, 0x2, 0x80008, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x10}, 0x8001, 0x6, 0x2, 0x7, 0x1, 0xb, 0x101, 0x0, 0x5}, r0, 0x0, r1, 0x57309590ba73fb6c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x401, 0x6, 0x5e46, 0x1000, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x1c, &(0x7f0000000300)=@raw=[@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x200}}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xb}], &(0x7f0000000400)='syzkaller\x00', 0x1, 0xdc, &(0x7f0000000440)=""/220, 0x41000, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x5, 0x9, 0x1, 0xfff}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x4, 0x9, 0x7}, {0x5, 0x2, 0xb, 0xb}], 0x10, 0x7ff}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x400, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000740)={'veth1_to_batadv\x00', 0x4000}) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000780)) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r9, &(0x7f0000000800)='syz1\x00', 0x1ff) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x8, '\x00', 0x0, r6, 0x3, 0x2, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r4, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x7, 0x5, 0x1, 0x6, 0x2000, r10, 0x3, '\x00', r12, r6, 0x0, 0x3}, 0x50) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r11, 0x7, 0x8}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r7, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x89, &(0x7f0000000cc0)=[{}], 0x8, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f00)={r11, 0x4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0xc, 0xa, &(0x7f0000000a40)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1000}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @jmp={0x5, 0x1, 0x0, 0xa, 0xb, 0xfffffffffffffff0, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x5, 0x0, 0x7, 0x40}], &(0x7f0000000ac0)='syzkaller\x00', 0xfff, 0xfe, &(0x7f0000000b00)=""/254, 0x40f00, 0x3, '\x00', 0x0, @fallback=0x23, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r14, r7, 0x4, &(0x7f0000000f40)=[0x1, r10, r13, r5, r15], &(0x7f0000000f80)=[{0x2, 0x5, 0x6, 0x8}, {0x5, 0x1, 0xa, 0x2}, {0x5, 0x4, 0xa}, {0x1, 0x2, 0xb, 0x9}], 0x10, 0x92}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000001080)={0x1, 0x80, 0xf9, 0x5, 0x7, 0x1, 0x0, 0x7, 0x81000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1bc3, 0x2, @perf_config_ext={0x93, 0x4}, 0x0, 0x7fffffff, 0x6, 0x4, 0xffffffffffff8001, 0x35, 0x7, 0x0, 0x3, 0x0, 0x100000001}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r16, &(0x7f0000001380)={&(0x7f0000001140), 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)=""/126, 0x7e}, {&(0x7f0000001240)=""/163, 0xa3}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x12160) bpf$TOKEN_CREATE(0x24, &(0x7f00000013c0)={0x0, r3}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002480)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x4, [@type_tag={0xa, 0x0, 0x0, 0x12, 0x5}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xf, 0x3}, {0xe, 0x3}, {0x1, 0x5}]}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000001480)=""/4096, 0x58, 0x1000, 0x0, 0x200000}, 0x28) r17 = openat$cgroup_subtree(r9, &(0x7f00000024c0), 0x2, 0x0) write$cgroup_subtree(r17, &(0x7f0000002500)={[{0x2b, 'net_cls'}, {0x2d, 'memory'}, {0x2d, 'memory'}]}, 0x19) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000002580)=r7, 0x4) 3m32.415835869s ago: executing program 5 (id=6364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0xc0f00, 0x5c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRESHEX=0x0, @ANYRES16=r1, @ANYRES64=r1, @ANYRES8=r0, @ANYRES8=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x13, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000600), 0x12) (async) r4 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES16=r4, @ANYRES8, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000202020c9a63e06232c7d414fa996f904967b1af8ff00000001bfa100000000000007010000f8030000000000008500000071000000958a0000000000000000000000000000000000009248a73ea679aa3a8ce342c1a45b8df7420fca9c34c91160803c13b344f15c29852e96d66cd756d88c133dcc38237c7bb252299c66e538eff7076f58215202b62619ff5c840ee0a0882a9a265d79984623639ae9dbb71c1d7e4fac8a7344927d3f112d795c5f7d5cb6153ab8cccd95af8a1b0c4ba6c6e47e0e0817d07caacc57e9c3d7bb5cd55b9d261e9bf0d56b17856ea53ed311f9c599e8c144250a19e7d31b5e475d1dc760ea16305e72c265b01338847a699fc16ffd6e747e4e394fb70010478e9bb0a802e403260c0b4d"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0xd46fec981053d2a5, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES8=r2, @ANYRES32=r6], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r7}, &(0x7f00000003c0), &(0x7f0000000500)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000010000000040000000ffff"], 0x48) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'pim6reg1\x00', 0x1}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000001000002000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000004000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r12}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0xa, 0x2, 0x11, 0x0) 3m32.415196039s ago: executing program 5 (id=6365): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x22, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x46085300, 0x0, 0xfffffffffffffda0, 0x0, 0x0, 0x0) 3m32.39935217s ago: executing program 9 (id=6366): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x3, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r4}, &(0x7f0000000400), &(0x7f0000000600)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000004c0)="b3eb511e596efa350bfe297bb173a78fb7591278ce51e15d0e8f1a49233c2d84df6ffb8788f21c4a6f8e091e86d3ea17fbddab376b68c174a7081820aaf47edef977f8c9c107e629201d4f5887ae2cc38e3f08e36c67342eccda6433a0a8de0b64ce7cefe84d83f2883371c378602c41424b4a93c0a06e536a7c88edfb88d6010e2ac07a838bd8746484971859454d2dd84f0eaf12c5a002492040611f06a526aa87bf45894dd7479a77b623cc5d1761000bb738880cce6ef7a77da834976a993a8b62b7e133d69908b278a424ae95823c2b7341", 0xd4}], 0x1, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x18}, 0x8004) 3m16.990883277s ago: executing program 37 (id=6365): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x22, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x46085300, 0x0, 0xfffffffffffffda0, 0x0, 0x0, 0x0) 3m16.981724678s ago: executing program 38 (id=6362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x26, 0x2, 0xf9, 0x0, 0xfffffffffffffffb, 0x202f, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000340), 0x8}, 0x2, 0x100, 0x1, 0x3, 0x32, 0x3, 0x5, 0x0, 0x1, 0x0, 0xf23}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='fib6_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYRESOCT=r3], &(0x7f0000000340)='syzkaller\x00', 0x14, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000280)}, 0xd) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0xfffffffffffffffd}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) 3m16.964405439s ago: executing program 39 (id=6353): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000957ecd6e16facac518b970f49a90fd3534f7564e199087f66239df500c06588476b279678b89bed4e3988b458c8d3694520043fb4ea3e35d376bf9ee79"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000003000000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x18) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) 3m16.944932851s ago: executing program 40 (id=6361): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', r2, 0xffffffffffffffff, 0x4}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x4, [@typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @fwd={0x9}, @volatile={0x2, 0x0, 0x0, 0x9, 0x4}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x1, 0x0, 0x5}, {0xc, 0x4, 0x2}, {0x7, 0x4, 0x9}, {0xb, 0x3, 0xaad}, {0x8, 0x0, 0x10}, {0x6, 0x5}, {0x2, 0x4, 0x3}]}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x23, 0x2}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000000380)=""/165, 0xc8, 0xa5, 0x1, 0x2, 0x10000, @value=r0}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x6, 0x101, 0x3, 0x20, 0x1, 0x0, '\x00', r2, r3, 0x1, 0x1, 0x0, 0x4}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'macvlan0\x00', 0x800}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000004000000020000000000000c02000000000000000200000d010000000a00000000000000000000000200000000005f"], 0x0, 0x44}, 0x28) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x26, 0x6, 0x0, &(0x7f00000002c0)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) close(r10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r13], 0x18, 0x10}, 0x0) close(r11) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) 3m16.926875523s ago: executing program 41 (id=6366): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x3, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r4}, &(0x7f0000000400), &(0x7f0000000600)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000004c0)="b3eb511e596efa350bfe297bb173a78fb7591278ce51e15d0e8f1a49233c2d84df6ffb8788f21c4a6f8e091e86d3ea17fbddab376b68c174a7081820aaf47edef977f8c9c107e629201d4f5887ae2cc38e3f08e36c67342eccda6433a0a8de0b64ce7cefe84d83f2883371c378602c41424b4a93c0a06e536a7c88edfb88d6010e2ac07a838bd8746484971859454d2dd84f0eaf12c5a002492040611f06a526aa87bf45894dd7479a77b623cc5d1761000bb738880cce6ef7a77da834976a993a8b62b7e133d69908b278a424ae95823c2b7341", 0xd4}], 0x1, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x18}, 0x8004) 15.242573148s ago: executing program 3 (id=8418): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaaa8, 0x96}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 15.223345559s ago: executing program 3 (id=8421): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1a9) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x6d) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r6}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x60000000}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x1001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000004db}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x1) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="feffffff00", @ANYRES32=0x0], 0x48) (async) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) 15.22007737s ago: executing program 3 (id=8424): sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)}, 0x4000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x220000, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200003, 0x0, @perf_config_ext={0x7}, 0x0, 0x6, 0x0, 0x7, 0x1fd, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) sendmsg(r2, &(0x7f0000001600)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x7, 0x3}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000240)="4e123cd6c32072f3fd1d4a8e20a9a4a22383a3a12554a17294fa1e81cdd3c821c84f4ce5c49ef7c5e0927509e38ec674a956c000c484a9895a4c6fec47830a0d1ea59f698a283df166a23de7c1a1fe91fffbfe17ef01cd17dadb996bba4df245ee738f62271c989c8cd97a5831ec3194c01399f289c3", 0x76}, {&(0x7f0000000180)="dc768b646c857682bee1da9d4b82e415cbc14d0efd93be58896dfbbdb04d", 0x1e}, {&(0x7f00000002c0)="801ebd8d336150edb5f5c69209fe885544f1cedde4181aeec721ccb15ea996cef531f6b091ca418859253648b124263b92db0185eb085356bb68dc08a68a1f995c2ed24a2db8957e3df99a5be2a08a70bea43f7df9e11edf537fae6de87f0ba6", 0x60}, {&(0x7f0000001640)="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", 0xfd}, {&(0x7f0000000440)="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", 0x1000}], 0x5, &(0x7f00000014c0)=[{0x90, 0x108, 0x5, "3f8ff3a061448c381a20f08970b043b410da1ce34de3d628ee9ba30d80bf50cc570770e089ea40646d0d4f8dcdcc7bea92e4fb098f4fe3b122b12300a8b269e717ff414d9910dda8640b106355606c19ce736702e7b8fd7d45d5eac8e1a687f672dfcc808d33909871881470228ef6d97ac9e821a2ff8cc1041f4648"}, {0xb0, 0x113, 0x1b0, "13585eb7e6111b23f14ae8222cb3ada43a4a8d3c074140576cff5a3ea0ec276f60acaf7d297552600d80552d11de05333e258fab19fe7e85fd2abdd9a50d2e8973d987e39ce513ebfe24ff6e66cce086f68bc83f73b7b598a6f29db1cd0a3be5b9666d9b3ef52f89c22aedd1ff788e2fccbedbd84ed0ce31a8c1e4d42689c928e1e53237f40b1de5968ca62e39bf332cb3f0e016c8778d7306ce1385a544"}], 0x178}, 0x81) 15.21704358s ago: executing program 3 (id=8426): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0x1, 0x5, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x8, 0x1fffffffffffffcd, &(0x7f0000000400)=ANY=[@ANYRES16=0xffffffffffffffff, @ANYRES16], 0x0, 0x2010002, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0300e4f503000000040000000a00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000050000000100"/25], 0x50) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000640)="54538f808f84003ce753a19e2988a08a9712a6cab8a7d4b88bc9fbf625c525c54f06e33e3d71a96643434ef6742252786096560e1fff109a30421292fb57c6808a1cddf7868dabeec294c356a6ee8de111f0c9be4d5607e831d57b5b806bb3b53394860d0344964583957b8dcda9f13409c73078ca21a0459412e7d91e84633f1682bdb28cc9f1b52aff8d1f2a4a90212438c4044d78df75532573bd3d9ca58dc7172aaada556b7fee55b21f746b11b2eb816c2aac4f4c7148c5c09ff11dca1d3855e973b49fb8c57836278ac4256a6df28b8cb9a8b2a2a2eedba7cd47093fcc190a614a45be238dbb1306b1d957f000e4d46483affe3f73a8516d690b7894a2da21217f096fd77334f9adbf2fe88c708dfc40bad63756a2a5181f72ccf81cb0cbe85fcee5e6f4d52e3932fac11c285d9809d8204fed444f1f49671251a7862e2ecdfd9e7b2410de97148a8da9530ec07f5ab2329609a6cff6f2e690f6da26e08620a3f1f77ec19207f027ac2941dfb94f3a9df4529e3b45edf905a8a500772bbd4498b1b05448faaeb631cb38a1d45d498fe10c7e3494beac9935220469e1816b4855afa2d9d3ad39d1aeedb4637891050d6cb817b50d0aee7382db42de705b55126b1bd4cd98f74d6cad4cf72e7e395d003704c2890b6ff6b35c25adf80316024c9f821f00ef8aa0a9439cf0c0f0d6b710a0ce24bf9843ae25b4d05208914f1147be2543a6c7da180844e5447ecb5a422012d7661f7a1b8b2b8eada182d6315de77b8c6cae6e96611ea521aa3163d7f1adbd73b17f1fccafac70aaa9181b55fdf4d3e5b3668aecfec809c4945d0f1de4df696d85407d9a6c7d38dbdda3ad63130fda41b696468e22979110199765bdf32ceb5b98cb364d5b02e74d714f062fbf3278da66fb047e883cf079caf878d7c11352b7b0c0ef783dc0492c23fe225f7a278668992a2257526fefdb10914bf3713507a305aac10582b52c2e586819ac268c1a70fdadfb91a06901508534137a23858b363d75132d093445cbd05b6e94bb1ab2c3cdb33f366f83d3876f3e1a284fc750edfafe7543af14678038964db7ede2bb7a238f3e87996044293c63bb7cd17d726a758f1710a0d8a735030e9c04b02c93c6761ee4f351b2b552d30cefc9bdeaa1233e0e505d7209eced2beafe7ce252f70332d40cdadfb65e49019a18ff2a627882e4f3d9323d6b31153c2800ea3f055e73dd5cb3b2941a3d67c46a143a5f53cab1790d38eca6410a5d08354730a652fbd1428ca165868efda86999ad9f389753c8c7aa4b24c8ef4e42215126a7a5bfb2cedcc09e868cc74ef38032bfa1b92c591d7140f9184a3900e6b53672d2131426fe21c73cc9f5aa61566f382169e6c3806d0e38f3e98ba611a650fc5fd0bebb363b8a866fc1e33aff7e6da5b9b7239c2631f76271ebd0a4a6d7f150bf8570a476f3c7cdacaf145d011be4b12853c55a9ad22f31992cfa1b3c8607adbf108f3d9946370e86647c4d249e638148f904e7305550828edba7aed8634bd623f2155d6cc0232e98f107b6a5dcad1bc0b68d82211bc2ca18baff9486b05293ea2947e888bb28abcdf13a815176930883430b51ddc49257773ede22c8dfe99b9c7122dbdf365fe8a39a0a4c63b48f6b0d38de63c5ac5061585012f739a7c085efaa930c7d062e52974aecd1b4e2a0316f0b860f2c370e5a5b0b04c4a32c972d95d2b1936d0fb3b8cf1cb0db49197d1bf465fefe70bec9581498ccdcf7d3a67667e09b5e9ee76912b77c257b20dc9ec9d421e41173e7fc79ffad822d67227c8f0433deaa04c05b19bac45abf80b6693c4330ba78487c9e88d22f64418c5a83fe5d4edfe0ca98802bc33a96fb6cc1bb1a27e2961b73d6bc4a3b9098c219f5fad2160313b6aafe098fb8fd5f7a3547a165ff72b9664a66bf997148056e37de73fbd3ae9848fc45ab0052b11b43bdc3140d0fbba7b953fd4a40bb6dcae2b754852f0c336f9f1853e2774bc8f194749bebd964595bc3fe1e44af4516a3f73a8f9f8ee8ef8bd667f7815d3b380770403b41d985190d0b8f61fa0885d4b61ee6f10ba01bae11e4820a93c10cef26412c6896ab68f5257b44e61ceca4765eba39514fc44b9ab7facfb24a6abe9b26c985616c5316a078ef276691b537806c73be412dc57179e096df50a89b008c74d021e8543b31be6037c77600553204fe5ba636eddc0f5745e0766a43da52c8dac698fb92a5674312604ed9d173144ee0a8a2bcbe1aeae69ecd56fe5d2b0c1fcb9840869bb38939a03ae8a2607b7a88a20552269860ea70172f5a11336c4886a5068a1b8f9c4f9908331a2c77452d4ccd57cac470d31e9ff940008a0cd1a537bbef811ad5cd28111ba0f468d57052f276c9f7c0720fcb7ab6c784224cdca14ccd49d4e7aa5f447571adf129c299173acc8e2092ce2c03cc0296c6b70dc7fac05607947afa8ee426ffeea915620a00eb11ee201603321c8ad005b1a4cec087afc3c26fc9bd5cfd29fe7da62013a3bbd092607046e65cfea9adf6f656b829ff245120565e739dd0f7890dcdedaa03a6045117fcb816ea0ee251cd477b2fd072e3e047742351e2420e56b59f40c257721ea5d1993e72fa8603a2b047b8ec88ef39ca01844086923ccff711b553785cd98e4d33bbbd15a0e668e4a5fa43bb1b3fd54823bcbc63dc91a5e85facf89a069badc731600e1aeceb2f7ad3cb9b573a7fc348391985df97b5b5ba6c17bcd547613efad4e57bedebd03cc8c69efef78e6eb26cac119925718185e1012e43bbbe24a6ba042747e37e0eddbe6ef39d29144a327e8a5135a0dee7aa86559311f8c835c5a20d5b1aaa07c253c517428b8cadd3f27f868a0cf0688c784ece24f65314d72aa6fd510f57a64c89ff6574277d4edcc340d39bb21f6b750cb53c58f05e3dfdb642381261fe8e4be2dc0b1760afb7f3cd467e7f93637edf345d96b46467d346d09e1999c3e89d7dfa082667e9ab81f399e82a330691889bfff2c916d96d23095cad8843b206f70b1c65d7615dee78e94d5f6e1b0ff9475e46a0ac1bfb99ee1f3e30ee59aa997234d6865ec9efd3eccf75735f2df3b3812ffd90c8ac9d0e6b89606beaf6d7a0ca7e5482116b74e8e2672cd63a5a802e76257176b068ff79711610b7bfd2aafa10e198b53b1262af0444caad4520b6e432171710d99a6ae25761178a484fc108be7de0eb87e09fe29d00f0b4232831e7d318def4ba7f17fcdf9f4abc7646fc1bbce34340d2f171d3f560a4747ae4fc6e9b1cbd37f18f37c19589a95161666ade223878a27cf465b859fe54bdd7b20cf0e3b54ad085207a6bafa205bc679483c68009af3a0f3a8324ef8209920ee25720e6c77c77ae467a8d675185fa59701a62903248f5e91fcf026d475b7c03e6b64fd7ef942a33c40c61957d3a655b2631fa0729b014e7274acb0bd2ff85a512ab8cdb808a8b259f8c47450b75470d9ea0ee3a85d2aed8809825fea45361f02b7c69dc9975653764e3d1c170b45f91f7702015df0a1671f4241ab9475e33747b36878cb5c9f76134ad694bb10cfc0e533aa3cf6191eadc74f1a4611ba951a3ce2e59be73384d0244b6e743dbfac4999f151db80fe0a492b877a56a920cf6cd106c6e9d41c4456e16ad30f79b1ba99bc2c87a7d78da2c2a8eb84b0cc80733a2960648c6cdbfcd368dec2ded1ea06219f15d13b3377a621211ad273ea2218b467484ec52f9577e5e058e97fc192906e41d3afd6c70c7e1ecd6c4c9692a9259950b9085d89ce7844dd97e0d00238a938f65e5449bb9cba0419474c35562c3b8e5ef8ab0d93b8746c94b8f1e12dc70191f69fa4909d589b1f30f4a0d3bdff39f7a1330288939779bc5b1eebc2f5a52dca5a3317375f9ff4dc795535bba0fcf227ba1f0b77f5b7fb6316d8d133af7784d8d1e14a9bb623c28c151079a38c1246c2a0107bcd3ccf15a9779835d2dc28694477a6ef8d712f649b9772d984e70b2341f1acd8c432986900d9232e9bc7b49cbc9780b7c4f35f6ff57d0c5b174c24860c952a6fa929489b3c6947010ad24535082649fc5c5a7b847add6708a2dddd3c48b4bd9302c922b35e22a0e8dc7885e98d2429040cf963a2a70d0d883f8a08ea3ebe08cd5192aa7b87123985a53127bf4bf00eab3be503e6479b391d70b55e162469b56c8fae58a51c1bcff24665a1f2b4c68b50bb9897697804c707ea11b6e7efb7689e110854d38f76d9cb15ec0d94c109475c05bd22f61bb94b45b038ad755c25bf308620a233211d4f7e9d9f4742b49ad9bf8e12f7066dd7c3999e53a7d1d5f39aaf02a46ee61c74d994da5ad08310acaf04241a57bc9db309f8201812477bfc3e44b924d782eae9c48ef0802d0442c903ae26c4d3ff88532adeb301aafbe47ff009732192d57340539116281bf57b403f5755c247e6628b839d22b5675f61eb1bd5d39fef5ba8c63bdb36628a26c63a168913f0c37beee59d0791fd47f2ca93eb02d8293dba8401d00d01e13492966b35a094ef456d147296fa4225b461e8ac548b0807e1d74f166e07ff5acb7fb53a3af09ff75489d626ee43ec687e6659fd15408041107d59d0fe46c98ca22529c3674f551d767390ebc3706dcf1196f58a11a4e5c43567d3a39a2b57f8e1d66bba8a08ec22eaa65c686974c4c9cad591ad35d7534697539b26d9b4b7555539c865a82b4c5b3f7e170125ad42c994d83453af37a7bb941407bc9eccedd545dc91af1375944919a3fc302f803ffd8254be51d47b93eeb0471651245e7e3a8673cdc5ca9bbfa6e42eea93b9f72d287ede959bcbfc9424e7e16e0ac156795b2ebbc718da9956f2f47ae32b9fc0c24195dc186312dacbbc69d445020428cf4699f48a4b4bb00637893337906cf75936774137c0caeec9dd8a81d65b83a1dc875abc982298b0e5838c5cb4a61f00e5dc87143462dd3dc9b2aaa2bc771fcabc62420b8a82f12249e3e3c78a57692dd0d266e0e33280b8d20f890d85da6168b1958e5d96f4354d99e9ba7d030cc11ae0a60f0640211709a744c7f6c21c6aafda66bc7fac2d0de17feaa01f68623eb3c67e4d44f130f3b923a13ebef4f0dc4b99406e65e18bbfa4f4cab1afcd53024f059b4a920240dfa9a6368c4ac14baebd1f873046ef9811529e9ae52e2ee9fac2b2160c5c776874cd302e8cf093c42894520dbb9f7b449fe006ebd1859467f2e17e8ba29aa8055d83ce2e85df64a7aa9050ef45d8952c1139afafabe2277fd0c73a7a427e748a44bed1a90d0c738b31732f652be291672820a101c3ed0d59f8b65743d6cca7a3f87c40c4df3512f08155736ff35d5e4afbf13e8d2e9998497ea1b7f4550c9f7595c94b77ae77c95a547b1f15750d4c28d315a8176cad702cd4b39e660766f9fb7f4d457bc0f9936114b075ac25b4408b21b700fbceae2db050470858cd067cb17d8e229067f9e066b8f84068a37708587058d69a24dfaac8714a0aaae753fff32095792a328543677e5a37e771b64c8c49cbcc80ecd8b32ab06376da5cd1f4156f74a935fe8044f89eb218175fd4c21f83c1286faca401b9616b6de6d5efe32a8c37ab9affe9322324e0c6b4683449bb7af1dcd7d2720f8437ea8dd344043a6997b5285fe6c2435bde5f01b0fe00343f160455c5c7f7903d826eab9e33c18e5d53bc5598f321e7deb0620175ffadd5724d5f7f354fc250b2b14397093c1bc06125b7ada851739bac724de841f8ef57db359bf0c4bad6082641ada19656acce1707ace32299430903ceb13af9129f9992ac64c0c1c87", 0x1000}], 0x1, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40, 0x8000}, 0x20000840) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRESHEX], 0xfdef) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000180)='ns/pid\x00') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r7 = gettid() syz_open_procfs$namespace(r7, &(0x7f0000000280)='ns/user\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r7, r6, 0x0, 0x4, &(0x7f0000000280)='GPL\x00'}, 0x30) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)="cdfd8b", 0x3}, {&(0x7f0000000380)="54ea9a4555ac5bf77cd12a6c55d1992cbbaf1d64cd0c80dd91f5e18d098508e51925e217eabf9593f09dd60d623404500fa99ac8c40067def7e92eefe9b051161c0572fdb246e2b9b100818628cfff589a2f38740e1eafb8eb10e4df0d0ee29fb59359981fb5ae9f68051522df00671fcf58a677d2bd77d5f2e1eb4f6a6df4160371c5edbfcfbf985a438f1d195c3b6087af01b0162b6f2cbf7dede07d68c5a5a251132a9730a1d68a0dec", 0xab}, {&(0x7f0000000700)="1e63ac1493de0878bdca93b0255eb098bba0077736e0d03fc9c6618b4a9609d9950494dc34878225b3f5f395b262c13b1fc3978fea5db08f349c41d51fda61c0daf3bf6a4116b051ca6ce4d78084", 0x4e}, {&(0x7f0000000fc0)="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", 0x1000}], 0x4, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r1, r0, 0xffffffffffffffff, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff, 0xee00}}}], 0x140, 0x4000040}, 0x24000041) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040018}, 0x0) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x21, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) close(r9) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0, 0xfffffffffffffe08}, 0x0) close(r11) sendmsg$tipc(r12, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 14.941079256s ago: executing program 3 (id=8429): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000dfc290e56b1b435200000000000000f81812ca00", @ANYRES8=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000740)='kmem_cache_free\x00', r2}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup(r5, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6b", 0x2}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0xffffd6c0, r4, 0x0, 0xf2ff}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000063d5fff30000000000000000001801000020646c2500010000000020207b1af8ff00000000bba100000000000007010000f8ffe1ffb607385808000000b7030000040000008500000006000000000500000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x15, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r10}, 0x10) recvmsg$unix(r9, &(0x7f0000000a80)={&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f00000007c0)=""/132, 0x84}, {&(0x7f0000000580)=""/92, 0x5c}, {&(0x7f0000000880)=""/227, 0xe3}], 0x3, &(0x7f0000000a40)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40002042) 14.59439542s ago: executing program 3 (id=8431): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, r2}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000e2bac15d3b6641a215f099e26603a050337b2ccc70a9f928ba3c529bb6e7365e7e246317380f5884d79663e7fcaa89795d7b10e88378c33265a7af06040e3d0bbc6a5864dfa023c6ac1da574242785bbb4ece12b11da52496875e1e384042aad63a3094bf3bc0e40a79960f9f1610940e67e30611d9873d1e6cb9c4cce44c999c49ff52a6400192fd021d7158438d7686a6f66778022c93c544189b684754e7e0f77a4f498609e53"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r3, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0xa5, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000007c0)=r8) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r7}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) close(r10) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x3, [@union={0x10, 0x1, 0x0, 0x5, 0x1, 0x6, [{0x3, 0x3, 0x272}]}, @func={0xa, 0x0, 0x0, 0xc, 0x3}, @enum={0x10, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x8000}, {0x10, 0x8}, {0x0, 0x64f}, {0x3, 0xa}, {0x4, 0x4}, {0x9, 0x492c99fc}, {0xb, 0xe}, {0x6, 0x6}]}]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/200, 0x8b, 0xc8, 0x0, 0x719}, 0x28) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) r11 = openat$cgroup(r5, &(0x7f0000000b00)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@cgroup=r11, 0x15, 0x1, 0x7fffffff, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000a00)=[0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0]}, 0x40) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 2.692506804s ago: executing program 4 (id=8556): perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0xc, 0x0, 0x0, 0x3, 0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x2, @perf_bp={0x0, 0x2}, 0x101, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x74ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000004300"], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000340), 0x894, r4}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYRES32=0x0], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a40)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0f00000004000000040000001200000000080000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32], 0x50) 2.396567532s ago: executing program 2 (id=8560): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0600000004000000ff0f0000"], 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x10000009, 0x0, 0x0, 0xf, 0x3, [], "48c36b"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "ab"}]}}, 0x0, 0x36}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) socketpair(0x1a, 0x5, 0x9, &(0x7f0000000140)) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x7, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r4) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x3fffd, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 2.328061388s ago: executing program 2 (id=8562): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073114200000000008510000002000000b7000000428173959500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000680)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x50) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x50) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x68c2478b, 0x0, 0x0, 0x0, 0x2}, @alu={0x7, 0x1, 0x2, 0x5, 0xa, 0xfffffffffffffffe, 0x65cb1c657feb855f}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x98, &(0x7f0000000100)=""/152, 0x0, 0x10, '\x00', r1, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x8, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r3, r4, r5], &(0x7f0000000500)=[{0x1, 0x1, 0x2, 0x5}, {0x2, 0x4, 0x7, 0x7}, {0x2, 0x1, 0x9, 0xc}, {0x4, 0x5, 0xf, 0xb}, {0x5, 0x5, 0x5, 0x2}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x12, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="b400000000eb00000f1000000000000061020000000000009500050000000000929b569e5b468b4c53db3f7ac9bc09236ced48406ba73fa5a110a5121c838a6c38dc56e6bc1875cceae7ccb46cba30367a0cfe1f5ab6abae43bec5ef0727bfa5532d5300"/111, @ANYRES64, @ANYRESDEC, @ANYRES16, @ANYRESDEC, @ANYRESOCT, @ANYRESHEX], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000940), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073114200000000008510000002000000b7000000428173959500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup(r0, &(0x7f0000000680)='syz0\x00', 0x200002, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x68c2478b, 0x0, 0x0, 0x0, 0x2}, @alu={0x7, 0x1, 0x2, 0x5, 0xa, 0xfffffffffffffffe, 0x65cb1c657feb855f}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x98, &(0x7f0000000100)=""/152, 0x0, 0x10, '\x00', r1, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x8, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r3, r4, r5], &(0x7f0000000500)=[{0x1, 0x1, 0x2, 0x5}, {0x2, 0x4, 0x7, 0x7}, {0x2, 0x1, 0x9, 0xc}, {0x4, 0x5, 0xf, 0xb}, {0x5, 0x5, 0x5, 0x2}], 0x10, 0x9}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x12, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="b400000000eb00000f1000000000000061020000000000009500050000000000929b569e5b468b4c53db3f7ac9bc09236ced48406ba73fa5a110a5121c838a6c38dc56e6bc1875cceae7ccb46cba30367a0cfe1f5ab6abae43bec5ef0727bfa5532d5300"/111, @ANYRES64, @ANYRESDEC, @ANYRES16, @ANYRESDEC, @ANYRESOCT, @ANYRESHEX], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000940), 0x10}, 0x94) (async) 2.232144617s ago: executing program 2 (id=8566): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="5eaa00000000000061108200000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) close(r1) 2.074314933s ago: executing program 2 (id=8568): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYRESHEX=r0], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000016c0), 0x8) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001700)=r3, 0x4) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000013c0)={0x1b, 0x0, 0x0, 0xb, 0x0, 0x1, 0x6, '\x00', 0x0, r5, 0x4, 0x1, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{0x0}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d58c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb6220030100dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000066d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c9727ec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f0dafc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa1c22015e53fd8a46be933ab460d8629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8f12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d61800aaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e3c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c59869c9200a1306ffa5a71ca69e89a69fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0dc4b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec086174439af6ee6c7fdb2d19c9280fa9a02e8fa6a38acfff09050d912635fed175fd06f577d40000000000000000000000000000754bffd73c0888ba8834f20b3acea57b7817663e12c1a5503bc4c13af59bda21688d68698c53ce3aa767657774db09ece7ec888d3af290207d36fa433b35e17dc0f3dc728ea1c633a4ef9e7d9bf81b57492e0544800921d1b751c5fbc163"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x8000a, 0x300, &(0x7f0000000000)) write$cgroup_pid(r2, &(0x7f00000013c0), 0xfffffdef) write$cgroup_devices(r2, 0x0, 0x0) 2.062948654s ago: executing program 4 (id=8569): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"/2659], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={r0, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f086ddeff913e613c26d42000000fbac14140be000031762079f4b4d2f87e5feca6aab845013f232050039", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x3, 0x10, &(0x7f0000003f80)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e00001811", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000004400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b703000000bf090000000000538e4e2af34070550055090100000000009500000000000000bf91000000000000b70200000000000085000000b2eaff85000000b70000000000000095000000000000000000000000000000000000eb1b81ff65dcb2ef2818ba7945a4dfe422ed6da77b625275f7d94dc5"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r3}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x5, 0x1, 0xb, 0xa, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xec, &(0x7f00000004c0)=""/236}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 2.039082856s ago: executing program 0 (id=8570): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f0000000380)={0x0, 0xf9, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x8420, 0xc8, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x100}, 0x0, 0x0, 0x0, 0x9, 0xfff, 0x800, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001dc0)=ANY=[@ANYBLOB="620af8ff0c011021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff90326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e4000000000d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd574d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d0104361c37c61a43b5afd865b60d4cae891b73220f17d25979a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e64701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4faa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a2689217380400a9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a000000000000000000000000000020bd79e41c682139c58ac1deb039a691ad640e12c12fe11d70fe495906f2d5d71778acbd4eee53a3996cb0de84bd2b059d60c0f96a53ea44e0b293865aa68df494f87db976e36ad6c06912244d4c883c4aaa60b4a1392ce0b2f2c519663b4652ff871e0f6dfff9f7d34ecf04be0a58c3d53174b67d1886e34b81ad8c60da56acc64739c3acab24aa8d0ac92d465074f915608b1b60a948bad401b1a7fb3627bbe6c45123ed44bfdf8cc143bd1b7a663dc3d0476b8e39becffc429e41f66b1e37ae52aacaff0f1dc8ea70b68c25072e20586b19127d75fa71577f265c5100"/3816], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000340)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r6, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc0, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1200000099ad000004000000082d6ecda9400000", @ANYRES32=r4, @ANYBLOB="0200"/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="02000000000000000300"/28], 0x50) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) 1.435947483s ago: executing program 2 (id=8573): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000fdffffff0000670000000000181100006fd3536b36b086476427aa518a51a056530e6d73cd4f822ba81aa5e180a866cfb1075100"/65, @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) recvmsg(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40010002) write$cgroup_pid(r2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0xc05}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'erspan0\x00', 0x800}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 1.25858752s ago: executing program 1 (id=8575): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 1.141595641s ago: executing program 0 (id=8576): bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000002c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.116318944s ago: executing program 4 (id=8577): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000002000000000000000000000000000000000000000000000085e080305f2323715c7035135afd7d162818142b4b47fca70f079f9c168e"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x5, 0x4, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x8000000000000001, 0x1000000}, 0x100810, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x21209, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000580)='\x02;\xed\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cVi\xc2\xfa\xcc\x191x\x96\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x96^68\x1e\v\xac\x00\x00\x00\x01\x00\x01\x00\x00\x00\x00\x00\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd6\xaeH3I\x8c\x96\x18\xd8\xa0f\xbf\xaa3\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab\x1f\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r4, &(0x7f0000000040)={'b', ' *:* ', 'm\x00'}, 0x8) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r7, 0x40047459, 0xf0ff1f00000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 1.004909525s ago: executing program 1 (id=8578): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000"], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x1100) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r6}, &(0x7f0000000540), &(0x7f0000000580)=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r6, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) r8 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffff2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6694380b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1, 0xe, 0x0, &(0x7f0000001040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.001473195s ago: executing program 0 (id=8579): bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0xa, 0xfffffffe, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x4b, 0x8d, &(0x7f0000000580)="e683642a0db53f38183ebc7e3ec674b2cf40d58f62da07572b1730bc57dfe5e71b81c163d22a9b152f0c08c1fcbc712f750bf51d263d7d1fcf64a63a7252887275a1c35300dbe1751fa0e6", &(0x7f0000000740)=""/141, 0x4, 0x0, 0xd6, 0xf6, &(0x7f00000008c0)="3777ae08e6c7906fecebe2dce1da3787cf294ce3f37f39705676840d92c82c41491f05e687fac27f31baecd25eddb4a5cf8cf4866df37d1c2cf06487a3a8f5c1c48d3dff54c1f6efcf7fa6693d92d7feefa1d4375c54c3c088e4ebdb0b24d74bd01cd838dc7b9dc6a13d45e982265ee82f27c50ecfe994bc54f262bfc69ec4e95d2f5021d88c522170a3e4bc67c0d45c5716e1e85d1c60b431f5fb2a0902b9008bb1d3eca3ef08186b296433555f8ea6074dc9911717018c1ff423c298d7be575beeaa44774cb76a0e2239cb917305ccf7ba4e3e590a", &(0x7f0000000a40)="3ca035a3ab0306829ca33908f0fd325ae235fd42da47425fa5f34a37aea0d301ee7f00a81670c0fadba59580d35a61c90dbd10b6799573f764287ce31fcffab823d34068cfdcea6e9fe6f423c3d26865197f805c5610bae7aa4836c442993dfbb2bc6bf9e12fb3c95def1f1d4cdcff1c49fd953261452b2de81dadc2190952d9a7af3c989b7db8f61a27074d819c254cbf511b7c6857b28f1529d67fa035e609f14e2a460c3a8c8b691f6d4395fbbef7a5d22d69179da123f5abd575a3765690936e8796573297bceddf599970c60811ff015f6fd210bb336ff058de5f515d279cab81fe7376c4dc110bcbe8c2fe87e8c7d7d9d187b9", 0x5, 0x0, 0xec}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 763.297798ms ago: executing program 1 (id=8580): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x1c1741, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 718.922452ms ago: executing program 4 (id=8581): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x8d1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x101}, @alu={0x4, 0x0, 0x4, 0x7, 0x9, 0x4, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x10, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x1, 0xe, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000280)=[r0, r0, r0, r0], &(0x7f0000000300)=[{0x2, 0x4, 0x6, 0x7}, {0x2, 0x8, 0x4}, {0x3, 0x3, 0x1, 0x1}, {0x3, 0x4, 0xc, 0x3}, {0x3, 0x5, 0xd, 0x8}, {0x0, 0x4, 0xb, 0x7}, {0x0, 0x4, 0xd, 0x6}], 0x10, 0xbf}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x20, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @printk={@llu}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x35, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x0, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000740)=[{0x0, 0x3, 0x3, 0x6}, {0x1, 0x3, 0x1, 0xa}, {0x5, 0x3, 0xc, 0xa}, {0x5, 0x5, 0xf, 0xa}, {0x1, 0x5, 0x6, 0xf}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@cgroup, r1, 0x5, 0x8, 0x0, @void, @value=r2}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x28}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b400000000090000dd0a00000000000073019d00000000009500000000000000425e494e53a90f38f870e056d03b2010633dee8a3a6601dbd212"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x300}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) (async) socketpair(0x10, 0x1, 0x2b, &(0x7f0000000880)) 637.9297ms ago: executing program 4 (id=8582): bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='fscache_active\x00', r0, 0x0, 0x400}, 0x18) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r3, 0x0, 0x4}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRESOCT=r2, @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB="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"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r9) (async) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x3, {0xffffffffffffffff, 0x800001, 0x2002}}, 0x10, 0x0}, 0x4040000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) 636.97424ms ago: executing program 4 (id=8583): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYRESHEX=r0], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000cbc08104000000000000000000000000390000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x9, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4ee}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000980), 0xc) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) 618.420131ms ago: executing program 2 (id=8584): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a000000040000000c0000000b00000000000000", @ANYRES32, @ANYBLOB="000000000c8c98e8449950cc000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) socketpair(0x5, 0x4, 0x6, &(0x7f00000004c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000f3ff00000000000e0000000000000000000000000600000d00000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000c20000000000000000000000900000000000000000000000900000000000000000000000902"], 0x0, 0x96}, 0x28) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r4}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000002000000000000040000000000005e6cd86cdabcc92782750e67895d35d8bffc8a25e7b652f4d88aa3b8b8ffc691072485bb6f601c1a636dba2b276265f87914245e5ff6f3226d40ff70ea29c0971ed5b53d59a2e082f5248d1c1a949548702662d70616a802fca4b269b90bfc5f7f6a2d755af8ead4432aebb0959b551aa308c846ad3105d34cdd69e02d982dba01b21536cd2bdb5a8f6458e4e21e8014dd401ac8ee"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x10000, @value=r2}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0x7, 0x1, 0x0, 0x0, 0x10684, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x5, 0x1}, 0x40a1, 0xc8, 0x0, 0x7, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffe, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fcae68da850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="c2009500000000009deaaeb6411a6b097900007a4e00"/33], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r13, 0xd8, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001000), 0x8, 0x0, 0x8, 0xffffffffffffff0e, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) 555.722337ms ago: executing program 0 (id=8585): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 480.972304ms ago: executing program 1 (id=8586): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f00000006c0)=r1}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r3, r2}, 0xc) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 420.96255ms ago: executing program 0 (id=8587): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180500000200000000000000000000001800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x309200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000001c0)=r0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) write$cgroup_devices(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe80"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 402.947502ms ago: executing program 1 (id=8588): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="e5db9638edbc"}) write$cgroup_devices(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e030800dd5eaf3ef55044"], 0xffdd) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1140, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x39, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x100000001000, 0xfffffffffffffffc}, 0x31, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x9) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x60) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x19, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) 104.00741ms ago: executing program 0 (id=8589): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x80000101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000300)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x1, {0x4e23}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x90}, 0x4040) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='\xb6l\x1a\xa4KsV\x82\xc4/\xe6\xc4J\x94Z\x90\x16\xa4\x9b\x96+\xf6\x1bU\x03\n\xbf\xf4\x81\xe8\xf0\x1f^Y\xd1\xed\f\xb51\\b\xa5\x19o\xa2\x80\xff\xcd\xe9\xf5{\x9f\x89c\xaf\x8cu\xa4\b\x9ayy\x86\xdf\xd36\x02#,\xd1\x93\x1e\xfe%&\xda\xcdI\x15a\x041\x1c\xf0#O\xb2\xcd\x92\x19YBZ.\x1f\xa1\xf5W9{\xef\xb0\xce\x91\x95\xd8\xcf\x0f\xfd\x9ee\xa9a\xf4\x02\x9d@{*?\x81\xee\xbe\xbe\x01\xaaT\x87W\x12\x80\x1b8@\x93\x05~\xdbg\xdf\xc3\x8cu&)\xc0\x19\f\'\xcd\xad\xf8\xad\xf8\x8f\xf9:6\f\x83\xfeXI\xab\x99\xb0\x00\xa1\'9\xb8\x11@\x14\nn\xe5\xd07\xff\x9d') r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r11}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r10}, 0x10) 0s ago: executing program 1 (id=8590): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000016000000b40000007f"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x11, 0x25, &(0x7f0000001080)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x67}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}], &(0x7f00000011c0)='GPL\x00', 0x5, 0xef, &(0x7f0000001200)=""/239, 0x41000, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x0, 0x10, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000013c0)=[0xffffffffffffffff, r0, r6, r0], &(0x7f0000001400)=[{0x0, 0x3, 0x3, 0x4}, {0x1, 0x1, 0x8, 0xb}, {0x3, 0x2, 0xa, 0x9}, {0x5, 0x5, 0x5, 0x9}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r10}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000790048020000000018000000000000000000000000000000950000000000000095000000000000009674a56f931144aee621c0fc0ba74afa1b94941d565f18543aeaeaa5ded63fe10500000097fc11a53b2bae415006005eb16564753d1c78672710ace88b3fdf081aa9b6174d0a888721cb1e198383b44c81bb623f32d06f0da119a9bf9c02c82748304c29fddc9f6e3ac97e17a986f43947411ba5934821a995e1043d0ddbfa3957fb55952b0cf6167bb7f2c435ec118c0168803f92e4b58e269da22e25afc7cd090d4c1b685b9469d75bb085db73f51bb1ab4b72fef96a8fecfc735a7987841ecc408bab2bbed336f3710d94aa7bac92ccea5537e01eb981c660debe0b6b106ab3965591ea8ee08aeba03b26e16acee70ff4fadf7766db9a77c7520e1653656717eb0eb5da65ad44be8c9cb6f6c5bc6f57c4116843c786a86347bd2ce7b7a76508785b2d7d76c9277369e35b282f0011433ca4640d8d69b0881ccd75a7e268f983555a66375518e6187467e6f918ccd3d04160001f0def821d84409aa6cd786e6f01c37e4ea924982f1430489c36637af0fc4a81b33e663038c26e1b0c975faa71e00fb96871954d9e246ab179d04702834ada3ed9fab88df20a36d6f38d448bf05d929ce7ed83c6ac652a16332172a3b64d6103"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 12.600660][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 12.600673][ T24] audit: type=1400 audit(1766767496.030:59): avc: denied { transition } for pid=214 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.612969][ T24] audit: type=1400 audit(1766767496.030:60): avc: denied { noatsecure } for pid=214 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.621300][ T24] audit: type=1400 audit(1766767496.040:61): avc: denied { write } for pid=214 comm="sh" path="pipe:[13069]" dev="pipefs" ino=13069 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.629826][ T24] audit: type=1400 audit(1766767496.040:62): avc: denied { rlimitinh } for pid=214 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.636621][ T24] audit: type=1400 audit(1766767496.040:63): avc: denied { siginh } for pid=214 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.187' (ED25519) to the list of known hosts. [ 20.192256][ T24] audit: type=1400 audit(1766767503.620:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.193686][ T267] cgroup: Unknown subsys name 'net' [ 20.200585][ T24] audit: type=1400 audit(1766767503.630:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.209775][ T24] audit: type=1400 audit(1766767503.640:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.210091][ T267] cgroup: Unknown subsys name 'devices' [ 20.384378][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.390038][ T267] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 20.621611][ T24] audit: type=1400 audit(1766767504.050:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.637827][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.645163][ T24] audit: type=1400 audit(1766767504.050:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.679276][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.679335][ T24] audit: type=1400 audit(1766767504.050:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.711375][ T24] audit: type=1400 audit(1766767504.090:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.737025][ T24] audit: type=1400 audit(1766767504.090:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.762925][ T24] audit: type=1400 audit(1766767504.100:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.788454][ T24] audit: type=1400 audit(1766767504.100:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.790103][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.797426][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.805094][ T275] device bridge_slave_0 entered promiscuous mode [ 21.820500][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.828306][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.835960][ T275] device bridge_slave_1 entered promiscuous mode [ 21.880747][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.887923][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.895755][ T279] device bridge_slave_0 entered promiscuous mode [ 21.902788][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.910184][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.917948][ T276] device bridge_slave_0 entered promiscuous mode [ 21.925494][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.932756][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.940289][ T276] device bridge_slave_1 entered promiscuous mode [ 21.954791][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.961861][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.969666][ T279] device bridge_slave_1 entered promiscuous mode [ 21.998246][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.005362][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.013280][ T278] device bridge_slave_0 entered promiscuous mode [ 22.031222][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.038604][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.046576][ T277] device bridge_slave_0 entered promiscuous mode [ 22.053592][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.060734][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.068194][ T278] device bridge_slave_1 entered promiscuous mode [ 22.084546][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.091803][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.099519][ T277] device bridge_slave_1 entered promiscuous mode [ 22.229079][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.236226][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.243618][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.251470][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.278987][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.286933][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.294286][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.301522][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.312127][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.319321][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.326590][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.333619][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.343004][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.350237][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.357562][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.364625][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.389359][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.396754][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.404485][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.411914][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.419783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.427505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.436139][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.443382][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.450730][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.476114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.484546][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.491692][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.509710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.517645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.526431][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.533595][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.541218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.550325][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.557493][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.568119][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.575677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.596453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.604898][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.613311][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.621696][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.628790][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.636579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.644929][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.653347][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.660494][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.671659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.694233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.703624][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.710654][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.718214][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.727507][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.734582][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.741954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.750050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.769390][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.778057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.785904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.794182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.802212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.812115][ T278] device veth0_vlan entered promiscuous mode [ 22.830903][ T275] device veth0_vlan entered promiscuous mode [ 22.837479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.846216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.854550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.862749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.870727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.879573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.887967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.896513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.905495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.913562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.921700][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.929252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.940770][ T276] device veth0_vlan entered promiscuous mode [ 22.953841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.961964][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.970554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.978939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.987601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.995899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.012956][ T278] device veth1_macvtap entered promiscuous mode [ 23.021255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.029293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.038146][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.046323][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.054819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.063348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.071579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.079953][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.087036][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.094834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.103386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.111570][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.118639][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.126185][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.134352][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.142368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.150114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.157687][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.166746][ T277] device veth0_vlan entered promiscuous mode [ 23.175578][ T275] device veth1_macvtap entered promiscuous mode [ 23.183256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.191762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.200239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.217282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.225875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.234874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.243730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.251972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.260309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.274943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.283429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.291869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.300499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.313391][ T276] device veth1_macvtap entered promiscuous mode [ 23.323853][ T277] device veth1_macvtap entered promiscuous mode [ 23.333668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.342065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.350703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.359101][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.367391][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.375187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.383467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.391698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.408770][ T278] request_module fs-gadgetfs succeeded, but still no fs? [ 23.418646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.428776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.438733][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.447448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.455829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.464421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.474496][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.482859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.493226][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.501648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.512023][ T278] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.557626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.572944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.587814][ T279] device veth0_vlan entered promiscuous mode [ 23.615071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.623461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.638397][ T279] device veth1_macvtap entered promiscuous mode [ 23.645614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.654310][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.663509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.679770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.688470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.697851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.706827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.750191][ C0] hrtimer: interrupt took 26539 ns [ 24.199153][ T353] device syzkaller0 entered promiscuous mode [ 24.815113][ T406] device veth1_macvtap left promiscuous mode [ 24.962001][ T414] syz.3.31[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.962052][ T414] syz.3.31[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.290990][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 25.291003][ T24] audit: type=1400 audit(1766767508.720:117): avc: denied { relabelfrom } for pid=422 comm="syz.3.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.452003][ T24] audit: type=1400 audit(1766767508.760:118): avc: denied { relabelto } for pid=422 comm="syz.3.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.582720][ T24] audit: type=1400 audit(1766767508.980:120): avc: denied { create } for pid=441 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 25.662157][ T24] audit: type=1400 audit(1766767508.980:121): avc: denied { create } for pid=441 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 25.752526][ T24] audit: type=1400 audit(1766767508.970:119): avc: denied { create } for pid=432 comm="syz.4.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 26.031120][ T467] bridge0: port 3(veth1_to_batadv) entered blocking state [ 26.099927][ T467] bridge0: port 3(veth1_to_batadv) entered disabled state [ 26.153370][ T467] device veth1_to_batadv entered promiscuous mode [ 26.160608][ T467] bridge0: port 3(veth1_to_batadv) entered blocking state [ 26.168008][ T467] bridge0: port 3(veth1_to_batadv) entered forwarding state [ 27.399352][ T534] device veth0_vlan left promiscuous mode [ 27.449660][ T534] device veth0_vlan entered promiscuous mode [ 27.496063][ T24] audit: type=1400 audit(1766767510.930:122): avc: denied { create } for pid=527 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 27.682311][ T24] audit: type=1400 audit(1766767511.110:123): avc: denied { create } for pid=535 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.955346][ T557] cgroup: syz.2.69 (557) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.001964][ T557] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.822960][ T24] audit: type=1400 audit(1766767512.260:124): avc: denied { create } for pid=587 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 29.082342][ T24] audit: type=1400 audit(1766767512.500:125): avc: denied { create } for pid=610 comm="syz.2.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.121418][ T609] device syzkaller0 entered promiscuous mode [ 29.491692][ T24] audit: type=1400 audit(1766767512.920:126): avc: denied { create } for pid=628 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.985353][ T645] device syzkaller0 entered promiscuous mode [ 30.151433][ T663] p: renamed from pim6reg1 [ 30.963183][ T712] device syzkaller0 entered promiscuous mode [ 31.461546][ T760] bridge0: port 3(veth1_to_batadv) entered disabled state [ 31.470445][ T760] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.479685][ T760] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.675089][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 31.675103][ T24] audit: type=1400 audit(1766767515.110:128): avc: denied { write } for pid=789 comm="syz.2.129" name="cgroup.subtree_control" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 31.707170][ T24] audit: type=1400 audit(1766767515.110:129): avc: denied { open } for pid=789 comm="syz.2.129" path="" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 31.987520][ T819] device veth0_vlan left promiscuous mode [ 31.995079][ T819] device veth0_vlan entered promiscuous mode [ 32.332640][ T842] device ip6tnl0 entered promiscuous mode [ 32.520252][ T24] audit: type=1400 audit(1766767515.950:130): avc: denied { create } for pid=851 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 32.721281][ T24] audit: type=1400 audit(1766767516.120:131): avc: denied { create } for pid=863 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 34.111934][ T923] device sit0 entered promiscuous mode [ 35.155615][ T943] device sit0 entered promiscuous mode [ 35.529768][ T966] syz.4.174[966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.529849][ T966] syz.4.174[966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.541755][ T967] syz.4.174[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.559265][ T967] syz.4.174[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.609521][ T24] audit: type=1400 audit(1766767519.040:132): avc: denied { create } for pid=972 comm="syz.4.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 35.697608][ T983] device syzkaller0 entered promiscuous mode [ 35.856912][ T999] device pim6reg1 entered promiscuous mode [ 37.336622][ T24] audit: type=1400 audit(1766767520.760:133): avc: denied { create } for pid=1060 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 37.498250][ T1069] device pim6reg1 entered promiscuous mode [ 38.297268][ T1096] device pim6reg1 entered promiscuous mode [ 38.802531][ T1121] device sit0 entered promiscuous mode [ 39.309078][ T1137] ------------[ cut here ]------------ [ 39.321341][ T1137] trace type BPF program uses run-time allocation [ 39.342835][ T1137] WARNING: CPU: 0 PID: 1137 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 39.383100][ T1137] Modules linked in: [ 39.387117][ T1137] CPU: 0 PID: 1137 Comm: syz.2.222 Not tainted syzkaller #0 [ 39.429217][ T1137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 39.492803][ T1137] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 39.512739][ T1137] Code: 85 e9 14 fe ff ff e8 19 fa ef ff 31 c0 e9 15 fe ff ff e8 0d fa ef ff c6 05 a4 d1 2c 05 01 48 c7 c7 a0 7f 05 85 e8 7a db fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 39.583853][ T1137] RSP: 0018:ffffc90000d97468 EFLAGS: 00010246 [ 39.590058][ T1137] RAX: e4ea8b966c553c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 39.598387][ T1137] RDX: ffffc9000253f000 RSI: 0000000000001f63 RDI: 0000000000001f64 [ 39.612659][ T1137] RBP: ffffc90000d974b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 39.643154][ T1137] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff888112ae4000 [ 39.674119][ T1137] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888113bca800 [ 39.695520][ T1137] FS: 00007fad613e56c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 39.705341][ T1144] device veth0_vlan left promiscuous mode [ 39.729772][ T1137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.743407][ T1137] CR2: 0000000100000001 CR3: 000000010ff54000 CR4: 00000000003506a0 [ 39.769255][ T1137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.785165][ T1144] device veth0_vlan entered promiscuous mode [ 39.792670][ T1137] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 39.808484][ T1137] Call Trace: [ 39.842076][ T1137] ? __fdget+0x1a1/0x230 [ 39.847570][ T1137] resolve_pseudo_ldimm64+0x526/0x1020 [ 39.892957][ T1137] ? bpf_check+0xd680/0xd680 [ 39.919873][ T1137] ? kvmalloc_node+0x88/0x130 [ 39.952504][ T1137] bpf_check+0x8d4b/0xd680 [ 39.964868][ T1137] ? bpf_get_btf_vmlinux+0x60/0x60 [ 39.985705][ T1137] ? 0xffffffffa002a000 [ 39.991412][ T1137] ? is_bpf_text_address+0x177/0x190 [ 39.997218][ T1137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.003534][ T1137] ? __kernel_text_address+0xa0/0x100 [ 40.009034][ T1137] ? unwind_get_return_address+0x4d/0x90 [ 40.022057][ T1137] ? stack_trace_save+0xe0/0xe0 [ 40.027434][ T1137] ? arch_stack_walk+0xee/0x140 [ 40.038866][ T1137] ? stack_trace_save+0x98/0xe0 [ 40.043928][ T1137] ? stack_trace_snprint+0xf0/0xf0 [ 40.051016][ T1137] ? __kasan_slab_alloc+0x69/0xf0 [ 40.056164][ T1137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.061956][ T1137] ? __kasan_kmalloc+0xec/0x110 [ 40.068304][ T1137] ? __kasan_kmalloc+0xda/0x110 [ 40.074212][ T1137] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 40.079944][ T1137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.089727][ T1137] ? security_bpf_prog_alloc+0x62/0x90 [ 40.096290][ T1137] ? bpf_prog_load+0x949/0x1420 [ 40.101856][ T1137] ? __se_sys_bpf+0x442/0x680 [ 40.106815][ T1137] ? __x64_sys_bpf+0x7b/0x90 [ 40.111486][ T1137] ? do_syscall_64+0x31/0x40 [ 40.116239][ T1137] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.122521][ T1137] ? memset+0x35/0x40 [ 40.126619][ T1137] ? bpf_obj_name_cpy+0x193/0x1e0 [ 40.142854][ T1137] bpf_prog_load+0xf5a/0x1420 [ 40.147702][ T1137] ? map_freeze+0x320/0x320 [ 40.152393][ T1137] ? selinux_bpf+0xc7/0xf0 [ 40.157319][ T1137] ? security_bpf+0x82/0xa0 [ 40.161888][ T1137] __se_sys_bpf+0x442/0x680 [ 40.166747][ T1137] ? __x64_sys_bpf+0x90/0x90 [ 40.171524][ T1137] ? __kasan_check_read+0x11/0x20 [ 40.176961][ T1137] __x64_sys_bpf+0x7b/0x90 [ 40.181624][ T1137] do_syscall_64+0x31/0x40 [ 40.186333][ T1137] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.192665][ T1137] RIP: 0033:0x7fad6297d749 [ 40.199778][ T1137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.254956][ T1137] RSP: 002b:00007fad613e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.296579][ T1137] RAX: ffffffffffffffda RBX: 00007fad62bd3fa0 RCX: 00007fad6297d749 [ 40.312482][ T1137] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 40.320695][ T1137] RBP: 00007fad62a01f91 R08: 0000000000000000 R09: 0000000000000000 [ 40.378618][ T1137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.387421][ T1137] R13: 00007fad62bd4038 R14: 00007fad62bd3fa0 R15: 00007ffe7224e5f8 [ 40.396744][ T1137] ---[ end trace 84e5a36508a0a581 ]--- [ 41.633439][ T24] audit: type=1400 audit(1766767525.070:134): avc: denied { create } for pid=1204 comm="syz.4.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 41.807495][ T1202] device syzkaller0 entered promiscuous mode [ 42.058796][ T1242] device wg2 entered promiscuous mode [ 42.586274][ T1248] syz.2.252[1248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.621564][ T1284] device pim6reg1 entered promiscuous mode [ 42.791023][ T1291] device veth1_macvtap left promiscuous mode [ 43.310685][ T24] audit: type=1400 audit(1766767526.740:135): avc: denied { create } for pid=1319 comm="syz.2.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 44.265124][ T24] audit: type=1400 audit(1766767527.700:136): avc: denied { create } for pid=1352 comm="syz.3.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 44.614799][ T1381] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 44.625469][ T1381] device syzkaller0 entered promiscuous mode [ 45.114167][ T1409] syz.2.286[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.114231][ T1409] syz.2.286[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.699539][ T1439] device veth1_macvtap left promiscuous mode [ 45.810978][ T1439] device macsec0 entered promiscuous mode [ 46.139076][ T1444] syz.4.297[1444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.139137][ T1444] syz.4.297[1444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.181841][ T1445] syz.4.297[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.227041][ T1445] syz.4.297[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.272515][ T1446] syz.4.297[1446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.352595][ T1446] syz.4.297[1446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.321158][ T1480] syz.2.303 (1480) used obsolete PPPIOCDETACH ioctl [ 48.394995][ T1487] device lo entered promiscuous mode [ 48.675676][ T1491] device syzkaller0 entered promiscuous mode [ 67.459988][ T1531] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.467502][ T1531] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.475514][ T1531] device bridge_slave_0 entered promiscuous mode [ 67.483625][ T1531] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.490666][ T1531] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.498242][ T1531] device bridge_slave_1 entered promiscuous mode [ 67.511877][ T1530] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.520648][ T1530] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.528182][ T1530] device bridge_slave_0 entered promiscuous mode [ 67.536821][ T1530] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.543919][ T1530] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.551325][ T1530] device bridge_slave_1 entered promiscuous mode [ 67.603688][ T1532] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.610796][ T1532] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.618271][ T1532] device bridge_slave_0 entered promiscuous mode [ 67.626626][ T1532] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.633817][ T1532] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.641408][ T1532] device bridge_slave_1 entered promiscuous mode [ 67.684272][ T1534] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.691536][ T1534] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.699489][ T1534] device bridge_slave_0 entered promiscuous mode [ 67.706620][ T1534] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.713788][ T1534] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.721125][ T1534] device bridge_slave_1 entered promiscuous mode [ 67.792729][ T1533] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.799796][ T1533] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.807292][ T1533] device bridge_slave_0 entered promiscuous mode [ 67.814754][ T1533] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.822000][ T1533] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.830198][ T1533] device bridge_slave_1 entered promiscuous mode [ 67.850527][ T24] audit: type=1400 audit(1766767551.280:137): avc: denied { create } for pid=1531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 67.871592][ T24] audit: type=1400 audit(1766767551.280:138): avc: denied { write } for pid=1531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 67.892475][ T24] audit: type=1400 audit(1766767551.280:139): avc: denied { read } for pid=1531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 67.940333][ T1531] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.947777][ T1531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.955071][ T1531] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.962116][ T1531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.992590][ T1532] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.999721][ T1532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.007071][ T1532] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.014329][ T1532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.049286][ T1530] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.056390][ T1530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.063963][ T1530] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.070996][ T1530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.087314][ T1534] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.094392][ T1534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.101895][ T1534] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.108959][ T1534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.130114][ T1533] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.137212][ T1533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.144699][ T1533] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.151814][ T1533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.168359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.176149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.185125][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.192785][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.200098][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.207514][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.214778][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.222213][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.229843][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.237787][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.245167][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.265054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.273022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.283363][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.290606][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.298274][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.306845][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.313980][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.342751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.350909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.359190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.368176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.385173][ T1400] device veth1_to_batadv left promiscuous mode [ 68.391551][ T1400] bridge0: port 3(veth1_to_batadv) entered disabled state [ 68.399255][ T1400] device bridge_slave_1 left promiscuous mode [ 68.405419][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.413191][ T1400] device bridge_slave_0 left promiscuous mode [ 68.419322][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.427554][ T1400] device veth1_macvtap left promiscuous mode [ 68.513910][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.521433][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.530485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.538230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.546351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.554967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.564239][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.571366][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.578851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.587297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.595853][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.603013][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.610588][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.619238][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.627744][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.635051][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.642782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.650946][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.659161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.667555][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.680093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.688786][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.697152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.705711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.713961][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.720999][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.738284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.746222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.754568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.763470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.771628][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.778738][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.786503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.794922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.803433][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.810584][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.818007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.826962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.835387][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.842666][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.855089][ T1531] device veth0_vlan entered promiscuous mode [ 68.869580][ T1532] device veth0_vlan entered promiscuous mode [ 68.877426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.886759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.894436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.902367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.910646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.919213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.928265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.936718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.945025][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.952878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.975338][ T1531] device veth1_macvtap entered promiscuous mode [ 68.983787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.993170][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.002004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.011296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.023892][ T1532] device veth1_macvtap entered promiscuous mode [ 69.034825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.046948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.055598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.063563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.081187][ T1533] device veth0_vlan entered promiscuous mode [ 69.088240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.096845][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.106194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.114716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.123303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.131409][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.143149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.151466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.160058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.169213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.178445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.186953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.197616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.205901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.228882][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.237811][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.246588][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.265452][ T1530] device veth0_vlan entered promiscuous mode [ 69.281826][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 69.294663][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.303362][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.311436][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.320835][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.329106][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.337696][ T1533] device veth1_macvtap entered promiscuous mode [ 69.358766][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 69.368603][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.382260][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.391879][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.405941][ T1530] device veth1_macvtap entered promiscuous mode [ 69.423972][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.431802][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.440670][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.450000][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.458632][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.468572][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.476607][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.535085][ T1534] device veth0_vlan entered promiscuous mode [ 69.541470][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.549373][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.681609][ T1555] device syzkaller0 entered promiscuous mode [ 69.734877][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.749058][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.758695][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.770626][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.779965][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.788730][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.799925][ T1534] device veth1_macvtap entered promiscuous mode [ 69.896828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.921680][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.981097][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.040703][ T1560] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.048608][ T1560] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.090967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.099551][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.270912][ T24] audit: type=1400 audit(1766767553.700:140): avc: denied { create } for pid=1564 comm="syz.6.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 71.257539][ T1400] device bridge_slave_1 left promiscuous mode [ 71.266528][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.305735][ T1400] device bridge_slave_0 left promiscuous mode [ 71.351488][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.374250][ T1400] device bridge_slave_1 left promiscuous mode [ 71.380574][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.388458][ T1400] device bridge_slave_0 left promiscuous mode [ 71.395000][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.405776][ T1400] device bridge_slave_1 left promiscuous mode [ 71.412625][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.420865][ T1400] device bridge_slave_0 left promiscuous mode [ 71.427593][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.436208][ T1400] device bridge_slave_1 left promiscuous mode [ 71.442889][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.450664][ T1400] device bridge_slave_0 left promiscuous mode [ 71.457288][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.467295][ T1400] device veth0_vlan left promiscuous mode [ 71.473733][ T1400] device veth0_vlan left promiscuous mode [ 71.479870][ T1400] device veth1_macvtap left promiscuous mode [ 71.807910][ T1616] p: renamed from pim6reg1 [ 72.404003][ T1660] pimreg: tun_chr_ioctl cmd 1074025677 [ 72.414014][ T1660] pimreg: linktype set to 6 [ 72.862390][ T24] audit: type=1400 audit(1766767556.290:141): avc: denied { create } for pid=1668 comm="syz.5.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 73.812368][ T1721] device team_slave_1 entered promiscuous mode [ 73.827086][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.852994][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.135263][ T24] audit: type=1400 audit(1766767557.570:142): avc: denied { create } for pid=1732 comm="syz.5.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 74.412628][ T1752] device veth1_macvtap left promiscuous mode [ 74.430813][ T1752] device veth1_macvtap entered promiscuous mode [ 74.461154][ T1752] device macsec0 entered promiscuous mode [ 74.550880][ T1762] pimreg: tun_chr_ioctl cmd 1074025677 [ 74.562116][ T1762] pimreg: linktype set to 6 [ 74.652996][ T1761] device wg2 entered promiscuous mode [ 75.529344][ T24] audit: type=1400 audit(1766767558.960:143): avc: denied { create } for pid=1792 comm="syz.9.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 75.756293][ T1809] device syzkaller0 entered promiscuous mode [ 76.841175][ T1856] device syzkaller0 entered promiscuous mode [ 77.796769][ T24] audit: type=1400 audit(1766767561.230:144): avc: denied { create } for pid=1888 comm="syz.7.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 77.944581][ T1892] device veth1_macvtap left promiscuous mode [ 77.950630][ T1892] device macsec0 entered promiscuous mode [ 79.649486][ T1948] device syzkaller0 entered promiscuous mode [ 79.955991][ T1971] device ip6tnl0 entered promiscuous mode [ 81.942446][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 81.988785][ T2066] device veth1_macvtap left promiscuous mode [ 82.086966][ T2066] device macsec0 left promiscuous mode [ 82.636226][ T2106] syz.5.471[2106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.636293][ T2106] syz.5.471[2106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.265561][ T24] audit: type=1400 audit(1766767566.640:145): avc: denied { create } for pid=2131 comm="syz.7.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 83.525854][ T2175] device syzkaller0 entered promiscuous mode [ 84.205999][ T2207] device wg2 entered promiscuous mode [ 85.339625][ T2265] tap0: tun_chr_ioctl cmd 1074025677 [ 85.369409][ T2265] tap0: linktype set to 780 [ 85.392936][ T2266] tap0: tun_chr_ioctl cmd 1074025677 [ 85.402988][ T2266] tap0: linktype set to 780 [ 85.543110][ T2282] syz.7.520[2282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.543167][ T2282] syz.7.520[2282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.957367][ T2293] bridge0: port 3(gretap0) entered blocking state [ 85.977661][ T24] audit: type=1400 audit(1766767569.410:146): avc: denied { create } for pid=2296 comm="syz.5.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.062765][ T2293] bridge0: port 3(gretap0) entered disabled state [ 86.112496][ T2293] device gretap0 entered promiscuous mode [ 86.137395][ T2293] bridge0: port 3(gretap0) entered blocking state [ 86.144332][ T2293] bridge0: port 3(gretap0) entered forwarding state [ 86.918435][ T2307] device pim6reg1 entered promiscuous mode [ 87.473853][ T2345] device syzkaller0 entered promiscuous mode [ 87.639931][ T2361] device veth0_vlan left promiscuous mode [ 87.675410][ T2361] device veth0_vlan entered promiscuous mode [ 87.872635][ T2370] device wg2 entered promiscuous mode [ 88.402724][ T2395] device veth1_macvtap left promiscuous mode [ 88.574597][ T2395] device veth1_macvtap entered promiscuous mode [ 88.597557][ T2395] device macsec0 entered promiscuous mode [ 88.698617][ T24] audit: type=1400 audit(1766767572.090:147): avc: denied { create } for pid=2401 comm="syz.9.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 88.798527][ T24] audit: type=1400 audit(1766767572.230:148): avc: denied { create } for pid=2407 comm="syz.5.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 89.012881][ T2435] device veth0_vlan left promiscuous mode [ 89.022858][ T2435] device veth0_vlan entered promiscuous mode [ 89.038212][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.060242][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.081464][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.218704][ T2488] device veth0_vlan left promiscuous mode [ 90.228596][ T2488] device veth0_vlan entered promiscuous mode [ 91.000805][ T24] audit: type=1400 audit(1766767574.430:149): avc: denied { create } for pid=2525 comm="syz.5.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 91.067384][ T2524] p: renamed from pim6reg1 [ 91.089979][ T2524] device sit0 entered promiscuous mode [ 91.127996][ T2524] syz.8.585[2524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.128083][ T2524] syz.8.585[2524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.351516][ T24] audit: type=1400 audit(1766767574.780:150): avc: denied { create } for pid=2548 comm="syz.7.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 91.401665][ T2559] device syzkaller0 entered promiscuous mode [ 91.542603][ T24] audit: type=1400 audit(1766767574.970:151): avc: denied { read } for pid=2588 comm="syz.5.602" name="cgroup.subtree_control" dev="cgroup2" ino=476 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 91.719176][ T2578] device syzkaller0 entered promiscuous mode [ 91.844901][ T2616] device sit0 left promiscuous mode [ 91.899039][ T2616] device sit0 entered promiscuous mode [ 92.145996][ T2603] device syzkaller0 entered promiscuous mode [ 92.157447][ T2618] device pim6reg1 entered promiscuous mode [ 92.928336][ T2657] device syzkaller0 entered promiscuous mode [ 93.242905][ T2685] syz.6.626[2685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.242960][ T2685] syz.6.626[2685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.521561][ T2700] device syzkaller0 entered promiscuous mode [ 95.408029][ T2775] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.415323][ T2775] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.460388][ T2775] device bridge_slave_1 left promiscuous mode [ 95.467167][ T2775] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.475448][ T2775] device bridge_slave_0 left promiscuous mode [ 95.481864][ T2775] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.569489][ T2786] syz.9.658[2786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.569882][ T2786] syz.9.658[2786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.700011][ T2783] device veth0_vlan left promiscuous mode [ 95.718410][ T2783] device veth0_vlan entered promiscuous mode [ 95.993353][ T2802] device syzkaller0 entered promiscuous mode [ 96.146958][ T2806] device veth0_vlan left promiscuous mode [ 96.153456][ T2806] device veth0_vlan entered promiscuous mode [ 96.844010][ T2835] device sit0 left promiscuous mode [ 97.062644][ T2842] device pim6reg1 entered promiscuous mode [ 97.258276][ T2858] device veth1_macvtap left promiscuous mode [ 97.290346][ T2860] device xfrm0 entered promiscuous mode [ 97.326721][ T2863] device veth0_vlan left promiscuous mode [ 97.427490][ T2863] device veth0_vlan entered promiscuous mode [ 97.509505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.519699][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.548682][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.676512][ T2869] GPL: port 1(erspan0) entered blocking state [ 97.683049][ T2869] GPL: port 1(erspan0) entered disabled state [ 97.689746][ T2869] device erspan0 entered promiscuous mode [ 97.724815][ T2872] GPL: port 1(erspan0) entered blocking state [ 97.730977][ T2872] GPL: port 1(erspan0) entered forwarding state [ 98.341110][ T2883] tap0: tun_chr_ioctl cmd 1074025677 [ 98.352447][ T2883] tap0: linktype set to 780 [ 98.910024][ T2897] device sit0 entered promiscuous mode [ 99.113558][ T2903] device syzkaller0 entered promiscuous mode [ 99.280857][ T2917] device wg2 entered promiscuous mode [ 99.340847][ T2917] device veth0_vlan left promiscuous mode [ 99.413470][ T2917] device veth0_vlan entered promiscuous mode [ 100.207497][ T2950] device syzkaller0 entered promiscuous mode [ 100.350423][ T24] audit: type=1400 audit(1766767583.780:152): avc: denied { append } for pid=2951 comm="syz.9.706" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 100.783242][ T2990] device dummy0 entered promiscuous mode [ 101.782566][ T3036] device sit0 entered promiscuous mode [ 102.632249][ T24] audit: type=1400 audit(1766767586.060:153): avc: denied { create } for pid=3093 comm="syz.6.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 102.690850][ T3096] device veth0_vlan left promiscuous mode [ 102.711466][ T3096] device veth0_vlan entered promiscuous mode [ 102.783297][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.822832][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.875596][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.133227][ T3103] device syzkaller0 entered promiscuous mode [ 103.504643][ T3131] syz.9.758 uses obsolete (PF_INET,SOCK_PACKET) [ 103.810945][ T3150] device wg2 left promiscuous mode [ 103.953795][ T3151] device wg2 entered promiscuous mode [ 106.084948][ T3182] device syzkaller0 entered promiscuous mode [ 106.194115][ T3210] device veth1_macvtap left promiscuous mode [ 106.252052][ T3213] device syzkaller0 entered promiscuous mode [ 107.725618][ T3254] syz.6.791[3254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.725710][ T3254] syz.6.791[3254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.009140][ T24] audit: type=1400 audit(1766767591.440:154): avc: denied { create } for pid=3251 comm="syz.6.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 109.104100][ T3278] device wg2 left promiscuous mode [ 109.153423][ T3285] device veth0_vlan left promiscuous mode [ 109.170169][ T24] audit: type=1400 audit(1766767592.600:155): avc: denied { create } for pid=3291 comm="syz.7.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 109.199176][ T3285] device veth0_vlan entered promiscuous mode [ 109.248000][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.344435][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.354350][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.570716][ T24] audit: type=1400 audit(1766767593.000:156): avc: denied { read } for pid=3321 comm="syz.5.808" dev="nsfs" ino=4026532292 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 109.637654][ T24] audit: type=1400 audit(1766767593.040:157): avc: denied { open } for pid=3321 comm="syz.5.808" path="uts:[4026532292]" dev="nsfs" ino=4026532292 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 109.751297][ T3324] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 109.757790][ T3324] syzkaller0: linktype set to 1 [ 112.192209][ T3415] device syzkaller0 entered promiscuous mode [ 114.183126][ T3441] device veth1_macvtap entered promiscuous mode [ 114.281485][ T3441] device macsec0 entered promiscuous mode [ 114.527675][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.351862][ T3487] device wg2 left promiscuous mode [ 118.352660][ T3549] syz.5.871[3549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.352718][ T3549] syz.5.871[3549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.377550][ T3548] device veth0_vlan left promiscuous mode [ 118.398004][ T3548] device veth0_vlan entered promiscuous mode [ 118.840317][ T24] audit: type=1400 audit(1766767602.270:158): avc: denied { create } for pid=3563 comm="syz.5.876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 119.687488][ T24] audit: type=1400 audit(1766767603.110:159): avc: denied { create } for pid=3579 comm="syz.6.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 120.169947][ T3596] device wg2 entered promiscuous mode [ 120.644629][ T3615] device syzkaller0 entered promiscuous mode [ 121.072334][ T3632] device pim6reg1 entered promiscuous mode [ 122.150214][ T3690] device pim6reg1 entered promiscuous mode [ 122.303693][ T3709] device sit0 left promiscuous mode [ 122.425324][ T3709] device sit0 entered promiscuous mode [ 122.970057][ T3735] device wg2 entered promiscuous mode [ 125.141880][ T3860] device veth0_vlan left promiscuous mode [ 125.159885][ T3860] device veth0_vlan entered promiscuous mode [ 125.279752][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.305785][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.356064][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.999701][ T3914] device wg2 left promiscuous mode [ 126.018529][ T3914] device wg2 entered promiscuous mode [ 126.126638][ T3917] device syzkaller0 entered promiscuous mode [ 126.215915][ T885] syzkaller0: tun_net_xmit 48 [ 126.304431][ T3917] syzkaller0: create flow: hash 3134466869 index 1 [ 126.333137][ T3915] syzkaller0: delete flow: hash 3134466869 index 1 [ 126.893569][ T3943] device syzkaller0 entered promiscuous mode [ 127.501693][ T3981] device sit0 left promiscuous mode [ 127.560830][ T3981] device sit0 entered promiscuous mode [ 128.561548][ T4032] device pim6reg1 entered promiscuous mode [ 129.044677][ T4055] syz.5.1019[4055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.044767][ T4055] syz.5.1019[4055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.155815][ T4061] syz.5.1019[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.170143][ T4061] syz.5.1019[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.794352][ T4093] device veth0_vlan left promiscuous mode [ 129.842643][ T4093] device veth0_vlan entered promiscuous mode [ 129.850776][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.864019][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.883127][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.353417][ T4126] device wg2 left promiscuous mode [ 130.449322][ T4126] device wg2 entered promiscuous mode [ 131.863660][ T4176] device wg2 left promiscuous mode [ 131.976837][ T4176] device wg2 entered promiscuous mode [ 132.632851][ T4214] device sit0 left promiscuous mode [ 133.059859][ T4222] device syzkaller0 entered promiscuous mode [ 133.227177][ T4242] device veth1_macvtap entered promiscuous mode [ 133.262242][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.403051][ T4242] device pim6reg1 entered promiscuous mode [ 133.953491][ T4299] device sit0 entered promiscuous mode [ 134.402175][ T4335] device sit0 entered promiscuous mode [ 134.604516][ T4338] device wg2 left promiscuous mode [ 134.653877][ T4346] device sit0 left promiscuous mode [ 134.841676][ T4338] device veth1_to_team entered promiscuous mode [ 134.920352][ T4364] device pim6reg1 entered promiscuous mode [ 136.930253][ T4511] cgroup: fork rejected by pids controller in /syz7 [ 137.531693][ T4535] device sit0 entered promiscuous mode [ 138.026526][ T4554] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.047775][ T4554] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.060123][ T4554] device bridge_slave_0 entered promiscuous mode [ 138.076557][ T4554] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.086092][ T4554] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.103516][ T4554] device bridge_slave_1 entered promiscuous mode [ 138.217480][ T4554] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.224723][ T4554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.232056][ T4554] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.239496][ T4554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.356243][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.372798][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.380385][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.390750][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.410774][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.417990][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.427936][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.442701][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.449801][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.489109][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.511565][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.546566][ T4554] device veth0_vlan entered promiscuous mode [ 138.571099][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.580905][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.589484][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.600203][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.628383][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.639307][ T4554] device veth1_macvtap entered promiscuous mode [ 138.655129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.675390][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.697503][ T24] audit: type=1400 audit(1766767622.130:160): avc: denied { unmount } for pid=4554 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 138.979428][ T4602] device veth1_macvtap left promiscuous mode [ 139.053119][ T4602] device macsec0 left promiscuous mode [ 139.138339][ T4604] device veth1_macvtap entered promiscuous mode [ 139.162453][ T4604] device macsec0 entered promiscuous mode [ 139.322164][ T49] GPL: port 1(erspan0) entered disabled state [ 139.344021][ T49] device erspan0 left promiscuous mode [ 139.377073][ T49] GPL: port 1(erspan0) entered disabled state [ 140.444770][ T4649] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 140.542568][ T4649] syzkaller0: persist disabled [ 140.573303][ T4656] device veth0_vlan left promiscuous mode [ 140.579726][ T4656] device veth0_vlan entered promiscuous mode [ 140.620137][ T4657] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 140.648009][ T4662] Q±6ã×\b‹¡Y­4: renamed from lo [ 140.683550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.724817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.763427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.312231][ T24] audit: type=1400 audit(1766767624.740:161): avc: denied { ioctl } for pid=4683 comm="syz.8.1193" path="uts:[4026533224]" dev="nsfs" ino=4026533224 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 141.993920][ T4690] device sit0 left promiscuous mode [ 142.079856][ T4696] syz.8.1196[4696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.079916][ T4696] syz.8.1196[4696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.186688][ T4690] device sit0 entered promiscuous mode [ 144.588861][ T4785] device pim6reg1 entered promiscuous mode [ 145.766889][ T4858] device pim6reg1 entered promiscuous mode [ 146.474958][ T4888] device pim6reg1 entered promiscuous mode [ 146.794660][ T4898] device veth1_macvtap left promiscuous mode [ 146.801262][ T4898] device macsec0 left promiscuous mode [ 146.898348][ T4903] device veth1_macvtap entered promiscuous mode [ 146.911700][ T4903] device macsec0 entered promiscuous mode [ 146.921655][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.932760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.094396][ T4908] device pim6reg1 entered promiscuous mode [ 148.021682][ T4925] device pim6reg1 entered promiscuous mode [ 150.103620][ T5017] device pim6reg1 entered promiscuous mode [ 153.901734][ T5200] device sit0 left promiscuous mode [ 153.979794][ T5200] device sit0 entered promiscuous mode [ 155.520516][ T5262] device sit0 entered promiscuous mode [ 155.942502][ T5296] device veth1_macvtap left promiscuous mode [ 155.948547][ T5296] device macsec0 left promiscuous mode [ 156.207021][ T5296] device veth1_macvtap entered promiscuous mode [ 156.226546][ T5296] device macsec0 entered promiscuous mode [ 156.491790][ T5314] device syzkaller0 entered promiscuous mode [ 156.518931][ T5314] bridge0: port 3(gretap0) entered disabled state [ 156.525715][ T5314] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.532915][ T5314] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.936077][ T5356] device pim6reg1 entered promiscuous mode [ 156.980447][ T5368] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.769472][ T24] audit: type=1400 audit(1766767641.200:162): avc: denied { ioctl } for pid=5399 comm="syz.5.1394" path="socket:[33376]" dev="sockfs" ino=33376 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 158.732278][ T5458] device pim6reg1 entered promiscuous mode [ 158.886804][ T5464] device syzkaller0 entered promiscuous mode [ 159.089476][ T5488] device sit0 left promiscuous mode [ 160.282218][ T5554] device sit0 left promiscuous mode [ 160.399356][ T5557] device sit0 entered promiscuous mode [ 161.924608][ T5632] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.934720][ T5632] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.471126][ T5667] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.084491][ T5707] syz.7.1477[5707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.084583][ T5707] syz.7.1477[5707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.815039][ T24] audit: type=1400 audit(1766767647.250:163): avc: denied { attach_queue } for pid=5730 comm="syz.7.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 164.383752][ T5758] syz.5.1493[5758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.383817][ T5758] syz.5.1493[5758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.363205][ T5782] device syzkaller0 entered promiscuous mode [ 166.134768][ T5802] syz.6.1506[5802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.134827][ T5802] syz.6.1506[5802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.178850][ T5799] device veth0_vlan left promiscuous mode [ 166.329913][ T5799] device veth0_vlan entered promiscuous mode [ 166.445372][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.455079][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.469642][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.694583][ T24] audit: type=1400 audit(1766767650.130:164): avc: denied { setattr } for pid=5822 comm="syz.9.1510" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 169.314318][ T24] audit: type=1400 audit(1766767652.750:165): avc: denied { create } for pid=5891 comm="syz.6.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 170.635280][ T5919] device syzkaller0 entered promiscuous mode [ 171.288511][ T5955] device pim6reg1 entered promiscuous mode [ 171.386944][ T5981] bridge0: port 3(gretap0) entered blocking state [ 171.393847][ T5981] bridge0: port 3(gretap0) entered disabled state [ 171.420265][ T5981] device gretap0 entered promiscuous mode [ 171.438048][ T5981] bridge0: port 3(gretap0) entered blocking state [ 171.445047][ T5981] bridge0: port 3(gretap0) entered forwarding state [ 171.451359][ T24] audit: type=1400 audit(1766767654.870:166): avc: denied { create } for pid=5983 comm="syz.8.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 172.032842][ T6013] device syzkaller0 entered promiscuous mode [ 172.859293][ T6063] device veth0_vlan left promiscuous mode [ 172.906785][ T6063] device veth0_vlan entered promiscuous mode [ 172.968367][ T6069] device pim6reg1 entered promiscuous mode [ 173.794585][ T6112] device bridge_slave_1 left promiscuous mode [ 173.811025][ T6112] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.828113][ T6112] device bridge_slave_0 left promiscuous mode [ 173.837783][ T6112] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.438574][ T6138] device veth0_vlan left promiscuous mode [ 174.445342][ T6138] device veth0_vlan entered promiscuous mode [ 174.644344][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.663894][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.732986][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.366584][ T6177] ªªªªªª™™: renamed from vlan0 [ 175.581823][ T6192] device bridge_slave_1 left promiscuous mode [ 175.744318][ T6192] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.881239][ T6192] device bridge_slave_0 left promiscuous mode [ 175.921693][ T6192] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.249503][ T6213] device syzkaller0 entered promiscuous mode [ 176.608597][ T6251] ÿÿÿÿÿÿ: renamed from vlan1 [ 178.246199][ T6315] device syzkaller0 entered promiscuous mode [ 178.779304][ T6373] device syzkaller0 entered promiscuous mode [ 179.749670][ T6420] device veth1_macvtap left promiscuous mode [ 179.757633][ T6420] device macsec0 entered promiscuous mode [ 179.806431][ T6428] device syzkaller0 entered promiscuous mode [ 179.850683][ T6417] device syzkaller0 entered promiscuous mode [ 179.948729][ T6447] device wg2 left promiscuous mode [ 180.104409][ T6456] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 180.112904][ T6456] syzkaller0: linktype set to 773 [ 180.378155][ T6470] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 180.436530][ T6470] device syzkaller0 entered promiscuous mode [ 181.734066][ T6548] device sit0 left promiscuous mode [ 181.798755][ T6548] device sit0 entered promiscuous mode [ 182.279417][ T6580] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 182.326370][ T6583] device sit0 entered promiscuous mode [ 183.031593][ T6609] device veth0_vlan left promiscuous mode [ 183.072244][ T6609] device veth0_vlan entered promiscuous mode [ 183.195531][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.233396][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.291762][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 183.348332][ T6619] ªªªªªª: renamed from vlan0 [ 183.753366][ T6638] device veth0_vlan left promiscuous mode [ 183.760068][ T6638] device veth0_vlan entered promiscuous mode [ 185.130019][ T6735] device pim6reg1 entered promiscuous mode [ 185.446972][ T6737] device syzkaller0 entered promiscuous mode [ 185.976562][ T6765] device syzkaller0 entered promiscuous mode [ 186.019350][ T6780] device pim6reg1 entered promiscuous mode [ 187.754300][ T6875] device syzkaller0 entered promiscuous mode [ 188.002537][ T6904] device syzkaller0 entered promiscuous mode [ 188.593003][ T6965] device syzkaller0 entered promiscuous mode [ 188.814452][ T6973] device sit0 left promiscuous mode [ 188.911134][ T6974] device sit0 entered promiscuous mode [ 192.022483][ T7109] device sit0 left promiscuous mode [ 192.073241][ T7109] device sit0 entered promiscuous mode [ 193.217154][ T7127] device pim6reg1 entered promiscuous mode [ 193.528121][ T7148] device syzkaller0 entered promiscuous mode [ 194.199949][ T7182] device syzkaller0 entered promiscuous mode [ 194.504297][ T7199] device pim6reg1 entered promiscuous mode [ 194.604118][ T7206] device veth0_vlan left promiscuous mode [ 194.628685][ T7206] device veth0_vlan entered promiscuous mode [ 194.717506][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.733458][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 194.786185][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.936959][ T7220] device syzkaller0 entered promiscuous mode [ 195.974210][ T7280] device sit0 left promiscuous mode [ 196.021336][ T7277] device sit0 entered promiscuous mode [ 198.408456][ T24] audit: type=1400 audit(1766767681.840:167): avc: denied { create } for pid=7365 comm="syz.9.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 199.988436][ T7402] device pim6reg1 entered promiscuous mode [ 200.371989][ T7410] device sit0 left promiscuous mode [ 200.587876][ T7433] device pim6reg1 entered promiscuous mode [ 200.594313][ T7436] device veth0_vlan left promiscuous mode [ 200.601116][ T7436] device veth0_vlan entered promiscuous mode [ 201.033120][ T7495] : renamed from bond_slave_0 [ 201.299573][ T7514] device wg2 entered promiscuous mode [ 202.061862][ T7572] syz.6.1985[7572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.061925][ T7572] syz.6.1985[7572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.113775][ T7567] device pim6reg1 entered promiscuous mode [ 202.331062][ T7598] device wg2 left promiscuous mode [ 202.448154][ T7608] device sit0 entered promiscuous mode [ 202.839376][ T7656] device pim6reg1 entered promiscuous mode [ 203.345866][ T7679] device pim6reg1 entered promiscuous mode [ 203.895012][ T7706] device syzkaller0 entered promiscuous mode [ 203.953611][ T7708] device syzkaller0 entered promiscuous mode [ 205.786124][ T7822] syz.7.2050[7822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.786176][ T7822] syz.7.2050[7822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.175552][ T7850] device wg2 entered promiscuous mode [ 207.026714][ T7885] device syzkaller0 entered promiscuous mode [ 207.818258][ T7957] geneve1: tun_chr_ioctl cmd 1074025672 [ 207.836707][ T7957] geneve1: ignored: set checksum enabled [ 207.990083][ T7977] device syzkaller0 entered promiscuous mode [ 209.290136][ T24] audit: type=1400 audit(1766767692.720:168): avc: denied { create } for pid=8021 comm="syz.6.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 209.536105][ T8040] device syzkaller0 entered promiscuous mode [ 209.604803][ T8040] device veth0_vlan left promiscuous mode [ 209.689530][ T8040] device veth0_vlan entered promiscuous mode [ 209.818623][ T8054] device pim6reg1 entered promiscuous mode [ 210.280131][ T8078] device sit0 left promiscuous mode [ 212.192919][ T8117] pimreg: tun_chr_ioctl cmd 1074025677 [ 212.198458][ T8117] pimreg: linktype set to 6 [ 212.902533][ T8152] device pim6reg1 entered promiscuous mode [ 213.274698][ T8176] device sit0 left promiscuous mode [ 213.308146][ T8177] device sit0 entered promiscuous mode [ 213.790298][ T8206] device syzkaller0 entered promiscuous mode [ 215.116919][ T8275] device sit0 left promiscuous mode [ 215.317556][ T8277] device sit0 entered promiscuous mode [ 215.570544][ T8297] device pim6reg1 entered promiscuous mode [ 216.600435][ T8346] bridge0: port 3(gretap0) entered blocking state [ 216.627392][ T8346] bridge0: port 3(gretap0) entered disabled state [ 216.687529][ T8346] device gretap0 entered promiscuous mode [ 216.737068][ T8355] device syzkaller0 entered promiscuous mode [ 216.867028][ T8360] device pim6reg1 entered promiscuous mode [ 217.475523][ T8397] device pim6reg1 entered promiscuous mode [ 217.878944][ T8410] device syzkaller0 entered promiscuous mode [ 219.143175][ T8488] device syzkaller0 entered promiscuous mode [ 220.638631][ T8539] device syzkaller0 entered promiscuous mode [ 220.842256][ T8569] device wg2 entered promiscuous mode [ 221.192251][ T8579] device syzkaller0 entered promiscuous mode [ 221.407647][ T8590] device syzkaller0 entered promiscuous mode [ 221.661108][ T8608] device pim6reg1 entered promiscuous mode [ 221.832584][ T8622] device sit0 left promiscuous mode [ 221.859885][ T8623] device pim6reg1 entered promiscuous mode [ 221.874920][ T8616] device sit0 entered promiscuous mode [ 222.084648][ T8637] device pim6reg1 entered promiscuous mode [ 222.186415][ T8635] device syzkaller0 entered promiscuous mode [ 222.271414][ T8631] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.717066][ T8666] ±ÿ: renamed from team_slave_1 [ 222.882627][ T8671] device sit0 left promiscuous mode [ 224.743023][ T8745] device sit0 left promiscuous mode [ 225.332869][ T8764] syz.9.2315[8764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.332963][ T8764] syz.9.2315[8764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.116241][ T8852] device syzkaller0 entered promiscuous mode [ 231.436747][ T8906] device macsec0 left promiscuous mode [ 232.009280][ T8940] device pim6reg1 entered promiscuous mode [ 233.456125][ T24] audit: type=1400 audit(1766767716.890:169): avc: denied { create } for pid=8997 comm="syz.6.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 233.643918][ T24] audit: type=1400 audit(1766767717.070:170): avc: denied { associate } for pid=9003 comm="syz.6.2383" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 235.303981][ T9032] device wg2 left promiscuous mode [ 235.333981][ T9034] device veth1_macvtap left promiscuous mode [ 235.352691][ T9034] device macsec0 left promiscuous mode [ 235.372488][ T9032] device wg2 entered promiscuous mode [ 235.435745][ T9039] device team_slave_0 entered promiscuous mode [ 235.450670][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.466226][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.477665][ T9043] device veth1_macvtap left promiscuous mode [ 235.483929][ T9043] device macsec0 left promiscuous mode [ 235.572917][ T9051] device pim6reg1 entered promiscuous mode [ 236.732812][ T9097] device syzkaller0 entered promiscuous mode [ 236.851851][ T9103] device pim6reg1 entered promiscuous mode [ 236.892875][ T9112] Q±6ã×\b‹¡Y­4: renamed from lo [ 237.870003][ T9203] device veth1_macvtap entered promiscuous mode [ 237.876535][ T9203] device macsec0 entered promiscuous mode [ 237.883478][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.167437][ T9288] device syzkaller0 entered promiscuous mode [ 239.222437][ T9291] device pim6reg1 entered promiscuous mode [ 240.144441][ T9335] syz.6.2481[9335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.144516][ T9335] syz.6.2481[9335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.878431][ T9385] device sit0 left promiscuous mode [ 241.061284][ T9388] device sit0 entered promiscuous mode [ 241.755418][ T9438] syz.8.2510[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.755478][ T9438] syz.8.2510[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.772269][ T9434] device syzkaller0 entered promiscuous mode [ 242.055957][ T9456] device veth1_macvtap entered promiscuous mode [ 242.064723][ T9456] device macsec0 entered promiscuous mode [ 242.084068][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.205343][ T9471] device syzkaller0 entered promiscuous mode [ 242.877786][ T9487] device syzkaller0 entered promiscuous mode [ 243.344992][ T9499] device veth0_vlan left promiscuous mode [ 243.478894][ T9499] device veth0_vlan entered promiscuous mode [ 245.265836][ T9517] device sit0 entered promiscuous mode [ 246.592613][ T9565] device syzkaller0 entered promiscuous mode [ 247.708805][ T9673] device sit0 entered promiscuous mode [ 248.016715][ T9682] device syzkaller0 entered promiscuous mode [ 248.150011][ T9688] syz.9.2570[9688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.150074][ T9688] syz.9.2570[9688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.609283][ T9705] device veth0_vlan left promiscuous mode [ 248.646079][ T9705] device veth0_vlan entered promiscuous mode [ 248.992665][ T9710] device syzkaller0 entered promiscuous mode [ 250.244165][ T9799] Â: renamed from pim6reg1 [ 252.211214][ T9892] device ip6tnl0 entered promiscuous mode [ 252.445926][ T9896] device syzkaller0 entered promiscuous mode [ 254.217295][ T9984] device macsec0 entered promiscuous mode [ 254.607421][T10000] device sit0 entered promiscuous mode [ 255.622211][T10045] ±ÿ: renamed from team_slave_1 [ 255.880507][T10066] device pim6reg1 entered promiscuous mode [ 256.068387][T10084] device sit0 left promiscuous mode [ 256.082934][T10092] device wg2 left promiscuous mode [ 256.124275][ T24] audit: type=1400 audit(1766767739.560:171): avc: denied { create } for pid=10093 comm="syz.7.2686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 256.235795][T10086] device wg2 entered promiscuous mode [ 256.343172][T10101] device sit0 left promiscuous mode [ 256.435087][T10106] device sit0 entered promiscuous mode [ 256.685133][T10110] device wg2 left promiscuous mode [ 257.464335][T10168] device syzkaller0 entered promiscuous mode [ 257.639565][T10166] device veth1_macvtap left promiscuous mode [ 257.647437][T10166] device macsec0 left promiscuous mode [ 257.712919][T10177] device sit0 left promiscuous mode [ 257.838205][T10183] device sit0 entered promiscuous mode [ 269.587524][T10303] device pim6reg1 entered promiscuous mode [ 269.788549][T10318] device sit0 left promiscuous mode [ 269.860441][T10317] device sit0 left promiscuous mode [ 269.926295][T10317] device sit0 entered promiscuous mode [ 270.592860][T10364] syz.8.2765[10364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.592925][T10364] syz.8.2765[10364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.616944][T10350] device sit0 left promiscuous mode [ 270.674862][T10367] syz.8.2765[10367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.674922][T10367] syz.8.2765[10367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.737127][T10369] device pim6reg1 entered promiscuous mode [ 270.977218][T10378] device veth1_macvtap left promiscuous mode [ 271.044362][T10378] device macsec0 left promiscuous mode [ 271.115392][T10386] device veth1_macvtap entered promiscuous mode [ 271.123552][T10386] device macsec0 entered promiscuous mode [ 272.167812][T10468] device syzkaller0 entered promiscuous mode [ 272.344533][T10505] syz.5.2799[10505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.344596][T10505] syz.5.2799[10505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.876626][T10557] device macsec0 entered promiscuous mode [ 275.106462][T10683] device sit0 left promiscuous mode [ 275.356795][T10686] device veth0_vlan left promiscuous mode [ 275.386296][T10686] device veth0_vlan entered promiscuous mode [ 276.834261][T10755] device pim6reg1 entered promiscuous mode [ 277.728725][T10787] device wg2 left promiscuous mode [ 278.488665][T10833] device pim6reg1 entered promiscuous mode [ 278.903212][T10856] device syzkaller0 entered promiscuous mode [ 278.965432][T10862] -1: renamed from syzkaller0 [ 279.701058][T10906] device veth0_vlan left promiscuous mode [ 279.740148][T10906] device veth0_vlan entered promiscuous mode [ 279.872229][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.886124][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 279.936445][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.925544][T10958] device sit0 entered promiscuous mode [ 281.214105][ T24] audit: type=1400 audit(1766767764.650:172): avc: denied { create } for pid=10992 comm="syz.6.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 281.258648][T10994] device veth0_to_batadv entered promiscuous mode [ 281.377306][T11018] device syzkaller0 entered promiscuous mode [ 282.289463][T11066] device veth0_vlan left promiscuous mode [ 282.356468][T11066] device veth0_vlan entered promiscuous mode [ 282.528688][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.546132][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.612907][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.230912][T11100] device syzkaller0 entered promiscuous mode [ 284.294038][T11161] device pim6reg1 entered promiscuous mode [ 284.571092][T11151] device syzkaller0 entered promiscuous mode [ 286.689543][T11214] device syzkaller0 entered promiscuous mode [ 286.789300][T11229] device syzkaller0 entered promiscuous mode [ 287.253344][T11247] device sit0 entered promiscuous mode [ 287.371021][T11260] syz.5.3013[11260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.371123][T11260] syz.5.3013[11260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.444634][T11254] device veth1_macvtap entered promiscuous mode [ 287.505933][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.524143][T11266] device pim6reg1 entered promiscuous mode [ 288.924059][T11304] device syzkaller0 entered promiscuous mode [ 289.396611][T11372] syz.6.3041[11372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.396678][T11372] syz.6.3041[11372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.958619][T11431] syz.6.3059[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.002928][T11431] syz.6.3059[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.673632][ T24] audit: type=1400 audit(1766767776.110:173): avc: denied { mounton } for pid=11531 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 293.020235][T11531] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.042354][T11531] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.050384][T11531] device bridge_slave_0 entered promiscuous mode [ 293.072863][T11531] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.080034][T11531] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.122859][T11531] device bridge_slave_1 entered promiscuous mode [ 293.409427][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.421083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.454546][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.490146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.529596][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.536827][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.637135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.654565][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.685371][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.692617][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.708294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.764309][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.892706][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.908836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.034798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.052996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.097851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.142913][T11531] device veth0_vlan entered promiscuous mode [ 294.198155][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.225465][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.272629][T11531] device veth1_macvtap entered promiscuous mode [ 294.318801][T11570] syz.5.3099[11570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.318858][T11570] syz.5.3099[11570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.331484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.357311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.368831][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.408038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.424220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.474464][T11583] device veth1_macvtap left promiscuous mode [ 294.486167][T11583] device macsec0 entered promiscuous mode [ 294.558738][T11589] device sit0 entered promiscuous mode [ 294.576954][ T398] bridge0: port 3(gretap0) entered disabled state [ 294.591327][ T398] device gretap0 left promiscuous mode [ 294.600787][ T398] bridge0: port 3(gretap0) entered disabled state [ 294.652277][T11593] device syzkaller0 entered promiscuous mode [ 294.958453][ T398] device bridge_slave_1 left promiscuous mode [ 294.990769][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.045224][ T398] device bridge_slave_0 left promiscuous mode [ 295.057870][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.067298][ T398] device veth0_vlan left promiscuous mode [ 295.791283][ T24] audit: type=1400 audit(1766767779.220:174): avc: denied { create } for pid=11650 comm="syz.9.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 297.303584][T11699] device sit0 entered promiscuous mode [ 298.402242][T11731] syz.6.3146[11731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.402427][T11731] syz.6.3146[11731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.593074][T11739] device veth0_vlan left promiscuous mode [ 299.042798][T11739] device veth0_vlan entered promiscuous mode [ 299.104885][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.117113][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 299.132578][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.288358][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.288428][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.308103][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.360823][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.455081][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.532520][T11768] syz.7.3157[11768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.790792][T11801] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.811053][T11801] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.363955][T11850] GPL: port 1(erspan0) entered blocking state [ 300.370799][T11850] GPL: port 1(erspan0) entered disabled state [ 300.391566][T11839] cgroup: fork rejected by pids controller in /syz5 [ 300.391915][T11850] device erspan0 entered promiscuous mode [ 300.427137][T11852] GPL: port 1(erspan0) entered blocking state [ 300.433696][T11852] GPL: port 1(erspan0) entered forwarding state [ 301.291154][T11886] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.303547][T11886] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.311445][T11886] device bridge_slave_0 entered promiscuous mode [ 301.319104][T11886] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.326693][T11886] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.342874][T11886] device bridge_slave_1 entered promiscuous mode [ 301.402475][T11886] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.409868][T11886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.417443][T11886] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.424615][T11886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.454558][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.479240][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.495145][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.633576][T11904] device syzkaller0 entered promiscuous mode [ 301.648229][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.656869][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.663972][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.672155][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.700286][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.707423][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.715952][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.724281][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.884744][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 301.903070][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.927705][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.943133][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.951777][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.959826][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.971588][T11886] device veth0_vlan entered promiscuous mode [ 302.042494][T11886] device veth1_macvtap entered promiscuous mode [ 302.061690][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 302.070738][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 302.080032][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 302.121400][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 302.131191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 302.140953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 302.151886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.551938][T11978] ÿÿÿÿÿÿ: renamed from vlan1 [ 303.101407][ T398] device veth1_macvtap left promiscuous mode [ 303.811231][T12038] device veth0_vlan left promiscuous mode [ 303.889938][T12038] device veth0_vlan entered promiscuous mode [ 305.958928][T12112] device syzkaller0 entered promiscuous mode [ 306.480742][T12154] device syzkaller0 entered promiscuous mode [ 307.213618][T12187] device pim6reg1 entered promiscuous mode [ 307.339054][T12192] device pim6reg1 entered promiscuous mode [ 307.901098][T12217] device sit0 left promiscuous mode [ 308.666241][T12247] syz.8.3292[12247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.666315][T12247] syz.8.3292[12247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.792728][T12257] syz.8.3292[12257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.836153][T12247] device wg2 entered promiscuous mode [ 308.905499][T12257] syz.8.3292[12257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.218971][ T24] audit: type=1400 audit(1766767792.650:175): avc: denied { create } for pid=12275 comm="syz.8.3299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 309.678331][T12290] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.685835][T12290] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.694061][T12290] device bridge_slave_0 entered promiscuous mode [ 309.703071][T12290] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.710306][T12290] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.711517][ T24] audit: type=1400 audit(1766767793.140:176): avc: denied { create } for pid=12303 comm="syz.7.3305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 309.718385][T12290] device bridge_slave_1 entered promiscuous mode [ 309.845258][T12290] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.852573][T12290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.860137][T12290] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.868073][T12290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.895203][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.922509][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.946716][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.989522][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.007041][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.014361][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.022996][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.031556][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.038863][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.046486][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.055205][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.070031][T12344] syz.6.3317[12344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.070094][T12344] syz.6.3317[12344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.096419][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.141371][T12290] device veth0_vlan entered promiscuous mode [ 310.155680][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.169671][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.188397][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.213582][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.230026][T12290] device veth1_macvtap entered promiscuous mode [ 310.256804][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.276075][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.564769][T12436] device pim6reg1 entered promiscuous mode [ 312.190177][T12462] device syzkaller0 entered promiscuous mode [ 313.273579][T12490] device syzkaller0 entered promiscuous mode [ 313.523737][T12495] device pim6reg1 entered promiscuous mode [ 314.469105][T12511] syz.7.3363[12511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.469198][T12511] syz.7.3363[12511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.734183][T12524] device syzkaller0 entered promiscuous mode [ 314.818581][T12519] device syzkaller0 entered promiscuous mode [ 314.864478][T12524] device veth0_vlan left promiscuous mode [ 314.872326][T12524] device veth0_vlan entered promiscuous mode [ 314.888062][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.904228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.912026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.153594][ T24] audit: type=1400 audit(1766767798.590:177): avc: denied { create } for pid=12562 comm="syz.9.3382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 315.266228][T12567] device sit0 entered promiscuous mode [ 316.628584][T12627] syz.6.3402[12627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.628639][T12627] syz.6.3402[12627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.052985][T12666] device pim6reg1 entered promiscuous mode [ 319.577651][T12710] device sit0 left promiscuous mode [ 320.435211][T12743] device pim6reg1 entered promiscuous mode [ 322.263827][T12876] device syzkaller0 entered promiscuous mode [ 325.235513][T12940] device veth0_vlan left promiscuous mode [ 325.242169][T12940] device veth0_vlan entered promiscuous mode [ 325.432485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.448656][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 325.473891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.246648][T13004] device syzkaller0 entered promiscuous mode [ 327.218514][T13073] device wg2 entered promiscuous mode [ 327.380402][T13084] : renamed from pim6reg1 [ 327.789739][T13091] device syzkaller0 entered promiscuous mode [ 327.809837][T13084] device veth0_vlan left promiscuous mode [ 327.827418][T13084] device veth0_vlan entered promiscuous mode [ 328.563243][T13129] device wg2 left promiscuous mode [ 330.851834][T13216] device syzkaller0 entered promiscuous mode [ 331.051031][T13238] device wg2 entered promiscuous mode [ 331.059626][T13243] device sit0 entered promiscuous mode [ 331.978489][T13292] device veth1_macvtap left promiscuous mode [ 331.989594][T13292] device macsec0 entered promiscuous mode [ 332.491959][T13324] device syzkaller0 entered promiscuous mode [ 332.636785][T13337] device sit0 left promiscuous mode [ 332.650468][T13337] device sit0 entered promiscuous mode [ 332.721040][T13345] device syzkaller0 entered promiscuous mode [ 334.147189][T13441] device syzkaller0 entered promiscuous mode [ 335.429790][T13492] syz.6.3643[13492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.429853][T13492] syz.6.3643[13492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.461890][T13490] syz.8.3642[13490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.487248][T13490] syz.8.3642[13490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.654872][T13501] syz.9.3648[13501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.672505][T13501] syz.9.3648[13501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.729850][T13505] device syzkaller0 entered promiscuous mode [ 336.117222][T13501] device veth0_vlan left promiscuous mode [ 336.169079][T13501] device veth0_vlan entered promiscuous mode [ 336.269166][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.285821][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 336.308239][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 336.603394][T13580] device sit0 left promiscuous mode [ 336.795742][T13584] device sit0 entered promiscuous mode [ 337.026323][T13589] device sit0 entered promiscuous mode [ 337.831702][T13697] device syzkaller0 entered promiscuous mode [ 337.913759][T13697] syzkaller0: tun_net_xmit 1280 [ 337.930373][T13697] syzkaller0: create flow: hash 3035285354 index 1 [ 337.973354][T13707] syzkaller0: delete flow: hash 3035285354 index 1 [ 339.012490][T13744] device pim6reg1 entered promiscuous mode [ 339.280393][T13777] device sit0 left promiscuous mode [ 340.120200][T13808] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.127865][T13808] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.135927][T13808] device bridge_slave_0 entered promiscuous mode [ 340.143593][T13808] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.150977][T13808] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.190326][T13808] device bridge_slave_1 entered promiscuous mode [ 340.329845][T13838] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 340.350874][T13838] device syzkaller0 entered promiscuous mode [ 340.401495][T13808] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.408771][T13808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.416313][T13808] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.423388][T13808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.448550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.456698][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.464678][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.484297][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.493384][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.500844][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.508738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.517462][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.525029][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.532594][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.540730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.559055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.568045][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.576633][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.584904][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.593518][T13808] device veth0_vlan entered promiscuous mode [ 340.665393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.018532][T13808] device veth1_macvtap entered promiscuous mode [ 341.322332][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.350692][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.363829][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.377393][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.471700][ T398] device gretap0 left promiscuous mode [ 341.481859][ T398] bridge0: port 3(gretap0) entered disabled state [ 341.508605][T13898] device veth0_vlan left promiscuous mode [ 341.554908][T13898] device veth0_vlan entered promiscuous mode [ 341.717658][T13903] syz.8.3752[13903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.718199][T13903] syz.8.3752[13903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.750805][T13911] geneve1: tun_chr_ioctl cmd 1074025672 [ 341.768110][T13911] geneve1: ignored: set checksum enabled [ 341.844117][ T398] device bridge_slave_1 left promiscuous mode [ 341.883277][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.891598][ T398] device bridge_slave_0 left promiscuous mode [ 341.917700][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.932762][ T398] device veth1_macvtap left promiscuous mode [ 341.959303][ T398] device veth0_vlan left promiscuous mode [ 343.696421][T13982] device syzkaller0 entered promiscuous mode [ 346.535406][T14105] syz.7.3814[14105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.535531][T14105] syz.7.3814[14105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.389665][T14123] geneve1: tun_chr_ioctl cmd 1074025672 [ 347.426678][T14123] geneve1: ignored: set checksum enabled [ 347.439027][T14124] geneve1: tun_chr_ioctl cmd 1074025672 [ 347.452689][T14124] geneve1: ignored: set checksum enabled [ 348.012735][T14179] device sit0 entered promiscuous mode [ 348.375048][T14199] syz.9.3839[14199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.375104][T14199] syz.9.3839[14199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.391597][T14200] device wg2 entered promiscuous mode [ 349.307744][T14210] device syzkaller0 entered promiscuous mode [ 349.518814][T14229] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 349.573047][T14235] device sit0 left promiscuous mode [ 349.695743][T14248] p: renamed from pim6reg1 [ 349.752463][T14237] device sit0 entered promiscuous mode [ 350.074417][T14276] device pim6reg1 entered promiscuous mode [ 350.453089][T14287] device syzkaller0 entered promiscuous mode [ 350.466505][T14292] device sit0 entered promiscuous mode [ 350.839854][T14306] rose0: tun_chr_ioctl cmd 1074025673 [ 351.762657][T14345] device pim6reg1 entered promiscuous mode [ 352.551632][T14364] device syzkaller0 entered promiscuous mode [ 353.198401][T14422] device veth0_vlan left promiscuous mode [ 353.234068][T14422] device veth0_vlan entered promiscuous mode [ 353.355685][T14460] device wg2 entered promiscuous mode [ 353.624333][T14474] device syzkaller0 entered promiscuous mode [ 353.645453][T14476] device pim6reg1 entered promiscuous mode [ 353.706436][T14494] syz.5.3928[14494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.706499][T14494] syz.5.3928[14494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.041327][T14530] device syzkaller0 entered promiscuous mode [ 354.149449][T14543] device sit0 left promiscuous mode [ 354.215450][T14543] device sit0 entered promiscuous mode [ 355.315920][T14601] device pim6reg1 entered promiscuous mode [ 355.614560][T14617] device wg2 left promiscuous mode [ 356.779619][T14674] device syzkaller0 entered promiscuous mode [ 356.974627][T14667] device syzkaller0 entered promiscuous mode [ 358.076626][T14705] device sit0 left promiscuous mode [ 358.169938][T14705] device sit0 entered promiscuous mode [ 358.552653][T14710] device syzkaller0 entered promiscuous mode [ 359.478011][T14741] device veth1_macvtap left promiscuous mode [ 359.501814][T14741] device macsec0 left promiscuous mode [ 359.572319][T14740] device veth1_macvtap entered promiscuous mode [ 359.613274][T14740] device macsec0 entered promiscuous mode [ 361.370695][T14827] device sit0 left promiscuous mode [ 361.611721][T14842] device sit0 entered promiscuous mode [ 362.928491][T14910] syz.6.4043[14910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.928579][T14910] syz.6.4043[14910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.129730][T14926] device wg2 entered promiscuous mode [ 363.271597][T14940] device pim6reg1 entered promiscuous mode [ 363.651252][T14957] device sit0 left promiscuous mode [ 363.831539][T14970] device sit0 entered promiscuous mode [ 368.018318][T15163] device syzkaller0 entered promiscuous mode [ 368.282977][T15167] device pim6reg1 entered promiscuous mode [ 368.467620][T15171] device wg2 entered promiscuous mode [ 370.150802][T15281] device pim6reg1 entered promiscuous mode [ 370.576466][T15314] device pim6reg1 entered promiscuous mode [ 370.674966][T15312] device pim6reg1 entered promiscuous mode [ 370.788684][T15329] device pim6reg1 entered promiscuous mode [ 371.391123][T15354] device sit0 left promiscuous mode [ 371.873195][T15399] device veth0_vlan left promiscuous mode [ 371.879689][T15399] device veth0_vlan entered promiscuous mode [ 371.888572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.909348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.959391][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.132006][T15402] device macsec0 left promiscuous mode [ 372.165852][T15402] device veth1_macvtap entered promiscuous mode [ 372.196972][T15402] device macsec0 entered promiscuous mode [ 372.224166][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 373.415880][T15460] GPL: port 1(erspan0) entered blocking state [ 373.422112][T15460] GPL: port 1(erspan0) entered disabled state [ 373.435647][T15460] device erspan0 entered promiscuous mode [ 373.483303][T15460] GPL: port 1(erspan0) entered blocking state [ 373.489630][T15460] GPL: port 1(erspan0) entered forwarding state [ 373.761724][T15475] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.772588][T15475] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.783565][T15475] device bridge_slave_0 entered promiscuous mode [ 373.791237][T15475] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.798781][T15475] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.807009][T15475] device bridge_slave_1 entered promiscuous mode [ 373.998830][T15475] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.006046][T15475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.013812][T15475] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.021008][T15475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.130573][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.153419][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.162005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 374.170801][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.208306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.217901][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.225182][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.234413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 374.242731][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.249793][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.257555][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.265717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.375289][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.433019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.441592][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.449432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.500799][T15475] device veth0_vlan entered promiscuous mode [ 374.642637][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.668729][T15475] device veth1_macvtap entered promiscuous mode [ 374.708382][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.718092][T15530] device sit0 entered promiscuous mode [ 374.819673][T15544] device sit0 entered promiscuous mode [ 374.953036][T15539] device sit0 left promiscuous mode [ 374.965586][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.998726][T15564] device pim6reg1 entered promiscuous mode [ 375.095610][T15563] device sit0 left promiscuous mode [ 375.550133][T15579] device syzkaller0 entered promiscuous mode [ 376.220896][T15615] device pim6reg1 entered promiscuous mode [ 376.713019][T15643] device sit0 left promiscuous mode [ 377.323314][T15650] device sit0 entered promiscuous mode [ 377.961703][T15657] device lo entered promiscuous mode [ 377.978882][T15659] device veth0_vlan left promiscuous mode [ 377.993358][T15659] device veth0_vlan entered promiscuous mode [ 378.032771][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.077026][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.095200][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.486980][T15715] device veth1_macvtap left promiscuous mode [ 378.502434][T15715] device macsec0 entered promiscuous mode [ 378.521151][T15713] device veth0_vlan left promiscuous mode [ 378.539326][T15713] device veth0_vlan entered promiscuous mode [ 379.229742][T15757] syz.7.4279[15757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.229804][T15757] syz.7.4279[15757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.301376][T15757] device veth0_vlan left promiscuous mode [ 379.412905][T15757] device veth0_vlan entered promiscuous mode [ 379.617584][T15788] device syzkaller0 entered promiscuous mode [ 379.666794][T15780] bridge0: port 3(veth1_to_batadv) entered blocking state [ 379.701282][T15780] bridge0: port 3(veth1_to_batadv) entered disabled state [ 379.709438][T15780] device veth1_to_batadv entered promiscuous mode [ 379.716431][T15780] bridge0: port 3(veth1_to_batadv) entered blocking state [ 379.723764][T15780] bridge0: port 3(veth1_to_batadv) entered forwarding state [ 379.920744][T15796] device pim6reg1 entered promiscuous mode [ 380.457206][T15812] device syzkaller0 entered promiscuous mode [ 382.346343][T15884] device syzkaller0 entered promiscuous mode [ 383.156807][T15908] syz.6.4319[15908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.156870][T15908] syz.6.4319[15908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.267909][T15910] device veth1_macvtap left promiscuous mode [ 383.322144][T15908] device pim6reg1 entered promiscuous mode [ 384.128250][T15959] device pim6reg1 entered promiscuous mode [ 384.826349][T15992] device bridge_slave_1 left promiscuous mode [ 384.838386][T15992] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.847163][T15992] device bridge_slave_0 left promiscuous mode [ 384.854018][T15992] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.584516][T16058] device wg2 left promiscuous mode [ 386.896548][T16069] device wg2 entered promiscuous mode [ 387.458516][T16098] device syzkaller0 entered promiscuous mode [ 387.889647][T16126] device sit0 left promiscuous mode [ 388.110848][T16131] device sit0 entered promiscuous mode [ 388.143181][T16137] device sit0 left promiscuous mode [ 388.231180][T16138] device sit0 entered promiscuous mode [ 389.205736][T16192] device syzkaller0 entered promiscuous mode [ 389.425579][T16198] device sit0 left promiscuous mode [ 389.489575][T16200] device sit0 entered promiscuous mode [ 390.050629][T16218] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.057886][T16218] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.068467][T16218] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.075784][T16218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.083138][T16218] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.090187][T16218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.099793][T16218] device bridge0 entered promiscuous mode [ 391.385224][T16279] device sit0 entered promiscuous mode [ 391.681427][T16301] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.688604][T16301] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.699866][T16301] device bridge0 left promiscuous mode [ 391.707656][T16289] device pim6reg1 entered promiscuous mode [ 392.148170][T16337] device pim6reg1 entered promiscuous mode [ 392.779537][T16363] syz.8.4453[16363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.779669][T16363] syz.8.4453[16363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.938444][T16378] device syzkaller0 entered promiscuous mode [ 393.376054][T16406] device syzkaller0 entered promiscuous mode [ 393.928085][T16434] device wg2 left promiscuous mode [ 394.551615][T16484] device veth0_vlan left promiscuous mode [ 394.567250][T16484] device veth0_vlan entered promiscuous mode [ 394.645892][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.676662][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.699254][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 396.239893][T16551] device wg2 entered promiscuous mode [ 396.518009][T16559] device syzkaller0 entered promiscuous mode [ 397.237797][T16588] device sit0 left promiscuous mode [ 398.040987][T16616] device syzkaller0 entered promiscuous mode [ 398.088690][T16619] device pim6reg1 entered promiscuous mode [ 399.799684][T16669] ªªªªªª: renamed from vlan0 [ 401.550014][T16797] device syzkaller0 entered promiscuous mode [ 402.177784][T16836] device syzkaller0 entered promiscuous mode [ 403.557504][T16925] device sit0 left promiscuous mode [ 403.670456][T16925] device sit0 entered promiscuous mode [ 404.315505][T16979] device veth1_macvtap left promiscuous mode [ 404.336107][T16979] device macsec0 entered promiscuous mode [ 404.790494][T17030] syz.7.4631[17030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.790546][T17030] syz.7.4631[17030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.831843][T17030] syz.7.4631[17030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.850818][T17030] syz.7.4631[17030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.491655][T17108] device syzkaller0 entered promiscuous mode [ 405.885452][T17128] device pim6reg1 entered promiscuous mode [ 406.053105][T17133] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 408.374618][T17248] device syzkaller0 entered promiscuous mode [ 409.277170][T17272] device syzkaller0 entered promiscuous mode [ 409.462987][T17305] device pim6reg1 entered promiscuous mode [ 409.578206][T17328] device macsec0 left promiscuous mode [ 409.585317][T17328] device veth1_macvtap entered promiscuous mode [ 409.591696][T17328] device macsec0 entered promiscuous mode [ 409.598865][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 410.049499][T17360] device wg2 left promiscuous mode [ 414.367153][T17596] device wg2 left promiscuous mode [ 414.875371][T17620] device wg2 entered promiscuous mode [ 415.049954][T17639] device pim6reg1 entered promiscuous mode [ 415.896622][T17725] device sit0 entered promiscuous mode [ 416.360260][T17740] device syzkaller0 entered promiscuous mode [ 418.465101][T17767] device sit0 left promiscuous mode [ 418.996394][T17791] device syzkaller0 entered promiscuous mode [ 419.027479][T17790] device syzkaller0 entered promiscuous mode [ 419.039086][T17790] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.727258][T17901] Q±6ã`Ò˜: renamed from lo [ 424.112354][T17927] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 424.293540][T17930] device wg2 entered promiscuous mode [ 424.714193][T17962] device sit0 entered promiscuous mode [ 425.798809][T18024] device pim6reg1 entered promiscuous mode [ 427.706745][T18097] ªªªªªª: renamed from vlan0 [ 428.341073][T18136] syz.6.4941[18136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.341154][T18136] syz.6.4941[18136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.581577][T18148] device wg2 left promiscuous mode [ 429.562579][T18171] device syzkaller0 entered promiscuous mode [ 430.065864][T18215] device sit0 left promiscuous mode [ 430.445277][T18240] bridge0: port 3(veth1_to_batadv) entered disabled state [ 430.452858][T18240] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.460282][T18240] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.401943][T18298] device syzkaller0 entered promiscuous mode [ 432.517383][T18303] device wg2 entered promiscuous mode [ 436.127966][T18400] device syzkaller0 entered promiscuous mode [ 438.872764][T18505] device veth0_vlan left promiscuous mode [ 438.886195][T18505] device veth0_vlan entered promiscuous mode [ 438.907528][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.916873][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 438.924790][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.784437][T18560] syz.6.5066[18560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.784528][T18560] syz.6.5066[18560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.863176][T18560] syz.6.5066[18560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.881677][T18560] syz.6.5066[18560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.899143][T18561] device syzkaller0 entered promiscuous mode [ 440.449828][T18604] sit0: mtu less than device minimum [ 441.032568][T18618] device veth0_vlan left promiscuous mode [ 441.056814][T18618] device veth0_vlan entered promiscuous mode [ 442.808714][T18692] device sit0 entered promiscuous mode [ 443.189843][T18720] device pim6reg1 entered promiscuous mode [ 443.703002][T18777] -1: renamed from syzkaller0 [ 444.150087][T18813] syz.6.5135[18813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.150150][T18813] syz.6.5135[18813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.165681][T18795] device wg2 left promiscuous mode [ 444.220752][T18813] syz.6.5135[18813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.220816][T18813] syz.6.5135[18813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.440877][T18813] device veth1_macvtap left promiscuous mode [ 444.479232][T18830] device pim6reg1 entered promiscuous mode [ 445.016454][T18847] @ÿ: renamed from bond_slave_0 [ 445.184102][T18856] ±ÿ: renamed from team_slave_1 [ 445.584756][T18919] device veth0_vlan left promiscuous mode [ 445.615847][T18919] device veth0_vlan entered promiscuous mode [ 445.908985][T18960] syz.5.5171[18960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.909037][T18960] syz.5.5171[18960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.127624][T18952] device syzkaller0 entered promiscuous mode [ 446.205902][T18982] device sit0 entered promiscuous mode [ 446.578987][T19001] device syzkaller0 entered promiscuous mode [ 447.075547][T19049] device wg2 entered promiscuous mode [ 447.243268][T19063] device sit0 left promiscuous mode [ 447.517064][T19068] device sit0 entered promiscuous mode [ 448.049868][T19112] device syzkaller0 entered promiscuous mode [ 448.067077][T19112] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 448.813446][T11531] cgroup: fork rejected by pids controller in /syz6 [ 449.271749][T19177] device sit0 left promiscuous mode [ 449.620552][T19179] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.632914][T19179] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.652781][T19179] device bridge_slave_0 entered promiscuous mode [ 449.664191][T19179] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.671501][T19179] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.679532][T19179] device bridge_slave_1 entered promiscuous mode [ 449.798862][T19217] device pim6reg1 entered promiscuous mode [ 450.200808][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.238118][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.301129][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.319992][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.332543][T15173] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.339806][T15173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.355325][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.370799][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.389458][T15173] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.397170][T15173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.410574][T19237] syz.8.5252[19237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.410633][T19237] syz.8.5252[19237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.422992][T19238] syz.8.5252[19238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.435233][T19238] syz.8.5252[19238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.475917][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.513975][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 450.527093][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.536565][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 450.559193][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.586872][ T49] GPL: port 1(erspan0) entered disabled state [ 450.595700][ T49] device erspan0 left promiscuous mode [ 450.601447][ T49] GPL: port 1(erspan0) entered disabled state [ 450.645973][T19179] device veth0_vlan entered promiscuous mode [ 450.653710][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 450.663401][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 450.679535][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 450.692062][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.701026][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.709047][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.726520][T19179] device veth1_macvtap entered promiscuous mode [ 450.743946][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.772985][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 450.782157][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 450.880333][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 450.889585][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.178224][T19335] device sit0 entered promiscuous mode [ 452.948682][T19372] device veth1_macvtap left promiscuous mode [ 452.957500][T19372] device macsec0 entered promiscuous mode [ 453.086558][T19369] device syzkaller0 entered promiscuous mode [ 454.593531][T19450] device veth0_vlan left promiscuous mode [ 454.610152][T19450] device veth0_vlan entered promiscuous mode [ 454.676615][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.689287][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 454.752473][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 455.181623][T19459] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 455.264744][T19459] device syzkaller0 entered promiscuous mode [ 455.329290][T19457] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.338981][T19457] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.347105][T19457] device bridge_slave_0 entered promiscuous mode [ 455.402882][T19457] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.410098][T19457] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.532898][T19457] device bridge_slave_1 entered promiscuous mode [ 455.942632][T19485] IPv6: pim6reg1: Disabled Multicast RS [ 455.966682][T19457] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.974123][T19457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.119722][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.147458][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.203183][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.226019][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 456.293001][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.301640][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.308923][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.408107][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.423111][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.430199][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.442607][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.451799][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.540018][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 456.548825][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 456.611429][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 456.620720][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.629448][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.637266][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 456.646710][T19457] device veth0_vlan entered promiscuous mode [ 456.662892][T19457] device veth1_macvtap entered promiscuous mode [ 456.672951][T19527] device pim6reg1 left promiscuous mode [ 456.679064][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 456.704269][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 456.720274][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 456.758914][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 456.798737][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 456.817011][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 456.847157][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 457.481601][T19574] device pim6reg1 entered promiscuous mode [ 457.560760][ T49] device bridge_slave_1 left promiscuous mode [ 457.578514][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.627351][ T49] device bridge_slave_0 left promiscuous mode [ 457.640093][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.666986][ T49] device veth0_vlan left promiscuous mode [ 458.386234][T19587] device sit0 left promiscuous mode [ 458.598909][T19599] device sit0 entered promiscuous mode [ 458.847227][T19617] device sit0 left promiscuous mode [ 459.354005][T19651] device veth0_vlan left promiscuous mode [ 459.370664][T19651] device veth0_vlan entered promiscuous mode [ 460.205874][T19704] IPv6: pim6reg1: Disabled Multicast RS [ 460.219814][T19704] device sit0 entered promiscuous mode [ 460.849092][T19711] device syzkaller0 entered promiscuous mode [ 461.130204][T19733] : renamed from veth0_vlan [ 461.367216][T19739] device veth0_vlan left promiscuous mode [ 461.441754][T19739] device veth0_vlan entered promiscuous mode [ 461.756518][T19758] device wg2 left promiscuous mode [ 461.830774][T19758] device wg2 entered promiscuous mode [ 462.941088][T19826] device syzkaller0 entered promiscuous mode [ 464.427709][T19911] cgroup: fork rejected by pids controller in /syz8 [ 464.846468][T19908] device syzkaller0 entered promiscuous mode [ 465.519868][T20041] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.528899][T20041] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.536997][T20041] device bridge_slave_0 entered promiscuous mode [ 465.599758][T20041] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.632333][T20041] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.640739][T20041] device bridge_slave_1 entered promiscuous mode [ 465.920070][T20063] device pim6reg1 entered promiscuous mode [ 466.007198][T20041] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.014589][T20041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.022124][T20041] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.029294][T20041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.047524][T20066] device macsec0 left promiscuous mode [ 466.172743][T20071] device veth1_macvtap entered promiscuous mode [ 466.179202][T20071] device macsec0 entered promiscuous mode [ 466.186720][T20072] device sit0 entered promiscuous mode [ 466.328327][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.340871][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.348951][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.511433][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.533861][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.630048][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 466.675253][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 466.692287][ T1400] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.699587][ T1400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.723457][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 466.764781][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 466.773108][ T1400] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.780343][ T1400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.787775][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 466.796524][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 466.804790][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 466.813187][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 466.883003][T20041] device veth0_vlan entered promiscuous mode [ 466.901493][T20041] device veth1_macvtap entered promiscuous mode [ 466.933093][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 466.961878][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 467.022587][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 467.034908][T20105] syz.6.5467[20105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.034963][T20105] syz.6.5467[20105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.049765][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.070132][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 467.078912][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 467.087922][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 467.096112][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.104378][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.113362][T20105] syz.6.5467[20105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.113418][T20105] syz.6.5467[20105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.337076][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 467.412739][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 467.514285][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 467.581950][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 467.979052][ T49] GPL: port 1(erspan0) entered disabled state [ 467.991630][ T49] device erspan0 left promiscuous mode [ 468.012570][ T49] GPL: port 1(erspan0) entered disabled state [ 468.099710][T20153] device sit0 entered promiscuous mode [ 468.311830][T20177] syz.7.5485[20177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.311894][T20177] syz.7.5485[20177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.474129][T20185] device veth1_macvtap left promiscuous mode [ 468.651458][T20184] device veth1_macvtap entered promiscuous mode [ 468.663589][T20184] device macsec0 entered promiscuous mode [ 468.696584][ T49] device bridge_slave_1 left promiscuous mode [ 468.703151][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.710920][ T49] device bridge_slave_0 left promiscuous mode [ 468.717833][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.726103][ T49] device veth1_macvtap left promiscuous mode [ 468.732368][ T49] device veth0_vlan left promiscuous mode [ 469.500864][T20250] device pim6reg1 entered promiscuous mode [ 470.613253][T20318] device veth0_vlan left promiscuous mode [ 470.630970][T20318] device veth0_vlan entered promiscuous mode [ 470.642482][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.660019][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 470.683628][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.729024][T20321] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.736547][T20321] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.864199][T20321] device bridge_slave_1 left promiscuous mode [ 470.900919][T20321] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.979843][T20321] device bridge_slave_0 left promiscuous mode [ 471.102550][T20321] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.563588][T20383] device syzkaller0 entered promiscuous mode [ 475.486865][T20438] device pim6reg1 entered promiscuous mode [ 475.580309][T20440] device syzkaller0 entered promiscuous mode [ 477.510552][T20528] syz.6.5588[20528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.510614][T20528] syz.6.5588[20528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.602822][T20529] syz.6.5588[20529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.375174][ T24] audit: type=1400 audit(1766767961.810:178): avc: denied { create } for pid=20562 comm="syz.9.5599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 479.636459][T20606] device syzkaller0 entered promiscuous mode [ 481.455573][T20637] device sit0 left promiscuous mode [ 481.470442][T20638] device sit0 entered promiscuous mode [ 483.308968][T20753] device wg2 left promiscuous mode [ 483.472369][T20753] device wg2 entered promiscuous mode [ 483.898322][T20772] device sit0 left promiscuous mode [ 484.098833][T20778] device sit0 entered promiscuous mode [ 484.743219][T20831] device sit0 left promiscuous mode [ 484.940598][T20834] device sit0 entered promiscuous mode [ 485.368882][T20891] device pim6reg1 entered promiscuous mode [ 485.544847][T20893] device syzkaller0 entered promiscuous mode [ 486.012663][T20932] device macsec0 left promiscuous mode [ 486.028877][T20932] device veth1_macvtap entered promiscuous mode [ 486.036406][T20932] device macsec0 entered promiscuous mode [ 486.052157][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 487.111748][T20984] device veth1_macvtap left promiscuous mode [ 487.141939][T20984] device macsec0 left promiscuous mode [ 487.152282][T20989] syz.5.5713[20989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.152338][T20989] syz.5.5713[20989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.851832][T21040] syz.9.5730[21040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.863731][T21040] syz.9.5730[21040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.085628][T21026] device syzkaller0 entered promiscuous mode [ 488.140116][T21047] device veth1_macvtap entered promiscuous mode [ 488.152136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 488.235513][T21054] device pim6reg1 entered promiscuous mode [ 488.465131][T21076] device pim6reg1 entered promiscuous mode [ 489.299169][T21110] device sit0 left promiscuous mode [ 489.347487][T21105] device sit0 entered promiscuous mode [ 490.219786][T21155] device veth1_macvtap left promiscuous mode [ 490.236502][T21155] device macsec0 left promiscuous mode [ 490.801480][T21186] device syzkaller0 entered promiscuous mode [ 491.217571][T21214] device veth1_macvtap entered promiscuous mode [ 491.253238][T21214] device macsec0 entered promiscuous mode [ 491.287402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.949878][T21282] device veth1_macvtap left promiscuous mode [ 491.965379][T21282] device macsec0 left promiscuous mode [ 491.976583][T21282] device veth1_macvtap entered promiscuous mode [ 491.984325][T21282] device macsec0 entered promiscuous mode [ 492.109746][T21272] ªªªªªª: renamed from vlan0 [ 492.404023][T21304] device pim6reg1 entered promiscuous mode [ 493.295073][T21350] device veth0_vlan left promiscuous mode [ 493.359942][T21350] device veth0_vlan entered promiscuous mode [ 493.398942][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.407881][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 493.428410][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.535165][T21371] device wg2 left promiscuous mode [ 493.617075][T21377] device sit0 left promiscuous mode [ 493.667943][T21383] device sit0 entered promiscuous mode [ 494.130711][T21394] device syzkaller0 entered promiscuous mode [ 494.453168][T21427] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 494.459234][T21427] syzkaller0: linktype set to 804 [ 494.477742][T21427] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 508.356039][T21475] device wg2 entered promiscuous mode [ 508.639405][T21511] device veth0_vlan left promiscuous mode [ 508.645757][T21511] device veth0_vlan entered promiscuous mode [ 508.654353][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 508.664760][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 508.677979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 508.694180][T21502] device veth1_macvtap left promiscuous mode [ 509.458289][T21543] device pim6reg1 entered promiscuous mode [ 509.510679][T21545] device pim6reg1 entered promiscuous mode [ 509.765493][T21562] syz.9.5881[21562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.765580][T21562] syz.9.5881[21562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.679076][T21626] device syzkaller0 entered promiscuous mode [ 511.186618][T21644] device veth1_macvtap left promiscuous mode [ 511.192981][T21644] device macsec0 left promiscuous mode [ 511.578955][T21688] device syzkaller0 entered promiscuous mode [ 512.106548][T21702] device sit0 left promiscuous mode [ 512.171580][T21702] device sit0 entered promiscuous mode [ 514.340835][T21751] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.348003][T21751] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.356076][T21751] device bridge_slave_0 entered promiscuous mode [ 514.363633][T21751] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.370810][T21751] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.378754][T21751] device bridge_slave_1 entered promiscuous mode [ 514.573842][T21751] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.581000][T21751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.588333][T21751] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.595388][T21751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.642358][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 514.666022][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.677292][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.725316][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 514.734332][ T1400] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.741502][ T1400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.776664][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 514.786677][ T1400] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.793845][ T1400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.884309][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 514.920065][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 514.983694][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 515.030007][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.103281][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 515.144102][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.164091][T21751] device veth0_vlan entered promiscuous mode [ 515.232644][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 515.287363][T21751] device veth1_macvtap entered promiscuous mode [ 515.368953][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 515.404712][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 515.482631][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 515.542660][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 516.046892][T21804] device syzkaller0 entered promiscuous mode [ 516.188246][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.199518][ T398] device bridge_slave_0 left promiscuous mode [ 516.206077][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.368458][T21819] device veth1_macvtap entered promiscuous mode [ 516.376556][T21819] device macsec0 entered promiscuous mode [ 516.384358][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 516.457580][T21834] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.464865][T21834] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.461400][T21879] device syzkaller0 entered promiscuous mode [ 518.918727][T21923] device pim6reg1 entered promiscuous mode [ 519.091625][T21934] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.099001][T21934] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.398468][T21953] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 520.418397][T21953] syzkaller0: persist disabled [ 522.950449][T22040] ªªªªªª: renamed from vlan0 [ 525.006696][T22177] syz.5.6051[22177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.006760][T22177] syz.5.6051[22177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.999660][T22211] device sit0 left promiscuous mode [ 528.019375][T22342] device wg2 entered promiscuous mode [ 528.867347][T22404] device syzkaller0 entered promiscuous mode [ 531.884163][T22479] device syzkaller0 entered promiscuous mode [ 531.966984][T22477] device pim6reg1 entered promiscuous mode [ 533.289941][T22563] device veth0_vlan left promiscuous mode [ 533.305563][T22563] device veth0_vlan entered promiscuous mode [ 533.352650][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 533.367751][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 533.402697][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 534.677697][T22624] device syzkaller0 entered promiscuous mode [ 535.082631][T22649] bridge0: port 3(veth1_to_batadv) entered blocking state [ 535.132504][T22649] bridge0: port 3(veth1_to_batadv) entered disabled state [ 535.175026][T22649] device veth1_to_batadv entered promiscuous mode [ 535.205072][T22649] bridge0: port 3(veth1_to_batadv) entered blocking state [ 535.212537][T22649] bridge0: port 3(veth1_to_batadv) entered forwarding state [ 536.163429][T22692] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.170826][T22692] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.178947][T22692] device bridge_slave_0 entered promiscuous mode [ 536.186360][T22692] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.193764][T22692] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.201256][T22692] device bridge_slave_1 entered promiscuous mode [ 536.345739][T22692] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.353686][T22692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.362076][T22692] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.369259][T22692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 536.421414][T22726] device pim6reg1 entered promiscuous mode [ 536.551079][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 536.622604][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 536.679329][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 536.733975][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 536.878689][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 536.887208][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 536.941598][T22692] device veth0_vlan entered promiscuous mode [ 536.955921][T22692] device veth1_macvtap entered promiscuous mode [ 536.977566][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 536.991475][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 537.004839][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 537.014664][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.023941][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 537.040628][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 537.063732][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 537.207964][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.253846][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.337458][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 537.360446][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 537.373353][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 537.382393][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 537.489225][T22762] device pim6reg1 entered promiscuous mode [ 537.649220][T22772] device veth1_macvtap left promiscuous mode [ 538.050407][T22816] -1: renamed from syzkaller0 [ 538.907139][T15173] device veth1_macvtap left promiscuous mode [ 538.915892][T15173] device veth0_vlan left promiscuous mode [ 539.777750][T22928] device sit0 entered promiscuous mode [ 540.005642][ T24] audit: type=1400 audit(1766768023.440:179): avc: denied { ioctl } for pid=22925 comm="syz.6.6255" path="" dev="cgroup2" ino=536 ioctlcmd=0x582b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 540.521263][T22945] device pim6reg1 entered promiscuous mode [ 540.828885][T22980] device sit0 left promiscuous mode [ 540.902702][T22975] device sit0 entered promiscuous mode [ 541.401147][T23008] bridge0: port 4(veth0) entered blocking state [ 541.432671][T23008] bridge0: port 4(veth0) entered disabled state [ 541.477640][T23008] device veth0 entered promiscuous mode [ 541.555920][T23008] bridge0: port 4(veth0) entered blocking state [ 541.562298][T23008] bridge0: port 4(veth0) entered forwarding state [ 542.260605][ T95] udevd[95]: worker [21471] terminated by signal 33 (Unknown signal 33) [ 542.300946][ T95] udevd[95]: worker [21471] failed while handling '/devices/virtual/block/loop5' [ 542.397717][ T95] udevd[95]: worker [21474] terminated by signal 33 (Unknown signal 33) [ 542.408174][T23053] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 542.418684][ T95] udevd[95]: worker [21474] failed while handling '/devices/virtual/block/loop8' [ 542.452655][T23053] device syzkaller0 entered promiscuous mode [ 543.631308][T23136] device syzkaller0 entered promiscuous mode [ 553.371176][T23197] device sit0 left promiscuous mode [ 554.531476][T23284] device pim6reg1 left promiscuous mode [ 554.812245][T23299] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 555.123702][T23321] syz.8.6361[23321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.123768][T23321] syz.8.6361[23321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.924965][T23348] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.944728][T23348] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.952230][T23348] device bridge_slave_0 entered promiscuous mode [ 570.960496][T23348] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.967623][T23348] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.975289][T23348] device bridge_slave_1 entered promiscuous mode [ 571.092355][T23349] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.099494][T23349] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.107414][T23349] device bridge_slave_0 entered promiscuous mode [ 571.114636][T23349] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.121694][T23349] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.129337][T23349] device bridge_slave_1 entered promiscuous mode [ 571.150171][T23350] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.157512][T23350] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.165270][T23350] device bridge_slave_0 entered promiscuous mode [ 571.176249][T23350] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.183630][T23350] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.191263][T23350] device bridge_slave_1 entered promiscuous mode [ 571.245037][T23351] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.252691][T23351] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.260090][T23351] device bridge_slave_0 entered promiscuous mode [ 571.267608][T23351] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.274865][T23351] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.282523][T23351] device bridge_slave_1 entered promiscuous mode [ 571.321719][T23352] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.329068][T23352] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.336832][T23352] device bridge_slave_0 entered promiscuous mode [ 571.346228][T23352] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.353530][T23352] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.361149][T23352] device bridge_slave_1 entered promiscuous mode [ 571.387070][T23348] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.394146][T23348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.401437][T23348] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.408494][T23348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.466723][T23349] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.473938][T23349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.481351][T23349] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.488446][T23349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.516995][T23350] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.524091][T23350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.531556][T23350] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.538626][T23350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.571777][T23352] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.578863][T23352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.586380][T23352] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.593538][T23352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.613750][T15173] device bridge_slave_1 left promiscuous mode [ 571.619963][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.627709][T15173] device bridge_slave_0 left promiscuous mode [ 571.634179][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.642143][T15173] device veth0_vlan left promiscuous mode [ 571.768406][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.775970][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.784863][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.792923][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.800401][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.808217][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.815591][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.823757][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.831302][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.856987][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.865694][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.874909][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.881959][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.914656][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 571.922749][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.930232][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.940547][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.949082][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.956160][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.964087][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 571.972836][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.981184][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.988332][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.996100][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.004103][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.011573][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.020229][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.028544][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.035892][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.043663][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.052224][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.061179][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.068424][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.076058][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.084658][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.093019][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.100071][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.107740][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.115880][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.133939][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.142388][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.150717][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.159393][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.168920][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.177364][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.185561][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.193326][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.216352][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.225139][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.233936][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.243721][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.262992][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.271524][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.280158][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.289940][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.298669][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.307208][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.325417][T23348] device veth0_vlan entered promiscuous mode [ 572.333047][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.340683][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.348280][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.359599][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.368431][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.375483][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.383162][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.391752][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.400348][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.407436][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.415266][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.422892][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.430416][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.439335][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.447559][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.454637][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.462772][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.470789][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.479578][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 572.487534][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.495291][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.503827][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.512496][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.520918][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.528290][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.542717][T23349] device veth0_vlan entered promiscuous mode [ 572.549788][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.575343][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.585095][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.593630][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.611827][T23350] device veth0_vlan entered promiscuous mode [ 572.624501][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.633134][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.641212][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.650086][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.659147][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.666956][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.684003][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.692483][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.703042][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.711628][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.721393][T23348] device veth1_macvtap entered promiscuous mode [ 572.731458][T23349] device veth1_macvtap entered promiscuous mode [ 572.739490][T23350] device veth1_macvtap entered promiscuous mode [ 572.750372][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.758901][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.766850][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.774559][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 572.789340][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.797805][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.809170][T23352] device veth0_vlan entered promiscuous mode [ 572.830183][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.839069][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.847787][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.856878][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.865406][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.873928][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.882715][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.891391][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.905802][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.914216][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.937871][T23351] device veth0_vlan entered promiscuous mode [ 572.945319][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.955704][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.964930][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.973386][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.981939][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.990476][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 573.005583][T23352] device veth1_macvtap entered promiscuous mode [ 573.043723][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.051612][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 573.060452][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 573.092363][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 573.100680][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 573.149250][T23351] device veth1_macvtap entered promiscuous mode [ 573.156834][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 573.166865][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 573.175768][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.184804][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 573.193666][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 573.276527][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 573.288191][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 573.297274][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 573.307068][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 573.904699][T15173] device bridge_slave_1 left promiscuous mode [ 573.924466][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.992451][T15173] device bridge_slave_0 left promiscuous mode [ 574.026176][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.036311][T15173] device veth1_to_batadv left promiscuous mode [ 574.042918][T15173] bridge0: port 3(veth1_to_batadv) entered disabled state [ 574.052570][T15173] device bridge_slave_1 left promiscuous mode [ 574.058751][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.096962][T15173] device bridge_slave_0 left promiscuous mode [ 574.103393][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.111799][T15173] device veth0 left promiscuous mode [ 574.117375][T15173] bridge0: port 4(veth0) entered disabled state [ 574.126703][T15173] device veth1_to_batadv left promiscuous mode [ 574.133743][T15173] bridge0: port 3(veth1_to_batadv) entered disabled state [ 574.141878][T15173] device bridge_slave_1 left promiscuous mode [ 574.148548][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.156620][T15173] device bridge_slave_0 left promiscuous mode [ 574.163319][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.173030][T15173] device bridge_slave_1 left promiscuous mode [ 574.179343][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.189547][T15173] device bridge_slave_0 left promiscuous mode [ 574.195944][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.206726][T15173] device veth1_macvtap left promiscuous mode [ 574.213459][T15173] device veth1_macvtap left promiscuous mode [ 577.468567][T23545] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 577.508376][T23545] device syzkaller0 entered promiscuous mode [ 579.059630][T23632] bridge0: port 3(gretap0) entered blocking state [ 579.082272][T23632] bridge0: port 3(gretap0) entered disabled state [ 579.151663][T23632] device gretap0 entered promiscuous mode [ 579.176711][T23632] bridge0: port 3(gretap0) entered blocking state [ 579.183257][T23632] bridge0: port 3(gretap0) entered forwarding state [ 580.688924][T23714] device pim6reg1 entered promiscuous mode [ 581.298371][T23753] bridge0: port 3(gretap0) entered disabled state [ 581.306402][T23753] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.315540][T23753] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.905723][T23776] device veth0_vlan left promiscuous mode [ 581.922647][T23776] device veth0_vlan entered promiscuous mode [ 581.991996][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 582.004361][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 582.011909][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 584.182574][T23869] device syzkaller0 entered promiscuous mode [ 588.015712][T24025] device syzkaller0 entered promiscuous mode [ 588.645573][T24052] device sit0 entered promiscuous mode [ 589.439109][T24080] syz.3.6565[24080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.439174][T24080] syz.3.6565[24080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.479925][T24084] device veth1_macvtap left promiscuous mode [ 589.506244][T24084] device macsec0 entered promiscuous mode [ 590.913652][T24149] device syzkaller0 entered promiscuous mode [ 591.357456][T24172] device syzkaller0 entered promiscuous mode [ 599.031237][T24342] device pim6reg1 entered promiscuous mode [ 600.693878][T24439] device sit0 entered promiscuous mode [ 600.926578][T24446] device syzkaller0 entered promiscuous mode [ 601.629998][T24519] device pim6reg1 entered promiscuous mode [ 602.636760][T24582] device pim6reg1 entered promiscuous mode [ 602.671629][T24584] device pim6reg1 entered promiscuous mode [ 603.833552][T24631] device pim6reg1 entered promiscuous mode [ 604.173992][T24660] syz.1.6735[24660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.174041][T24660] syz.1.6735[24660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.586182][T24679] syz.0.6742[24679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.377089][T24776] device syzkaller0 entered promiscuous mode [ 606.480021][T24792] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.489367][T24792] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.561762][T24794] device bridge0 entered promiscuous mode [ 615.459312][T24887] device pim6reg1 entered promiscuous mode [ 616.604863][T24936] device pim6reg1 entered promiscuous mode [ 617.166320][T24978] device veth0_vlan left promiscuous mode [ 617.216279][T24978] device veth0_vlan entered promiscuous mode [ 617.463874][T25023] device veth1_macvtap left promiscuous mode [ 617.826001][T25052] device wg2 entered promiscuous mode [ 618.496449][T25079] device syzkaller0 entered promiscuous mode [ 618.995280][T25104] device pim6reg1 entered promiscuous mode [ 619.431628][T25139] device sit0 left promiscuous mode [ 619.717791][T25141] device sit0 entered promiscuous mode [ 620.375992][T25185] device pim6reg1 entered promiscuous mode [ 620.510580][T25210] device veth0_vlan left promiscuous mode [ 620.531130][T25210] device veth0_vlan entered promiscuous mode [ 620.541287][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 620.553207][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 620.572622][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.675812][T25259] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.688751][T25259] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.696285][T25259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.631725][T25350] device syzkaller0 entered promiscuous mode [ 625.874757][T25464] @ÿ: renamed from bond_slave_0 [ 626.200020][T25473] ªªªªªª: renamed from vlan0 [ 626.658539][T25526] device sit0 left promiscuous mode [ 626.789166][T25528] device sit0 entered promiscuous mode [ 627.446351][T25572] device veth0_vlan left promiscuous mode [ 627.515093][T25572] device veth0_vlan entered promiscuous mode [ 627.543714][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.552761][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.567468][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.654024][T25586] device pim6reg1 entered promiscuous mode [ 627.955652][T25608] device veth1_macvtap left promiscuous mode [ 628.436954][T25631] device sit0 left promiscuous mode [ 628.626095][T25633] device sit0 entered promiscuous mode [ 630.124091][T25738] device wg2 left promiscuous mode [ 630.403149][T25756] device pim6reg1 entered promiscuous mode [ 632.337951][T25856] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.345217][T25856] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.359644][T25856] device bridge0 left promiscuous mode [ 632.469721][T25869] device bridge_slave_1 left promiscuous mode [ 632.533221][T25869] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.652979][T25869] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.724735][T25964] device veth1_macvtap entered promiscuous mode [ 634.751070][T25964] device macsec0 entered promiscuous mode [ 634.781370][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 635.015349][T25985] device wg2 entered promiscuous mode [ 636.322388][T26057] device sit0 left promiscuous mode [ 636.477098][T26062] device sit0 entered promiscuous mode [ 636.855653][T26068] device syzkaller0 entered promiscuous mode [ 637.343881][T26123] syz.2.7136[26123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.343973][T26123] syz.2.7136[26123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.621728][T26132] device syzkaller0 left promiscuous mode [ 638.275185][T26161] device sit0 left promiscuous mode [ 639.106336][T26195] device sit0 entered promiscuous mode [ 640.671809][T26271] device gretap0 left promiscuous mode [ 640.677979][T26271] bridge0: port 3(gretap0) entered disabled state [ 640.685133][T26271] device bridge_slave_1 left promiscuous mode [ 640.691372][T26271] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.699038][T26271] device bridge_slave_0 left promiscuous mode [ 640.705983][T26271] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.773027][T26270] device veth0_vlan left promiscuous mode [ 640.779813][T26270] device veth0_vlan entered promiscuous mode [ 640.841068][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 640.856240][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 640.864333][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 641.099379][T26292] device sit0 left promiscuous mode [ 642.001468][T26313] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 642.129009][T26313] device syzkaller0 entered promiscuous mode [ 648.386252][T26325] device pim6reg1 entered promiscuous mode [ 648.399200][T26325] device wg2 entered promiscuous mode [ 648.638965][T26347] ±ÿ: renamed from team_slave_1 [ 648.679125][T26355] device syzkaller0 entered promiscuous mode [ 649.974271][T26417] device sit0 entered promiscuous mode [ 650.432591][T26430] syz.3.7224[26430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.432657][T26430] syz.3.7224[26430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.719878][T26448] device macsec0 left promiscuous mode [ 650.778521][T26458] device veth1_macvtap entered promiscuous mode [ 650.792858][T26458] device macsec0 entered promiscuous mode [ 650.816297][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 650.928641][T26457] device veth0_vlan left promiscuous mode [ 650.944136][T26457] device veth0_vlan entered promiscuous mode [ 650.986800][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 650.998005][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.011191][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.687461][T26526] device veth1_macvtap left promiscuous mode [ 652.765506][T26526] device veth1_macvtap entered promiscuous mode [ 652.774910][T26526] device macsec0 entered promiscuous mode [ 653.553198][T26572] device pim6reg1 entered promiscuous mode [ 655.415644][T26762] device sit0 left promiscuous mode [ 655.455873][T26768] device sit0 entered promiscuous mode [ 655.701221][T26776] device wg2 left promiscuous mode [ 656.185280][T26814] device pim6reg1 entered promiscuous mode [ 657.210384][T26889] device sit0 left promiscuous mode [ 657.322843][T26889] device sit0 entered promiscuous mode [ 658.265996][T26925] device pim6reg1 entered promiscuous mode [ 659.783427][T26984] syzkaller0: create flow: hash 3816444131 index 2 [ 659.883915][T10513] syzkaller0: tun_net_xmit 76 [ 659.888734][T10513] syzkaller0: tun_net_xmit 48 [ 659.912259][ C0] syzkaller0: tun_net_xmit 76 [ 660.382950][ C0] syzkaller0: tun_net_xmit 76 [ 660.392473][ C0] syzkaller0: tun_net_xmit 76 [ 660.864376][T26986] syzkaller0: delete flow: hash 3816444131 index 2 [ 660.998437][T26997] syz.4.7348[26997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.998546][T26997] syz.4.7348[26997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.319875][T27031] device wg2 left promiscuous mode [ 661.471646][T27023] device wg2 entered promiscuous mode [ 661.655729][T27047] syz.2.7362[27047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.655795][T27047] syz.2.7362[27047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.869934][T27047] device veth0_vlan left promiscuous mode [ 661.893639][T27047] device veth0_vlan entered promiscuous mode [ 663.085295][T27079] device pim6reg1 entered promiscuous mode [ 665.343040][T27165] -1: renamed from syzkaller0 [ 666.550013][T27292] device veth0_vlan left promiscuous mode [ 666.586881][T27292] device veth0_vlan entered promiscuous mode [ 666.621914][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.656255][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 666.685561][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.739360][T27302] device pim6reg1 entered promiscuous mode [ 667.692609][T27360] syz.3.7429[27360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.692673][T27360] syz.3.7429[27360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.370835][T27393] p: renamed from pim6reg1 [ 668.530123][T27406] device veth0_vlan left promiscuous mode [ 668.561778][T27406] device veth0_vlan entered promiscuous mode [ 669.119022][T27465] : renamed from bond_slave_0 [ 669.470951][T27471] device pim6reg1 entered promiscuous mode [ 670.040635][T27507] device veth1_macvtap left promiscuous mode [ 670.070068][T27507] device macsec0 left promiscuous mode [ 670.267946][T27518] device veth1_macvtap left promiscuous mode [ 670.281611][T27518] device macsec0 left promiscuous mode [ 670.301641][T27518] device veth1_macvtap entered promiscuous mode [ 670.342413][T27518] device macsec0 entered promiscuous mode [ 671.062351][T27543] device veth0_vlan left promiscuous mode [ 671.152456][T27543] device veth0_vlan entered promiscuous mode [ 671.397378][T27562] device syzkaller0 entered promiscuous mode [ 672.015048][T27608] tap0: tun_chr_ioctl cmd 1074025681 [ 672.868186][T27639] syz.3.7509[27639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.868249][T27639] syz.3.7509[27639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.006634][T27653] syz.2.7513[27653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.079940][T27653] syz.2.7513[27653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.972521][T27692] device pim6reg1 entered promiscuous mode [ 674.781493][T27721] device sit0 left promiscuous mode [ 674.863713][T27721] device sit0 entered promiscuous mode [ 675.407908][T27758] device wg2 entered promiscuous mode [ 675.556836][T27775] device syzkaller0 left promiscuous mode [ 676.046876][T27805] device veth0_vlan left promiscuous mode [ 676.060100][T27805] device veth0_vlan entered promiscuous mode [ 676.094268][T27808] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.101683][T27808] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.111135][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 676.126323][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 676.137450][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 676.849738][T27850] device veth1_macvtap left promiscuous mode [ 676.861462][T27850] device macsec0 left promiscuous mode [ 676.992797][T27863] device syzkaller0 entered promiscuous mode [ 677.221248][T27875] device syzkaller0 entered promiscuous mode [ 677.228028][T27876] -1: renamed from syzkaller0 [ 677.234271][T27861] device pim6reg1 entered promiscuous mode [ 677.242939][ T885] syzkaller0: tun_net_xmit 48 [ 677.371094][T27897] device veth0_vlan left promiscuous mode [ 677.394901][T27897] device veth0_vlan entered promiscuous mode [ 677.440688][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.456861][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.465252][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.365597][T27950] device pim6reg1 entered promiscuous mode [ 678.453696][T27945] device syzkaller0 entered promiscuous mode [ 679.808279][T28020] device syzkaller0 entered promiscuous mode [ 680.323682][T28044] cgroup: fork rejected by pids controller in /syz1 [ 681.082655][T28063] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.108084][T28063] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.134197][T28063] device bridge_slave_0 entered promiscuous mode [ 681.184290][T28063] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.211938][T28063] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.264178][T28063] device bridge_slave_1 entered promiscuous mode [ 681.379989][T28063] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.387248][T28063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.394587][T28063] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.401761][T28063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.484621][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 681.513102][T15173] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.530854][T15173] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.582042][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 681.600363][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.607484][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.665389][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 681.674347][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.681438][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.713207][T28102] device syzkaller0 entered promiscuous mode [ 681.781802][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 681.791352][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 681.820437][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 681.835669][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 681.862784][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 681.871640][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 681.884302][T28063] device veth0_vlan entered promiscuous mode [ 681.939454][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 681.950864][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.005943][T28063] device veth1_macvtap entered promiscuous mode [ 682.052793][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.096724][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 682.141734][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 682.186498][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 682.199644][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.215112][T28104] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.222585][T28104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 682.231686][T28104] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.239527][T28104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 682.273201][T28104] device bridge0 entered promiscuous mode [ 682.311852][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 682.327365][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 682.350780][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 682.369473][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 682.680217][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 683.339088][T28161] device wg2 left promiscuous mode [ 683.534299][T28165] device wg2 entered promiscuous mode [ 684.785548][T28219] @ÿ: renamed from bond_slave_0 [ 685.191734][T28252] device syzkaller0 entered promiscuous mode [ 686.073312][T28271] syz.4.7680[28271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 686.073378][T28271] syz.4.7680[28271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 686.934558][T28294] device sit0 entered promiscuous mode [ 687.727319][T28341] device sit0 entered promiscuous mode [ 687.772290][T28363] syz.3.7704[28363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.772361][T28363] syz.3.7704[28363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.785183][T28363] syz.3.7704[28363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.800916][T28363] syz.3.7704[28363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.816465][T28363] device wg2 entered promiscuous mode [ 688.539625][T28400] device veth1_macvtap left promiscuous mode [ 688.741627][T28410] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.748991][T28410] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.906312][T28412] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.913440][T28412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.920806][T28412] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.927892][T28412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.163221][T28412] device bridge0 entered promiscuous mode [ 689.425183][T28427] device syzkaller0 entered promiscuous mode [ 689.544728][T28445] device sit0 left promiscuous mode [ 689.573775][T28448] device sit0 entered promiscuous mode [ 690.846473][T28520] device syzkaller0 entered promiscuous mode [ 691.035326][T28524] device veth0_vlan left promiscuous mode [ 691.108570][T28524] device veth0_vlan entered promiscuous mode [ 691.491990][T28532] device syzkaller0 entered promiscuous mode [ 691.609177][T28547] device sit0 left promiscuous mode [ 694.004905][T28638] device sit0 left promiscuous mode [ 697.297653][T28751] device sit0 entered promiscuous mode [ 698.715555][T28800] syz.4.7826[28800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.715651][T28800] syz.4.7826[28800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.502909][T28851] device syzkaller0 entered promiscuous mode [ 699.545744][T28843] device sit0 left promiscuous mode [ 700.292279][T28871] device syzkaller0 entered promiscuous mode [ 701.694071][T28942] device syzkaller0 entered promiscuous mode [ 704.375098][T29087] device veth0_vlan left promiscuous mode [ 704.482104][T29087] device veth0_vlan entered promiscuous mode [ 704.597088][T29101] bridge0: port 3(veth0) entered blocking state [ 704.646119][T29101] bridge0: port 3(veth0) entered disabled state [ 705.015321][T29101] device veth0 entered promiscuous mode [ 705.209929][T29109] device sit0 left promiscuous mode [ 705.264384][T29111] device sit0 entered promiscuous mode [ 705.735064][T29122] device pim6reg1 entered promiscuous mode [ 705.915737][T29142] device sit0 entered promiscuous mode [ 707.432531][T29210] device sit0 left promiscuous mode [ 707.676021][T29211] device sit0 entered promiscuous mode [ 708.469311][T29266] syz.3.7949[29266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.469403][T29266] syz.3.7949[29266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.483675][T29276] device sit0 left promiscuous mode [ 709.135457][T29306] device pim6reg1 entered promiscuous mode [ 709.156220][T29312] device syzkaller0 left promiscuous mode [ 709.540953][T29331] lo: mtu less than device minimum [ 711.094225][T29399] syz.4.7987[29399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.094292][T29399] syz.4.7987[29399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.030929][T29474] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.049619][T29474] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.080837][T29474] device bridge0 left promiscuous mode [ 713.118512][T29477] device bridge_slave_1 left promiscuous mode [ 713.160590][T29477] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.177520][T29477] device bridge_slave_0 left promiscuous mode [ 713.185568][T29477] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.213183][T29515] syz.0.8017[29515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.213249][T29515] syz.0.8017[29515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.521696][T29519] device syzkaller0 entered promiscuous mode [ 715.209443][T29561] device veth0_vlan left promiscuous mode [ 715.343080][T29561] device veth0_vlan entered promiscuous mode [ 715.714891][T29568] device sit0 entered promiscuous mode [ 717.091324][T29619] device veth0_vlan left promiscuous mode [ 717.100526][T29619] device veth0_vlan entered promiscuous mode [ 717.136386][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.146041][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 717.154355][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.366007][T29630] device pim6reg1 entered promiscuous mode [ 717.655648][T29638] device syzkaller0 entered promiscuous mode [ 717.914915][T29650] device sit0 entered promiscuous mode [ 719.207052][T29677] device syzkaller0 entered promiscuous mode [ 720.031680][T29727] syz.3.8074[29727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 720.031737][T29727] syz.3.8074[29727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.795764][T29804] device syzkaller0 entered promiscuous mode [ 722.229322][T29822] device syzkaller0 entered promiscuous mode [ 722.489402][T29833] GPL: port 1(erspan0) entered blocking state [ 722.502794][T29833] GPL: port 1(erspan0) entered disabled state [ 722.522800][T29833] device erspan0 entered promiscuous mode [ 722.622586][T29833] GPL: port 1(erspan0) entered blocking state [ 722.628858][T29833] GPL: port 1(erspan0) entered forwarding state [ 722.945251][T29837] device veth0_vlan left promiscuous mode [ 723.072986][T29837] device veth0_vlan entered promiscuous mode [ 723.894499][T29863] device wg2 entered promiscuous mode [ 724.021154][T29865] device syzkaller0 entered promiscuous mode [ 724.239969][T29880] tap0: tun_chr_ioctl cmd 1074025677 [ 724.270049][T29880] tap0: linktype set to 768 [ 724.276014][T29883] tap0: tun_chr_ioctl cmd 1074025677 [ 724.281974][T29883] tap0: linktype set to 768 [ 724.330132][T29878] tap0: tun_chr_ioctl cmd 1074025673 [ 725.635687][T29955] device syzkaller0 entered promiscuous mode [ 725.672634][T29955] device syzkaller0 left promiscuous mode [ 725.738974][T29982] syz.4.8136[29982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.739037][T29982] syz.4.8136[29982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.116529][T29988] ªªªªªª: renamed from vlan0 [ 728.648735][T30080] device sit0 left promiscuous mode [ 728.664802][T30080] device sit0 entered promiscuous mode [ 730.120618][T30125] device syzkaller0 entered promiscuous mode [ 734.095125][T30164] device syzkaller0 entered promiscuous mode [ 734.536766][T30188] syz.1.8194[30188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.536832][T30188] syz.1.8194[30188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.502407][T30287] device pim6reg1 entered promiscuous mode [ 739.384379][T30360] device veth0_vlan left promiscuous mode [ 739.413271][T30360] device veth0_vlan entered promiscuous mode [ 739.555954][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 739.589302][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 739.604905][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 740.177986][T30401] device veth1_macvtap left promiscuous mode [ 740.186801][T30401] device macsec0 left promiscuous mode [ 740.242614][T30404] device veth1_macvtap entered promiscuous mode [ 740.249143][T30404] device macsec0 entered promiscuous mode [ 740.297502][T30391] device syzkaller0 entered promiscuous mode [ 741.281784][T30431] device syzkaller0 entered promiscuous mode [ 741.540759][T30471] device syzkaller0 entered promiscuous mode [ 741.639328][T30492] device pim6reg1 entered promiscuous mode [ 742.545794][T30542] device syzkaller0 entered promiscuous mode [ 742.565154][T26631] syzkaller0: tun_net_xmit 48 [ 742.667632][T30543] syzkaller0: tun_net_xmit 1280 [ 742.683027][T30543] syzkaller0: create flow: hash 3035285354 index 1 [ 742.770067][T30541] syzkaller0: delete flow: hash 3035285354 index 1 [ 744.129602][T30598] device syzkaller0 entered promiscuous mode [ 746.002340][T30661] device pim6reg1 entered promiscuous mode [ 746.253758][T30666] device syzkaller0 entered promiscuous mode [ 747.062672][T30749] device pim6reg1 entered promiscuous mode [ 747.661977][T30786] device sit0 left promiscuous mode [ 748.715875][T30817] device veth0_vlan left promiscuous mode [ 748.778549][T30817] device veth0_vlan entered promiscuous mode [ 749.668375][T30866] device wg2 left promiscuous mode [ 749.797019][T30868] device sit0 left promiscuous mode [ 750.137069][T30870] device sit0 entered promiscuous mode [ 751.717285][T30972] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 753.051791][T31039] device veth0_vlan left promiscuous mode [ 753.072636][T31039] device veth0_vlan entered promiscuous mode [ 753.088814][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.153096][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 753.179240][ T398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 753.232165][T31029] ªªªªªª: renamed from vlan0 [ 753.795248][T31054] bridge0: port 3(gretap0) entered blocking state [ 753.814759][T31054] bridge0: port 3(gretap0) entered disabled state [ 753.840464][T31054] device gretap0 entered promiscuous mode [ 753.849662][T31054] bridge0: port 3(gretap0) entered blocking state [ 753.856399][T31054] bridge0: port 3(gretap0) entered forwarding state [ 754.090639][T31070] device macsec0 entered promiscuous mode [ 754.173200][T31074] device veth0_vlan left promiscuous mode [ 754.179547][T31074] device veth0_vlan entered promiscuous mode [ 754.204041][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.283269][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.324313][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 757.090291][T31122] device syzkaller0 entered promiscuous mode [ 757.279654][T31146] syz.1.8459[31146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.279710][T31146] syz.1.8459[31146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.374839][T31146] syz.1.8459[31146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.395155][T31146] syz.1.8459[31146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.441386][T31148] device macsec0 left promiscuous mode [ 757.578997][T31166] device sit0 left promiscuous mode [ 757.612245][T31166] device sit0 entered promiscuous mode [ 757.927659][T31177] device pim6reg1 entered promiscuous mode [ 757.997339][T31176] device veth1_macvtap left promiscuous mode [ 758.006078][T31176] device macsec0 left promiscuous mode [ 758.057407][T31177] device veth1_macvtap entered promiscuous mode [ 758.064361][T31177] device macsec0 entered promiscuous mode [ 758.176674][T31179] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.568436][T31188] device wg2 entered promiscuous mode [ 759.064359][T31214] device wg2 left promiscuous mode [ 759.130688][T31214] device wg2 entered promiscuous mode [ 759.993976][T31254] device syzkaller0 entered promiscuous mode [ 760.553701][T31288] device veth1_macvtap entered promiscuous mode [ 760.565073][T31288] device macsec0 entered promiscuous mode [ 760.629769][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 761.240324][T31320] device pim6reg1 entered promiscuous mode [ 761.660011][T31343] device wg2 left promiscuous mode [ 761.798306][T31341] syz.2.8512[31341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.798373][T31341] syz.2.8512[31341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.093304][T31341] device wg2 entered promiscuous mode [ 762.139163][T31355] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 762.151102][T31355] device syzkaller0 entered promiscuous mode [ 762.515746][T31402] device pim6reg1 entered promiscuous mode [ 762.525273][T31402] device sit0 left promiscuous mode [ 762.552976][T31402] device sit0 entered promiscuous mode [ 762.599724][T31406] syz.1.8528[31406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.599786][T31406] syz.1.8528[31406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.612806][T31405] syz.1.8528[31405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.622138][T31406] syz.1.8528[31406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.624730][T31405] syz.1.8528[31405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.648308][T31406] syz.1.8528[31406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.750834][T31404] device pim6reg1 entered promiscuous mode [ 763.193526][T31428] device veth0_vlan left promiscuous mode [ 763.201242][T31428] device veth0_vlan entered promiscuous mode [ 764.228070][T31476] device veth1_macvtap left promiscuous mode [ 764.272293][T31476] device macsec0 left promiscuous mode [ 764.683533][T31496] syz.4.8553[31496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 764.683597][T31496] syz.4.8553[31496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.423788][T31564] device pim6reg1 entered promiscuous mode [ 766.624343][T31570] device pim6reg1 entered promiscuous mode [ 766.814957][T31579] bridge0: port 3(gretap0) entered disabled state [ 766.821891][T31579] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.829247][T31579] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.943933][T31582] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 766.952092][T31582] device syzkaller0 entered promiscuous mode [ 767.381354][T31609] device syzkaller0 entered promiscuous mode