last executing test programs: 35.554691626s ago: executing program 4 (id=3913): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="120000000400000004000000020002f3cc368438", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="120000000400000004000000020002f3cc368438", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1c88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xa}, 0x2800, 0x0, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 35.059957525s ago: executing program 3 (id=3917): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4081, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a7"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) 34.67194285s ago: executing program 4 (id=3920): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0x8, 0x101}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000041000000060000000200000041000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00@\x00\x00\x00B\x00\x00\x00', @ANYRES32=0x1, @ANYBLOB="8000004000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r6}, 0x38) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}, 0x13909, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000340)=ANY=[@ANYRESHEX=r1, @ANYRES8=r1, @ANYRES16=r3], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xad, &(0x7f0000000000)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x16, 0x0, 0x6, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000004000000040000000900000000000000", @ANYRES32=r9, @ANYBLOB="00000000000000924cea54000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 34.384632701s ago: executing program 3 (id=3922): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000001070000002700000000000018110000", @ANYRES32, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x42) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1900000004000000080000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000c2327a483eed6eb1fc0f8144f03c22efbd51fbdcc043110068af99fdc05beb4be2649bbcc1e17de531c6975221af9a76aa6253ff5d9a43fa81a483c0bc74f89f590046cef4466ac7a36385becee8cf38961d756ff88400c3b898f70f2545834e"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18080000000000000000", @ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r5) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r7}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f0000001180)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca1bff43052f002000636777fbac141443e000000d62079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) 31.926625017s ago: executing program 4 (id=3930): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000010c0)=@generic={&(0x7f0000001080)='./file0\x00', 0x0, 0x8}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r4}, 0x18) sendmsg$unix(r3, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYRES16, @ANYRES16=r5, @ANYRES32=r0, @ANYRES8=r3, @ANYRES16=r5, @ANYBLOB="182d1ffada1b291023", @ANYRESOCT=r5], 0x48) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xc0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004003e00c4559138f5d48cdccf53ef4cde0000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8, 0x0, 0x495b}, 0x18) recvmsg(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x300}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYRESOCT=r2, @ANYRES8=r8, @ANYBLOB="4100000000001916bf4781aacd06000000000000001e0fb85fcc5dc7ba829fe6b1e0b90b535e906e55b54172f2a5f22f733026eeffc6377f33da34b721050b6add5fb1f024d9886364bdcc34f778f90545e0bdd28678c19013941964a9b4666c8d5593298112dbee41a6ccc46ec5b9a0cc72872bd94c7c0d3c3d573a9ad8c7aa13aac3735e58dfc7fc71606f35ef14d16670117f5d3bc8a204729630", @ANYRES32=0x0, @ANYRESDEC, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x200030, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000200080", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r11}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) 31.926122967s ago: executing program 0 (id=3931): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000fff800"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1ffffffffffffe94, &(0x7f0000001340)=ANY=[@ANYBLOB="1800838ea68c719fe729000000000000f1779c09", @ANYBLOB="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", @ANYBLOB="000003b9661398a99d73a30703ea3685eacbcb4eb24a4ede65472a54763a000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000e50085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x8002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000004c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000000000000000006c00000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0xe}, 0x8) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000f418110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 31.898355868s ago: executing program 1 (id=3932): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}], {0x95, 0x0, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) 31.863669579s ago: executing program 1 (id=3933): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=0x0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000fe00000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r4, 0x0, 0x0, 0x1a, &(0x7f0000000280), &(0x7f0000000280)=""/26, 0x8, 0x0, 0x99, 0x24, &(0x7f00000004c0)="9ac2542c8edaff777ce18e790f68680f954a119c68c9a914c889862a6bcf9dd84a235bd817d2298635c7c4d9ec2ec63621e096f78f8aed3e5eeb69fcf3f71528bd8cc6a3bb2e03c481d735c3f613ef0824fd5afb3d06d359f116ac3782cd6f539a9c06b9cbef7efaf51bf54535202d25bfe3446833ee73e104e00d722971c8a63b3c0811d32e63cc5c1312556065f5534b3fdad91165327c81", &(0x7f0000000680)="38bc9ab8a9986e88e2d886fa64b28a9ab64c12644e996fbdc83b789bfc1327dbba5be714", 0x3, 0x0, 0xfffffe00}, 0x50) syz_clone(0x8001500, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfffffe51) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="560a0000000000006111f820000000000000000000000000986414f520638eaec45af50c2f3cf6b398995ba993377d2cf13f4391290cd8e73582d7d9e10eafa81e1fa236a3df6b4c79b3e46cd1a3071cb81227a8da76ec8b79029058b3bf95804008d166e216d67046530c4bb4ba9b7e1c38d0e36840f5fd068beb6765323e9f5acedae57e36a7a068d9e85f858f034fdbf33fc194f6420304221657fb6f28cbebde9ebeeffa2094385a224a7279a5ad166605788f2a30e6de6d8cd7b3eb90675a94b4fd5fb6512c8aa91ec938ecd342e04007f711235e25cbd1a409017c495197a70400ea36"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 31.784154432s ago: executing program 2 (id=3934): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000de0000000000000000000200000000000000000a00000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18070000000000000000000000000000dc000000400000009500000000000000cd57d5b164befe393683e6f51e68818977787e28b47f0caa1495759b9be394e1538418db7bc3995022c94742141ed83a7a5c26615e61eab3381b33f4f38062d3ed9ee05f8a61cc845a8de56d8e58c45f0039c68e0e12a4ffb4e5af000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x2}) 31.782588782s ago: executing program 2 (id=3935): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001e40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) close(0xffffffffffffffff) socketpair(0x3b, 0x1, 0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xf, 0x7fff, 0x3, 0x81, 0x4, 0xffffffffffffffff, 0xc80d, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000580)='percpu_alloc_percpu\x00', r0}, 0x10) 31.704888545s ago: executing program 2 (id=3936): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7010000000000008500000006000000180000000000000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000d485000000000000000000050000800000000000e93fdce83a7637e38a7d5673fc28ca44721e1aef6c83d1693d21dc6faa1f5d97e5747849be9776b2622152cf58c1bf39dc9bb57890086f26cf3b9595ce693eafc8229a0803a7150c6ebafbc0cf6354628b18b6d6a6328285b457a9e00ca654e3379a33e04ad8327256955c534f261ce11cebc33069c18625d3c6cb9fa6dd3466f3eabf6ee8e16c118e56ab6aa61736eb07af1ccf7c3c432e66857d330954c6"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000007100000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000780)=r8, 0x4) sendmsg$unix(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r8, @ANYBLOB='0'], 0x48}, 0x20000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x6, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xa}, @alu={0x4, 0x1, 0x9, 0x5, 0x4, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f00000005c0)='GPL\x00', 0x1, 0xd0, &(0x7f00000008c0)=""/208, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0xa, 0xfffffffd, 0x81}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000009c0)=[r3, r2], &(0x7f0000000a00)=[{0x4, 0x5, 0x10, 0x1}], 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='timer_start\x00', r12}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 31.700406635s ago: executing program 0 (id=3946): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x14, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200e2f7ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0xf) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @enum]}}, &(0x7f0000000600)=""/152, 0x32, 0x98, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) (async, rerun: 64) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) (async, rerun: 32) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x68, 0x773f}, 0x4, 0xc8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) (async) sendmsg$inet(r4, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYRES64, @ANYRESDEC], 0xfdef) (rerun: 32) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc0189436, 0x20001412) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r3, &(0x7f0000000000)="2f8b4ec9493d25c002dd7735", &(0x7f0000000480)=""/167}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 31.629835308s ago: executing program 0 (id=3937): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8200, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0x1}], 0x1}, 0x0) (async) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r2, 0x4008744b, &(0x7f0000000180)) (async) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5358e62e572f8d52, @perf_config_ext, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x4008240b, &(0x7f00000013c0)) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001000)={'virt_wifi0\x00', @remote}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 31.628926919s ago: executing program 0 (id=3938): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f00000002c0)="ba96edb6b5695db76e2fe26c79ec812a1ba8252b731322be2d8c0164c57588c801397fdb62181dd6e18c52167e7f14793eea098122db64e5539aef863e8a449a270d010bb717d2fa43139c2816c55f0161a7b18bbb9cb695d22aa021f8b591df134d2b787f0fe74561b7cfb7ae51fbee1574c0855401706c864e189c2c362dd396daae7ffec4893c29cd6b819866850103160dd867be8b002ead2913ebba96afb59fc0898a517fb08afc64aecd47423b73f40c0e718eab655b9d8e653c7317eb9515da78b2c614e656f610987aedd2f84ba86e6ad0fa63bbdad2756ab8bd282af61e2bc23d856ce15358", &(0x7f00000001c0)=""/71, 0x4}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x5, 0x44, 0xfffff010}, {0x6, 0x2, 0x6, 0xe5}]}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)='%pI4 \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 31.505999213s ago: executing program 1 (id=3939): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='fscache_access\x00', r2, 0x0, 0x1}, 0x18) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x9, [@union={0x6, 0x1, 0x0, 0x5, 0x1, 0xffff4fa8, [{0x7, 0x1, 0x3}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0xa}, {0x10, 0x3}, {0x6, 0x4}, {0x7, 0x2}, {0xd, 0x4}, {0x7}, {0x10, 0x4}, {0x2, 0x3}]}, @ptr={0x9, 0x0, 0x0, 0x2, 0x2}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x7}}]}, {0x0, [0x0, 0x2e, 0x0, 0x41, 0x2e, 0x61, 0x61]}}, &(0x7f0000000280)=""/59, 0xd5, 0x3b, 0x1, 0xa0, 0x0, @void, @value}, 0x28) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = getpid() sendmsg$unix(r1, &(0x7f0000001740)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000003c0)="c78836b7576a0468c84b59b486dcb4c241376e22e331507547a69e6709805b4baf22460e6594f94269bbd6d005c7758e3678f71a49229e38928c0ecdff885f0bfde7728ac71ea73e650be3a3673616b81fa6b81b8ab6c745a6de2763b3366a9ac9f8861c0e59d2e1bda4795659b8be9c0154de1fc20cc8cfc7fa78", 0x7b}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="27efe9954eec98582e402a2b99842431110e35f02406c46c6151c675a8dd2482ef84ddade3675f01be65feb7655c82c0d5f1aaa47ace22aadbb692c8d58afe1db78e0960439142b8f9219c3ace81bd975e1f20f0a2b856fe17820b6b", 0x5c}, {&(0x7f00000014c0)="24163d5d773849e6d7e804dd3736a03c3dd6f31eb6c816dd1966590d81ef11c5e9471690530875d4de601c772ea8d4fdfdd1f336b6121014bcc7cba1ab80271bd812add849512e0e211a02c36d3d8ef10040ec16fcb515f7ecd685941c3e2867cd30a2b53ca98e40cb1e8e4a30d8eae43c6cf2e8ed1d12d989107b7499c4989ff3dc7e0ba7f894954be727fa0480f1eb1f2b66f87e24b1f590c8a376939651ba052d72e70401af0af7fdef85af9f7364185c9ac36c0382b9446abd7fe763583cda1b29af39e1c7b2b1dede87c5119fe8bc009d0678dbfc40e5ae55985b48ef5b0f84c7bec5c1ccfafc9ce96399ef749586cff3", 0xf3}, {&(0x7f00000015c0)="86df32b933f50afbb76eade5bf6a4ae1e6f35c9fb7a943e78d6afd8594e0f4371e7d21f14e11c2901a0de06138ca687132bc7e253b0e02ac90c40a47d8dd7f7ada965b4856b42836058fb365f7b6f52d19d6028c93aee53d210e0f736f7c09a33e2c0a211c51a0afa894457e47d0a394fe5f603be8ab2b0289d61cb10e03e356359d6f97bbceba0e55a1e1665e3e7d772b699e415000832a8be177", 0x9b}], 0x5, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff}}}], 0x20, 0x800}, 0x4008001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001800)={r2, 0x58, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x7f, 0x3, 0x0, 0x4, r4, 0x10, '\x00', r6, r3, 0x3, 0x3, 0x2, 0x6, @void, @value, @void, @value}, 0x50) openat$cgroup_procs(r2, &(0x7f00000018c0)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001b80)=@bpf_tracing={0x1a, 0x25, &(0x7f0000001900)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcd45, 0x0, 0x0, 0x0, 0xffff}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ldst={0x0, 0x3, 0x2, 0x6, 0xa, 0xfffffffffffffffc, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @jmp={0x5, 0x0, 0x5, 0x5, 0x2, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000001a40)='syzkaller\x00', 0xe, 0x3b, &(0x7f0000001a80)=""/59, 0x40f00, 0x10, '\x00', r6, 0x17, r1, 0x8, &(0x7f0000001ac0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x2, 0x4, 0x1ff, 0x2}, 0x10, 0x21b74, 0xffffffffffffffff, 0x0, &(0x7f0000001b40)=[r1, r4, r1, r7, r4, r4, r7], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001e00)={r8, 0x0, 0x6, 0x16, &(0x7f0000001c40)="6ecc76f03d02", &(0x7f0000001c80)=""/22, 0x7de, 0x0, 0xef, 0x30, &(0x7f0000001cc0)="865c544137207c1fc0b86a8a92426a648e74c419c73aa2b855d763a1302f3106b485f39a6def4468e063531542a43367a406d18bca80a6325c0a324872bb6307d9ad7a176ac5322a9817a70133f57ba53ef111dc61d4602a678fdb459d4ad78e46bdbc2dc8804ac351cec09ee70910b60ba780415bf5854379ab9b6083d681a0031e4436af425165ed1abd8962ecb3653ce259dba21c0ea5f1e10a45a7bff958aadf02183b386572c0c54e047b972a165c2e57f31d671aabe4e207dfe10f60d2741b3abfaf0a2829dfa736f7afab0886ff623121037eac22985c9d5ecd217091f58f1cd281fbf281d3b02efaf121b5", &(0x7f0000001dc0)="f76997e1f77e309e5580473d02a90e25f506add8c0d97e6b0b2f31d399797e0341e5c3e014190d933d52e240c7825213", 0x5, 0x0, 0x5}, 0x50) socketpair(0x8, 0x80000, 0xf2, &(0x7f0000001e80)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001f40)={{r2}, &(0x7f0000001ec0), &(0x7f0000001f00)=r8}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002040)={&(0x7f0000001f80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@decl_tag={0x8, 0x0, 0x0, 0x11, 0x4, 0x8}, @union={0x4, 0x4, 0x0, 0x5, 0x1, 0x3, [{0x5, 0x3, 0x3}, {0xa, 0x4, 0x152c}, {0xd, 0x5, 0x1}, {0x1, 0x5, 0x2}]}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000002000)=""/41, 0x69, 0x29, 0x0, 0x6, 0x0, @void, @value}, 0x28) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=@base={0x6, 0x5, 0x6, 0x81, 0x2800, r4, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000002100), 0x2001, 0x0) ioctl$TUNGETSNDBUF(r11, 0x800454d3, &(0x7f0000002140)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000002440)={&(0x7f00000021c0)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002240)=""/35, 0x23}, {&(0x7f0000002280)=""/117, 0x75}], 0x2, &(0x7f0000002340)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x10163) r23 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002480)={0x1b, 0x0, 0x0, 0xcb, 0x0, r22, 0x2, '\x00', r6, r9, 0x3, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002780)=@bpf_ext={0x1c, 0x20, &(0x7f0000002500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r23}}, {}, [@alu={0x7, 0x0, 0x7, 0x5, 0x6, 0xfffffffffffffffc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @generic={0x7f, 0xc, 0x2, 0x4, 0xfffffc00}, @ldst={0x2, 0x1, 0x1, 0xa, 0x10, 0xfffffffffffffffe, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x8, 0x1, 0x0, r4}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002600)='GPL\x00', 0x4, 0x6f, &(0x7f0000002640)=""/111, 0x41100, 0x5, '\x00', r6, 0x0, r10, 0x8, &(0x7f00000026c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000002700)={0x5, 0x1, 0x7, 0x5}, 0x10, 0xb045, 0xffffffffffffffff, 0x0, &(0x7f0000002740), 0x0, 0x10, 0x4, @void, @value}, 0x94) syz_clone(0x2090000, &(0x7f0000002840)="e65583ef84eca8724d4fe1fde48a9f79843c210775ef17bdb5544a12eac631dc6e0482776e7578a9a794797be848b367cd4fbfe1f688", 0x36, &(0x7f0000002880), &(0x7f00000028c0), &(0x7f0000002900)="6f64cb052fc34d9c35e3b433aebeb4fe19508dcc11a170ac52319d33d72092dcb379cefdf023e1f37ec1459e94330f3f5626f5c4fa4b230709f71512bfe9c090b634c38c51f16171b42e7e177d66a1adc8beecea7dcd6f8ee9c4972759e65308e5b6c5346254323bb17c7e78a1f1e373bc0c408e357879") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002b80)={{r18, 0xffffffffffffffff}, &(0x7f0000002b00), &(0x7f0000002b40)=r17}, 0x20) r25 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002bc0)={0x1b, 0x0, 0x0, 0x1000, 0x0, r22, 0x3, '\x00', r6, r21, 0x3, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002d00)={0x6, 0x19, &(0x7f0000002980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r20}}, @generic={0x9, 0x2, 0x5, 0x1, 0x9}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8c4c, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x1, 0x1, 0x0, r14}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000002a80)='syzkaller\x00', 0xfffffff7, 0x0, 0x0, 0x41000, 0x4, '\x00', r6, 0x25, r21, 0x8, &(0x7f0000002ac0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000002c40)=[r20, r24, r17, r16, r13, r25, r16], &(0x7f0000002c80)=[{0x2, 0x4, 0x5, 0x1}, {0x3, 0x1, 0x7, 0x9}, {0x1, 0x1, 0x4, 0xb}, {0x2, 0x3, 0xd}, {0x5, 0x4, 0xf, 0x2}, {0x0, 0x2, 0xa, 0x6}, {0x3, 0x2, 0xb, 0xb}, {0x0, 0x5, 0x5, 0xc}], 0x10, 0x1ff, @void, @value}, 0x94) openat$cgroup_ro(r19, &(0x7f0000002dc0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) 31.457499395s ago: executing program 0 (id=3940): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 31.392322188s ago: executing program 1 (id=3941): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61108c00000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 31.391930358s ago: executing program 0 (id=3942): perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20854, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x80000000c8, 0x4, 0x7, 0x3, 0x0, 0x20, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001200)=ANY=[@ANYBLOB="ffd0ff2edd65f1ed859a180005000000000000000048ad1f06e8c18f95027ce87f7fd69c000000360018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='rpcgss_svc_authenticate\x00', r1}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_config_ext={0x2, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x5, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000fb231b53000018110000f21a239c89c05201b6f66add8a6dee227ad5da6d6a4100f2e8583b0fb088bd2031e013e1105a6b92687f0600000001b93b4e7173177059c32217f74f9c00"/95, @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC, @ANYBLOB="0000004694b8759a44c2a463400d49936600"/34, @ANYRES16=r0, @ANYRES16=r4, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x6, 0x10, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffcfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x3c, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000340)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580), 0x4) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x6, &(0x7f0000000880)=ANY=[@ANYBLOB="180000008000000000000000400000009500000000000000d705f0fffcffffff8510000001000000950000000000000079c7e27e353e9ecf4177ee476e9e034bf400"/76], &(0x7f0000000440)='GPL\x00', 0x3ff, 0x0, &(0x7f0000000a80), 0x41100, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x3, 0xc, 0x0, 0xdf19}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000cc0)=[r7, r7, r5], &(0x7f0000000d00)=[{0x4, 0x4, 0xf, 0xb}, {0x2, 0x1, 0xa, 0x3}, {0x1, 0x5, 0xb, 0x1}, {0x3, 0x1, 0xf, 0x3}, {0x4, 0x4, 0x1, 0xb}, {0x5, 0x2, 0xf, 0x5}], 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x20838cec) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYBLOB="2bc914ff73101a36774f84be95a5b6518df037e7c2f08b3516d7d6ddb74e5f57f81108481d28271ca38d3fbe69d04e4b623908f1760305e71c9224eb2b648b32fad237860ca4b2ecb59d5a9743e8a9de43b8c48666f29701575b193addf4b051f8afd119307577679c8f8e81c5447ed03bbfc6d4eebe93fa100c7c166a73b846ad24af3de78615bb3342cd52637323310f496e", @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x19, 0xc, &(0x7f0000001100)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x49, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) 31.366512519s ago: executing program 2 (id=3943): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000500)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async, rerun: 64) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (rerun: 64) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b40000001000000069106a000000000004000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 31.355870359s ago: executing program 3 (id=3944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x104414, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, 0x1000000000007}, 0x0, 0xffefffffffffffff, r4, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0xc27a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x2000002, 0x0, 0x8}, 0x0, 0x0, r2, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r8}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 31.255571583s ago: executing program 3 (id=3945): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000003600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x61]}}, &(0x7f0000003680)=""/4096, 0x32, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x8, 0x42, 0x40, 0xc2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0xb008}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 31.252168543s ago: executing program 2 (id=3947): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x4, '\x00', 0x0, r6, 0x4, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={0x0}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r6, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3e, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000d00), &(0x7f00000007c0), 0x8, 0xcf, 0x8, 0xfffffffffffffce4, &(0x7f0000000800)}}, 0x10) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)=@o_path={&(0x7f0000000a80)='./cgroup\x00', 0x0, 0x4018, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x39}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x9}]}, &(0x7f0000000280)='syzkaller\x00', 0x4, 0x44, &(0x7f00000004c0)=""/68, 0x41100, 0x18, '\x00', r8, 0x0, r6, 0x8, &(0x7f0000000980)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x2, 0xd, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000b40)=[r1, r1, r7, r9, r1, r3, r6, r3, r2], &(0x7f0000000c00)=[{0x4, 0x5, 0x7, 0x8}], 0x10, 0x100000, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 31.128224978s ago: executing program 4 (id=3948): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @value=r2}, 0x28) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000000000100000100000104000000040000abbf4f093b3d12971c8356f6cc6531f254e8ce6b3ab67c530a3dd40ebace871482a0b290e7983eda74e25330c9122b754d81c5", @ANYRES32, @ANYBLOB="ff0100"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}, 0x1113c0, 0x1, 0x2, 0x0, 0x2, 0x7}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x9) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r7}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) 30.790299431s ago: executing program 4 (id=3949): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) 30.519092862s ago: executing program 3 (id=3950): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002031207b1af8ff00000000bfa100000000000007010180000000000000000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 30.518572212s ago: executing program 4 (id=3951): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x18000000000002a0, 0x5, 0x0, &(0x7f00000002c0)="443a23a02e", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00"], 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r0}, 0x3d) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a0000000500000002000000070000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000a78edd36b2bb6e451987", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="090000000800000004000000094000000a", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(&(0x7f0000000080)='./file0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r5}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/user\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x34, &(0x7f00000000c0), 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) sendmsg$inet(r7, 0x0, 0x0) recvmsg(r6, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 30.448933144s ago: executing program 1 (id=3952): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) close(r5) 30.397149796s ago: executing program 2 (id=3953): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) (async) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8002, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'caif0\x00', 0x400}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'ip_vti0\x00', 0x600}) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r7 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0xc, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=r8, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000200"/28], 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=r8, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000200"/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 30.394672017s ago: executing program 1 (id=3954): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00080000000000000000d053c5f7d5f5ddeec72395c5ee0000000000000000000000000000000000004c643bf005b52482ff51d163f3ba8a8905fd2f546d354227ec6842958da40cff885d7d592a5ad9554dddc259014fe46abcfdb1ceb2253b3b227532f39751a97a1bdaca7091"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB="3993edfa397194e117f4dc3ebe577a7016cd174ed227cc45801ec78aea4e5d70d8cbf0158c7b4603052991413754bcef619ae4267199e00d99862e8007b6aca2f1e1253ba6deb45a35d159fdf597efb50b716846d59967bf5d2de482c28516df09", @ANYRES8=r1], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r4, 0x3, 0x0, &(0x7f0000000340)=[{0x2, 0x5, 0x7, 0xc}, {0x5, 0x3, 0x5, 0x4}, {0x5, 0x4, 0x8, 0x9}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r8, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x27, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c182b50911", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="04000000040000000400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff00"/21], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESOCT=r2, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000004c0)='fsi_master_acf_cmd_abs_addr\x00', r9}, 0x18) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000400)={'team_slave_1\x00', @broadcast}) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x110e22fff6) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='xen_mc_entry_alloc\x00', r12, 0x0, 0xfffffffffffffffc}, 0x18) 30.340646199s ago: executing program 3 (id=3955): perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0xfe, 0x0, 0x0, 0x4, 0x185e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x6, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000}, 0x31}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='mm_lru_insertion\x00', r1}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile={0x6, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0]}}, &(0x7f0000000880)=""/4096, 0x27, 0x1000, 0x1, 0x3, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x19, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @exit, @map_fd={0x18, 0x7}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x100, 0x0, '\x00', r4, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x5, 0xffffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000940)=[{0x2, 0x3, 0x3, 0xb}], 0x10, 0x8000, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001900)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r3, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0300000004000000ffffff3483aafe9c64582ae51eba24611dd5430b"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001ac0)={0x6, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc00, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @alu={0x0, 0x1, 0xc, 0x6, 0x9, 0x0, 0x8}, @tail_call, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000780)='syzkaller\x00', 0x6, 0x1a, &(0x7f00000007c0)=""/26, 0x41000, 0x20, '\x00', r4, 0x25, r2, 0x8, &(0x7f0000001880)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0xd, 0x8f4a, 0x81}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001a00)=[r5, r6], &(0x7f0000001a40)=[{0x4, 0x1, 0x6, 0x3}, {0x0, 0x4, 0x5, 0x1}, {0x4, 0x1, 0x3, 0x2}, {0x3, 0x1, 0x8, 0x5}, {0x1, 0x5, 0xa, 0x4}, {0x3, 0x3, 0x9, 0x8}], 0x10, 0x9, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x19) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000006c0)='snd_soc_dapm_walk_done\x00', r7}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) 2.023817082s ago: executing program 32 (id=3942): perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20854, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x80000000c8, 0x4, 0x7, 0x3, 0x0, 0x20, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001200)=ANY=[@ANYBLOB="ffd0ff2edd65f1ed859a180005000000000000000048ad1f06e8c18f95027ce87f7fd69c000000360018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='rpcgss_svc_authenticate\x00', r1}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_config_ext={0x2, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x5, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000fb231b53000018110000f21a239c89c05201b6f66add8a6dee227ad5da6d6a4100f2e8583b0fb088bd2031e013e1105a6b92687f0600000001b93b4e7173177059c32217f74f9c00"/95, @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC, @ANYBLOB="0000004694b8759a44c2a463400d49936600"/34, @ANYRES16=r0, @ANYRES16=r4, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x6, 0x10, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffcfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x3c, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000340)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580), 0x4) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x6, &(0x7f0000000880)=ANY=[@ANYBLOB="180000008000000000000000400000009500000000000000d705f0fffcffffff8510000001000000950000000000000079c7e27e353e9ecf4177ee476e9e034bf400"/76], &(0x7f0000000440)='GPL\x00', 0x3ff, 0x0, &(0x7f0000000a80), 0x41100, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x3, 0xc, 0x0, 0xdf19}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000cc0)=[r7, r7, r5], &(0x7f0000000d00)=[{0x4, 0x4, 0xf, 0xb}, {0x2, 0x1, 0xa, 0x3}, {0x1, 0x5, 0xb, 0x1}, {0x3, 0x1, 0xf, 0x3}, {0x4, 0x4, 0x1, 0xb}, {0x5, 0x2, 0xf, 0x5}], 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x20838cec) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYBLOB="2bc914ff73101a36774f84be95a5b6518df037e7c2f08b3516d7d6ddb74e5f57f81108481d28271ca38d3fbe69d04e4b623908f1760305e71c9224eb2b648b32fad237860ca4b2ecb59d5a9743e8a9de43b8c48666f29701575b193addf4b051f8afd119307577679c8f8e81c5447ed03bbfc6d4eebe93fa100c7c166a73b846ad24af3de78615bb3342cd52637323310f496e", @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x19, 0xc, &(0x7f0000001100)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x49, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) 1.980168383s ago: executing program 33 (id=3954): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00080000000000000000d053c5f7d5f5ddeec72395c5ee0000000000000000000000000000000000004c643bf005b52482ff51d163f3ba8a8905fd2f546d354227ec6842958da40cff885d7d592a5ad9554dddc259014fe46abcfdb1ceb2253b3b227532f39751a97a1bdaca7091"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB="3993edfa397194e117f4dc3ebe577a7016cd174ed227cc45801ec78aea4e5d70d8cbf0158c7b4603052991413754bcef619ae4267199e00d99862e8007b6aca2f1e1253ba6deb45a35d159fdf597efb50b716846d59967bf5d2de482c28516df09", @ANYRES8=r1], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r4, 0x3, 0x0, &(0x7f0000000340)=[{0x2, 0x5, 0x7, 0xc}, {0x5, 0x3, 0x5, 0x4}, {0x5, 0x4, 0x8, 0x9}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r8, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x27, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c182b50911", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="04000000040000000400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff00"/21], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESOCT=r2, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000004c0)='fsi_master_acf_cmd_abs_addr\x00', r9}, 0x18) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000400)={'team_slave_1\x00', @broadcast}) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x110e22fff6) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='xen_mc_entry_alloc\x00', r12, 0x0, 0xfffffffffffffffc}, 0x18) 1.980002563s ago: executing program 34 (id=3953): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) (async) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8002, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'caif0\x00', 0x400}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'ip_vti0\x00', 0x600}) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r7 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0xc, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=r8, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000200"/28], 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=r8, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000200"/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.969996153s ago: executing program 35 (id=3955): perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0xfe, 0x0, 0x0, 0x4, 0x185e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x6, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000}, 0x31}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='mm_lru_insertion\x00', r1}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile={0x6, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0]}}, &(0x7f0000000880)=""/4096, 0x27, 0x1000, 0x1, 0x3, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x19, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @exit, @map_fd={0x18, 0x7}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x100, 0x0, '\x00', r4, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x5, 0xffffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000940)=[{0x2, 0x3, 0x3, 0xb}], 0x10, 0x8000, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001900)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r3, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0300000004000000ffffff3483aafe9c64582ae51eba24611dd5430b"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001ac0)={0x6, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc00, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @alu={0x0, 0x1, 0xc, 0x6, 0x9, 0x0, 0x8}, @tail_call, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000780)='syzkaller\x00', 0x6, 0x1a, &(0x7f00000007c0)=""/26, 0x41000, 0x20, '\x00', r4, 0x25, r2, 0x8, &(0x7f0000001880)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0xd, 0x8f4a, 0x81}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001a00)=[r5, r6], &(0x7f0000001a40)=[{0x4, 0x1, 0x6, 0x3}, {0x0, 0x4, 0x5, 0x1}, {0x4, 0x1, 0x3, 0x2}, {0x3, 0x1, 0x8, 0x5}, {0x1, 0x5, 0xa, 0x4}, {0x3, 0x3, 0x9, 0x8}], 0x10, 0x9, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x19) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000006c0)='snd_soc_dapm_walk_done\x00', r7}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) 1.959464044s ago: executing program 36 (id=3951): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x18000000000002a0, 0x5, 0x0, &(0x7f00000002c0)="443a23a02e", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00"], 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r0}, 0x3d) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a0000000500000002000000070000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000a78edd36b2bb6e451987", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="090000000800000004000000094000000a", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(&(0x7f0000000080)='./file0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r5}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/user\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x34, &(0x7f00000000c0), 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) sendmsg$inet(r7, 0x0, 0x0) recvmsg(r6, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 41.593588ms ago: executing program 5 (id=3956): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e4e6f6cc20859bcb806f18d5e8f7b126c19431fdb56af", 0x7c}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) close(r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_type(r6, &(0x7f0000000280), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 37.345099ms ago: executing program 6 (id=3957): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="30f4ffffff000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='N\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r4, 0x4) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r7}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x200, 0x74, 0x0, 0x0, 0x0, 0x10000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 9 (id=3960): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000001000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x8081000, 0x0, 0x0, &(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001340)="78437e294b34b88f92feae04cbb533359192bba2846ec565c70c39a838cebc246cfb9f158eaade08fb792834c608734212b463ddb5739417c811d964c02d1bc4e87a18630c9555f8104110481ebc47c8b67b6f043bee565386e85f17da180b2248f642dabc4538fa544bb608b5f02b20ba2d086ac1b6ff7c11f91e299e545b59112588816def0ea6f135d6") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') r4 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r5], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x44, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.28' (ED25519) to the list of known hosts. [ 19.520674][ T24] audit: type=1400 audit(1748249281.200:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.521653][ T267] cgroup: Unknown subsys name 'net' [ 19.527906][ T24] audit: type=1400 audit(1748249281.200:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.533245][ T24] audit: type=1400 audit(1748249281.210:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.533380][ T267] cgroup: Unknown subsys name 'devices' [ 19.715190][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.720798][ T267] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 19.917457][ T24] audit: type=1400 audit(1748249281.600:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.930653][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.940817][ T24] audit: type=1400 audit(1748249281.600:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.974787][ T24] audit: type=1400 audit(1748249281.600:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.974838][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.997930][ T24] audit: type=1400 audit(1748249281.630:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.032103][ T24] audit: type=1400 audit(1748249281.630:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.057697][ T24] audit: type=1400 audit(1748249281.640:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.083365][ T24] audit: type=1400 audit(1748249281.640:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.922261][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.929429][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.936872][ T276] device bridge_slave_0 entered promiscuous mode [ 20.944528][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.951552][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.958902][ T276] device bridge_slave_1 entered promiscuous mode [ 21.009196][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.016403][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.023901][ T275] device bridge_slave_0 entered promiscuous mode [ 21.039246][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.046438][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.053885][ T275] device bridge_slave_1 entered promiscuous mode [ 21.083502][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.090579][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.097938][ T279] device bridge_slave_0 entered promiscuous mode [ 21.106636][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.113832][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.121204][ T279] device bridge_slave_1 entered promiscuous mode [ 21.138476][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.145548][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.152845][ T277] device bridge_slave_0 entered promiscuous mode [ 21.184088][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.191156][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.198574][ T277] device bridge_slave_1 entered promiscuous mode [ 21.212467][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.219899][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.227295][ T278] device bridge_slave_0 entered promiscuous mode [ 21.253595][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.260646][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.268260][ T278] device bridge_slave_1 entered promiscuous mode [ 21.303402][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.310459][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.317738][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.324765][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.382030][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.389102][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.396358][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.403492][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.419743][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.426823][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.434090][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.441102][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.459726][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.467064][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.474306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.481743][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.489492][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.496864][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.504055][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.527014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.534517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.570228][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.578419][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.585509][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.592984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.601732][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.608813][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.617199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.625266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.633142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.641391][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.648438][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.655744][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.664092][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.671139][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.687633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.695292][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.703386][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.710457][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.718785][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.727299][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.734352][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.754626][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.762543][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.770807][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.779128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.787357][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.794415][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.801783][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.809918][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.816947][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.824302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.840793][ T275] device veth0_vlan entered promiscuous mode [ 21.855026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.862686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.871121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.879948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.888024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.895589][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.903918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.911747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.920070][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.927107][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.934700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.942870][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.949923][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.957372][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.965571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.979485][ T276] device veth0_vlan entered promiscuous mode [ 21.991500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.000290][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.008925][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.017366][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.026271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.034318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.042153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.050206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.058103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.065560][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.085174][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.093370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.101392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.109672][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.118865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.127321][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.135689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.143842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.155372][ T276] device veth1_macvtap entered promiscuous mode [ 22.166027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.174549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.182623][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.190304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.198871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.207220][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.215074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.223071][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.230595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.239111][ T275] device veth1_macvtap entered promiscuous mode [ 22.247768][ T279] device veth0_vlan entered promiscuous mode [ 22.257043][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.265087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.273245][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.281796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.290022][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.300607][ T278] device veth0_vlan entered promiscuous mode [ 22.310007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.318085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.326551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.334867][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.342770][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.350439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.358200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.365734][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.373489][ T277] device veth0_vlan entered promiscuous mode [ 22.386753][ T278] device veth1_macvtap entered promiscuous mode [ 22.393374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.401869][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.410392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.418940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.427768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.435923][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.444087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.467307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.475576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.484245][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.492388][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.501136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.509376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.519801][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.528161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.538246][ T277] device veth1_macvtap entered promiscuous mode [ 22.556636][ T279] device veth1_macvtap entered promiscuous mode [ 22.558008][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 22.576625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.584329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.591844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.600746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.609333][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.617707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.626355][ T278] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.657109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.675955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.686952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.695501][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.793536][ C1] hrtimer: interrupt took 22409 ns [ 25.763422][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 25.763434][ T24] audit: type=1400 audit(1748249287.440:117): avc: denied { relabelfrom } for pid=451 comm="syz.2.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.838153][ T24] audit: type=1400 audit(1748249287.440:118): avc: denied { relabelto } for pid=451 comm="syz.2.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.257688][ T465] device syzkaller0 entered promiscuous mode [ 26.395489][ T24] audit: type=1400 audit(1748249288.080:119): avc: denied { create } for pid=474 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.417179][ T475] device macsec0 entered promiscuous mode [ 26.507870][ T485] cgroup: syz.0.51 (485) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.548659][ T485] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.773827][ T24] audit: type=1400 audit(1748249288.440:120): avc: denied { create } for pid=529 comm="syz.3.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 26.805692][ T24] audit: type=1400 audit(1748249288.440:121): avc: denied { create } for pid=529 comm="syz.3.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 26.906043][ T24] audit: type=1400 audit(1748249288.580:122): avc: denied { create } for pid=539 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 26.986706][ T541] syz.3.65 (541) used obsolete PPPIOCDETACH ioctl [ 27.428203][ T565] device veth0_vlan left promiscuous mode [ 27.457671][ T565] device veth0_vlan entered promiscuous mode [ 27.623312][ T570] device pim6reg1 entered promiscuous mode [ 28.302695][ T24] audit: type=1400 audit(1748249289.980:123): avc: denied { create } for pid=619 comm="syz.3.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 28.349080][ T24] audit: type=1400 audit(1748249290.030:124): avc: denied { create } for pid=622 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.714664][ T615] device syzkaller0 entered promiscuous mode [ 29.355518][ T660] device veth0_vlan left promiscuous mode [ 29.390469][ T660] device veth0_vlan entered promiscuous mode [ 29.447391][ T661] device pim6reg1 entered promiscuous mode [ 29.527760][ T24] audit: type=1400 audit(1748249291.210:125): avc: denied { create } for pid=662 comm="syz.4.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.117983][ T695] device syzkaller0 entered promiscuous mode [ 30.189141][ T697] device veth1_macvtap left promiscuous mode [ 30.244823][ T694] device veth1_macvtap entered promiscuous mode [ 30.268832][ T694] device macsec0 entered promiscuous mode [ 30.370774][ T24] audit: type=1400 audit(1748249292.050:126): avc: denied { create } for pid=699 comm="syz.2.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 30.847310][ T24] audit: type=1400 audit(1748249292.530:127): avc: denied { create } for pid=724 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 30.964173][ T24] audit: type=1400 audit(1748249292.650:128): avc: denied { create } for pid=727 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 31.117877][ T24] audit: type=1400 audit(1748249292.800:129): avc: denied { write } for pid=735 comm="syz.2.120" name="cgroup.subtree_control" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 31.230868][ T24] audit: type=1400 audit(1748249292.800:130): avc: denied { open } for pid=735 comm="syz.2.120" path="" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 31.279548][ T736] device veth0_vlan left promiscuous mode [ 31.295598][ T736] device veth0_vlan entered promiscuous mode [ 32.046111][ T770] device wg2 entered promiscuous mode [ 32.155103][ T24] audit: type=1400 audit(1748249293.840:131): avc: denied { ioctl } for pid=777 comm="syz.4.132" path="socket:[17490]" dev="sockfs" ino=17490 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.309614][ T784] device veth0_vlan left promiscuous mode [ 32.319331][ T784] device veth0_vlan entered promiscuous mode [ 32.820228][ T799] device sit0 entered promiscuous mode [ 34.303041][ T24] audit: type=1400 audit(1748249295.980:132): avc: denied { tracepoint } for pid=821 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.674406][ T95] udevd[95]: worker [298] terminated by signal 33 (Unknown signal 33) [ 36.731589][ T95] udevd[95]: worker [298] failed while handling '/devices/virtual/block/loop0' [ 36.806014][ T964] Â: renamed from pim6reg1 [ 37.038912][ T992] device sit0 entered promiscuous mode [ 37.149141][ T24] audit: type=1400 audit(1748249298.830:133): avc: denied { create } for pid=991 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 38.574858][ T1078] device pim6reg1 entered promiscuous mode [ 38.890817][ T1082] device syzkaller0 entered promiscuous mode [ 39.546599][ T24] audit: type=1400 audit(1748249301.230:134): avc: denied { create } for pid=1159 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 40.522958][ T1227] device veth0_vlan left promiscuous mode [ 40.557518][ T1227] device veth0_vlan entered promiscuous mode [ 40.988137][ T1260] device sit0 left promiscuous mode [ 41.207966][ T1271] device pim6reg1 entered promiscuous mode [ 41.863248][ T1304] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.871981][ T1304] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.002313][ T1304] device bridge_slave_1 left promiscuous mode [ 42.027051][ T1304] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.076254][ T1304] device bridge_slave_0 left promiscuous mode [ 42.095457][ T1304] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.242435][ T1404] device veth0_vlan left promiscuous mode [ 44.251184][ T1404] device veth0_vlan entered promiscuous mode [ 44.266382][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.277998][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.286139][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.577076][ T24] audit: type=1400 audit(1748249306.260:135): avc: denied { create } for pid=1439 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 44.682947][ T1444] p: renamed from pim6reg1 [ 44.689703][ T24] audit: type=1400 audit(1748249306.370:136): avc: denied { create } for pid=1439 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 45.137246][ T1480] device veth1_macvtap left promiscuous mode [ 45.170351][ T1480] device macsec0 entered promiscuous mode [ 45.280476][ T1480] device veth1_macvtap entered promiscuous mode [ 45.368802][ T1484] device veth1_macvtap left promiscuous mode [ 46.322253][ T1512] device veth0_vlan left promiscuous mode [ 46.358983][ T1512] device veth0_vlan entered promiscuous mode [ 48.533150][ T1579] device syzkaller0 entered promiscuous mode [ 49.147496][ T1611] device pim6reg1 entered promiscuous mode [ 49.198693][ T1625] device sit0 left promiscuous mode [ 49.435771][ T1637] device wg2 entered promiscuous mode [ 50.123011][ T1703] tap0: tun_chr_ioctl cmd 1074025681 [ 50.531769][ T1713] device syzkaller0 entered promiscuous mode [ 50.603155][ T1716] device syzkaller0 entered promiscuous mode [ 51.504545][ T1754] @0: renamed from bond_slave_0 [ 51.740938][ T1754] device syzkaller0 entered promiscuous mode [ 52.048049][ T1797] device pim6reg1 entered promiscuous mode [ 53.793220][ T1857] device syzkaller0 entered promiscuous mode [ 54.872872][ T24] audit: type=1400 audit(1748249316.550:137): avc: denied { create } for pid=1916 comm="syz.2.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 54.906553][ T24] audit: type=1400 audit(1748249316.590:138): avc: denied { create } for pid=1926 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 54.951150][ T1915] device veth0_vlan left promiscuous mode [ 54.961065][ T1915] device veth0_vlan entered promiscuous mode [ 55.055341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.065836][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.102556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.149719][ T1934] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 55.357769][ T24] audit: type=1400 audit(1748249317.040:139): avc: denied { create } for pid=1950 comm="syz.2.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 55.638027][ T1984] device sit0 entered promiscuous mode [ 55.776538][ T1999] device pim6reg1 entered promiscuous mode [ 56.143547][ T2037] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 56.153278][ T2037] pim6reg0: linktype set to 780 [ 56.174589][ T2033] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 56.468570][ T2060] device veth0_vlan left promiscuous mode [ 56.514747][ T2060] device veth0_vlan entered promiscuous mode [ 56.595378][ T2064] device pim6reg1 entered promiscuous mode [ 56.796207][ T24] audit: type=1400 audit(1748249318.480:140): avc: denied { create } for pid=2079 comm="syz.0.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 56.933695][ T2086] device pim6reg1 entered promiscuous mode [ 57.234745][ T2112] device pim6reg1 entered promiscuous mode [ 57.399053][ T2118] device pim6reg1 entered promiscuous mode [ 57.834562][ T2158] device syzkaller0 entered promiscuous mode [ 58.045102][ T24] audit: type=1400 audit(1748249319.730:141): avc: denied { create } for pid=2171 comm="syz.2.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 58.078733][ T2172] device macsec0 left promiscuous mode [ 58.752348][ T2211] ªªªªªª: renamed from vlan0 [ 60.971862][ T24] audit: type=1400 audit(1748249322.650:142): avc: denied { associate } for pid=2338 comm="syz.2.558" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 61.888492][ T2368] device pim6reg1 entered promiscuous mode [ 62.632810][ T2419] device pim6reg1 entered promiscuous mode [ 62.820017][ T2436] syz.0.586[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.820094][ T2436] syz.0.586[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.491969][ T2453] device syzkaller0 entered promiscuous mode [ 63.898292][ T2469] device syzkaller0 entered promiscuous mode [ 64.194265][ T2470] device pim6reg1 entered promiscuous mode [ 67.438370][ T24] audit: type=1400 audit(1748249329.120:143): avc: denied { create } for pid=2619 comm="syz.3.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 68.387286][ T2678] device veth0_vlan left promiscuous mode [ 68.394482][ T2678] device veth0_vlan entered promiscuous mode [ 68.408832][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.418024][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 68.426518][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.514042][ T2689] device sit0 entered promiscuous mode [ 68.734590][ T2698] device syzkaller0 entered promiscuous mode [ 68.847906][ T2696] device syzkaller0 entered promiscuous mode [ 69.015538][ T24] audit: type=1400 audit(1748249330.700:144): avc: denied { create } for pid=2704 comm="syz.2.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 69.855801][ T2759] device pim6reg1 entered promiscuous mode [ 69.935640][ T2776] device veth0_vlan left promiscuous mode [ 69.977645][ T2776] device veth0_vlan entered promiscuous mode [ 70.357466][ T2786] ªªªªªª: renamed from vlan0 [ 70.560946][ T2808] syz.3.690[2808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.561030][ T2808] syz.3.690[2808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.586148][ T24] audit: type=1400 audit(1748249332.270:145): avc: denied { create } for pid=2803 comm="syz.4.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 71.670705][ T2889] syz.3.713[2889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.058894][ T2922] device syzkaller0 entered promiscuous mode [ 72.119777][ T2922] syz.1.722[2922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.128274][ T2922] device wg2 entered promiscuous mode [ 72.166766][ T24] audit: type=1400 audit(1748249333.850:146): avc: denied { create } for pid=2920 comm="syz.1.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 72.239416][ T24] audit: type=1400 audit(1748249333.920:147): avc: denied { create } for pid=2925 comm="syz.0.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 72.434114][ T2935] device veth0_vlan left promiscuous mode [ 72.465038][ T2935] device veth0_vlan entered promiscuous mode [ 72.527289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.536928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.544660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.605789][ T2954] device pim6reg1 entered promiscuous mode [ 72.647800][ T2964] device sit0 left promiscuous mode [ 72.732191][ T2964] device sit0 entered promiscuous mode [ 72.877592][ T2968] device pim6reg1 entered promiscuous mode [ 73.650676][ T24] audit: type=1400 audit(1748249335.330:148): avc: denied { create } for pid=3029 comm="syz.1.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 75.389870][ T3103] device pim6reg1 entered promiscuous mode [ 77.583757][ T24] audit: type=1400 audit(1748249339.180:149): avc: denied { create } for pid=3180 comm="syz.1.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 77.821292][ T3200] device syzkaller0 entered promiscuous mode [ 77.950405][ T3211] device pim6reg1 entered promiscuous mode [ 79.313437][ T24] audit: type=1400 audit(1748249340.990:150): avc: denied { create } for pid=3310 comm="syz.2.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 80.548509][ T3369] Q±6ã×\b‹¡Y­4: renamed from lo [ 80.730852][ T3374] device veth0_vlan left promiscuous mode [ 80.794467][ T3374] device veth0_vlan entered promiscuous mode [ 80.841411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.852014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.862951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.094622][ T3386] syz.0.859[3386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.098910][ T3386] syz.0.859[3386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.914122][ T3468] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.932557][ T3468] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.020591][ T3479] device pim6reg1 entered promiscuous mode [ 83.066773][ T3468] device bridge_slave_1 left promiscuous mode [ 83.081008][ T3468] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.092780][ T3468] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.207412][ T3486] device veth1_macvtap left promiscuous mode [ 83.214181][ T3486] device macsec0 left promiscuous mode [ 83.405791][ T3497] syz.3.894[3497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.405874][ T3497] syz.3.894[3497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.761623][ T3507] device syzkaller0 entered promiscuous mode [ 84.295557][ T3532] device veth0_vlan left promiscuous mode [ 84.319016][ T3532] device veth0_vlan entered promiscuous mode [ 84.393321][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.412096][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.445321][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.630290][ T3545] device veth1_to_bond entered promiscuous mode [ 86.357503][ T3612] device syzkaller0 entered promiscuous mode [ 87.640793][ T3670] device syzkaller0 entered promiscuous mode [ 87.854308][ T3690] ------------[ cut here ]------------ [ 87.867447][ T3690] trace type BPF program uses run-time allocation [ 87.905425][ T3690] WARNING: CPU: 1 PID: 3690 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 87.990730][ T3690] Modules linked in: [ 87.994742][ T3690] CPU: 0 PID: 3690 Comm: syz.3.952 Not tainted 5.10.237-syzkaller #0 [ 88.002851][ T3690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.029154][ T3690] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 88.036202][ T3690] Code: 85 e9 14 fe ff ff e8 59 f7 ef ff 31 c0 e9 15 fe ff ff e8 4d f7 ef ff c6 05 a3 9b 2c 05 01 48 c7 c7 e0 6a 05 85 e8 ba 3d f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 88.080067][ T3699] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.087311][ T3699] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.096899][ T3690] RSP: 0018:ffffc9000107f468 EFLAGS: 00010246 [ 88.103112][ T3690] RAX: d757e5d61170d200 RBX: 0000000000000001 RCX: ffff88811710cf00 [ 88.119109][ T3690] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 88.144738][ T3690] RBP: ffffc9000107f4b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 88.145885][ T3699] device bridge_slave_1 left promiscuous mode [ 88.152744][ T3690] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff8881367a8000 [ 88.152753][ T3690] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811c88f000 [ 88.152763][ T3690] FS: 00007f4e925e76c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 88.152769][ T3690] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 88.152788][ T3690] CR2: 0000200000028000 CR3: 000000011b17b000 CR4: 00000000003506b0 [ 88.183425][ T3699] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.229324][ T3699] device bridge_slave_0 left promiscuous mode [ 88.278697][ T3699] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.354069][ T3690] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 88.362143][ T3690] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 88.371277][ T3690] Call Trace: [ 88.389830][ T3690] ? __fdget+0x1a1/0x230 [ 88.394306][ T3690] resolve_pseudo_ldimm64+0x526/0x1020 [ 88.421407][ T3690] ? bpf_check+0xd720/0xd720 [ 88.426236][ T3690] ? kvmalloc_node+0x88/0x130 [ 88.430959][ T3690] bpf_check+0x8db4/0xd720 [ 88.460453][ T3690] ? bpf_get_btf_vmlinux+0x60/0x60 [ 88.472164][ T3690] ? 0xffffffffa002ac3c [ 88.530082][ T3690] ? is_bpf_text_address+0x177/0x190 [ 88.565544][ T3690] ? selinux_bpf_prog_alloc+0x51/0x140 [ 88.600096][ T3690] ? __kernel_text_address+0xa0/0x100 [ 88.622550][ T3690] ? unwind_get_return_address+0x4d/0x90 [ 88.641910][ T3690] ? stack_trace_save+0xe0/0xe0 [ 88.653069][ T3690] ? arch_stack_walk+0xee/0x140 [ 88.658102][ T3690] ? stack_trace_save+0x98/0xe0 [ 88.664817][ T3690] ? stack_trace_snprint+0xf0/0xf0 [ 88.673687][ T3690] ? __kasan_slab_alloc+0x69/0xf0 [ 88.750391][ T3690] ? selinux_bpf_prog_alloc+0x51/0x140 [ 88.763847][ T3690] ? __kasan_kmalloc+0xec/0x110 [ 88.777177][ T3690] ? __kasan_kmalloc+0xda/0x110 [ 88.796550][ T3690] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 88.857439][ T3690] ? selinux_bpf_prog_alloc+0x51/0x140 [ 88.863007][ T3690] ? security_bpf_prog_alloc+0x62/0x90 [ 88.889434][ T3690] ? bpf_prog_load+0x949/0x1420 [ 88.909637][ T3690] ? __se_sys_bpf+0x442/0x680 [ 88.933046][ T3690] ? __x64_sys_bpf+0x7b/0x90 [ 88.941284][ T3690] ? do_syscall_64+0x31/0x40 [ 88.962897][ T3690] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 89.005034][ T3690] ? memset+0x35/0x40 [ 89.009062][ T3690] ? bpf_obj_name_cpy+0x193/0x1e0 [ 89.064176][ T3690] bpf_prog_load+0xf5a/0x1420 [ 89.068884][ T3690] ? map_freeze+0x320/0x320 [ 89.073393][ T3690] ? selinux_bpf+0xc7/0xf0 [ 89.141782][ T3690] ? security_bpf+0x82/0xa0 [ 89.163721][ T3690] __se_sys_bpf+0x442/0x680 [ 89.167238][ T3723] device pim6reg1 entered promiscuous mode [ 89.187590][ T3690] ? __x64_sys_bpf+0x90/0x90 [ 89.221479][ T3690] ? fpu__clear_all+0x20/0x20 [ 89.246311][ T3690] __x64_sys_bpf+0x7b/0x90 [ 89.250979][ T3690] do_syscall_64+0x31/0x40 [ 89.303645][ T3690] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 89.309576][ T3690] RIP: 0033:0x7f4e93f9f969 [ 89.338684][ T3690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.453613][ T3690] RSP: 002b:00007f4e925e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.493622][ T3690] RAX: ffffffffffffffda RBX: 00007f4e941c7080 RCX: 00007f4e93f9f969 [ 89.521694][ T3690] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 89.529979][ T3690] RBP: 00007f4e94021ab1 R08: 0000000000000000 R09: 0000000000000000 [ 89.538647][ T3690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 89.546925][ T3690] R13: 0000000000000000 R14: 00007f4e941c7080 R15: 00007ffed81442f8 [ 89.555081][ T3690] ---[ end trace 9344a394603ffdca ]--- [ 90.308582][ T3774] device sit0 left promiscuous mode [ 90.593280][ T3777] device sit0 entered promiscuous mode [ 91.330585][ T3800] device syzkaller0 entered promiscuous mode [ 92.217607][ T3827] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.224808][ T3827] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.035116][ T3886] device syzkaller0 entered promiscuous mode [ 93.201574][ T3896] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 93.367554][ T24] audit: type=1400 audit(1748249355.050:151): avc: denied { ioctl } for pid=3902 comm="syz.1.1012" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 93.448724][ T3909] device pim6reg1 entered promiscuous mode [ 93.654052][ T3935] device pim6reg1 entered promiscuous mode [ 93.811416][ T3926] device pim6reg1 entered promiscuous mode [ 95.600583][ T4034] device sit0 left promiscuous mode [ 95.677712][ T4035] device sit0 entered promiscuous mode [ 95.938986][ T4042] device syzkaller0 entered promiscuous mode [ 97.832732][ T4100] device sit0 left promiscuous mode [ 99.677509][ T24] audit: type=1400 audit(1748249361.360:152): avc: denied { create } for pid=4171 comm="syz.2.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.876621][ T4179] device wg2 entered promiscuous mode [ 100.568758][ T4234] bridge0: port 3(veth0) entered blocking state [ 100.583594][ T4234] bridge0: port 3(veth0) entered disabled state [ 100.635722][ T4234] device veth0 entered promiscuous mode [ 100.707427][ T4234] bridge0: port 3(veth0) entered blocking state [ 100.713789][ T4234] bridge0: port 3(veth0) entered forwarding state [ 100.720845][ T4248] syz.0.1119[4248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.720931][ T4248] syz.0.1119[4248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.734702][ T4245] tun0: tun_chr_ioctl cmd 1074025676 [ 100.735723][ T4247] syz.4.1121[4247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.751433][ T4247] syz.4.1121[4247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.751559][ T4245] tun0: owner set to 0 [ 101.041693][ T4265] device veth0_vlan left promiscuous mode [ 101.142852][ T4265] device veth0_vlan entered promiscuous mode [ 101.256495][ T4270] device wg2 left promiscuous mode [ 101.314381][ T4268] Â: renamed from pim6reg1 [ 101.345592][ T4270] device wg2 entered promiscuous mode [ 101.782123][ T4319] device syzkaller0 left promiscuous mode [ 102.318907][ T4370] device syzkaller0 entered promiscuous mode [ 102.465678][ T4369] device syzkaller0 entered promiscuous mode [ 102.926263][ T4390] device veth1_macvtap left promiscuous mode [ 103.124342][ T4402] device sit0 entered promiscuous mode [ 103.613742][ T4430] device pim6reg1 entered promiscuous mode [ 104.200840][ T4466] device syzkaller0 entered promiscuous mode [ 104.219414][ T4466] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 104.283886][ T4469] device pim6reg1 entered promiscuous mode [ 104.861627][ T24] audit: type=1400 audit(1748249366.540:153): avc: denied { create } for pid=4514 comm="syz.0.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 104.996712][ T4532] device pim6reg1 entered promiscuous mode [ 105.059611][ T4531] device syzkaller0 entered promiscuous mode [ 106.030386][ T4574] device syzkaller0 entered promiscuous mode [ 106.258435][ T4603] syz.3.1215[4603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.258496][ T4603] syz.3.1215[4603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.481200][ T4603] device veth0_vlan left promiscuous mode [ 106.513591][ T4603] device veth0_vlan entered promiscuous mode [ 106.558002][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.571002][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 106.595345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.049175][ T4614] device pim6reg1 entered promiscuous mode [ 107.728764][ T4668] device pim6reg1 entered promiscuous mode [ 108.120894][ T4677] syz.1.1236[4677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.120961][ T4677] syz.1.1236[4677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.283307][ T4714] syz.0.1250[4714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.306298][ T4716] device pim6reg1 entered promiscuous mode [ 109.351790][ T4714] syz.0.1250[4714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.814878][ T4742] device wg2 left promiscuous mode [ 109.901203][ T4745] device wg2 entered promiscuous mode [ 109.987707][ T4746] device pim6reg1 entered promiscuous mode [ 110.077615][ T4749] device pim6reg1 entered promiscuous mode [ 111.818126][ T4851] tap0: tun_chr_ioctl cmd 1074025675 [ 111.828056][ T4851] tap0: persist enabled [ 111.833127][ T4851] tap0: tun_chr_ioctl cmd 1074025675 [ 111.838994][ T4851] tap0: persist disabled [ 112.783715][ T4909] device syzkaller0 entered promiscuous mode [ 114.078005][ T4940] device sit0 left promiscuous mode [ 114.146685][ T4943] device sit0 entered promiscuous mode [ 114.503119][ T24] audit: type=1400 audit(1748249376.180:154): avc: denied { create } for pid=4965 comm="syz.2.1320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 115.003111][ T4989] device wg2 left promiscuous mode [ 115.016016][ T4989] device wg2 entered promiscuous mode [ 115.041407][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 115.368321][ T5020] device pim6reg1 entered promiscuous mode [ 115.573884][ T5025] device syzkaller0 entered promiscuous mode [ 115.658272][ T5031] device sit0 left promiscuous mode [ 115.827008][ T5034] device sit0 entered promiscuous mode [ 116.004792][ T5041] device pim6reg1 entered promiscuous mode [ 116.169754][ T5062] device sit0 entered promiscuous mode [ 116.268786][ T5057] device veth0_vlan left promiscuous mode [ 116.288659][ T5057] device veth0_vlan entered promiscuous mode [ 116.354153][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.363150][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.374104][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.571858][ T5072] device sit0 left promiscuous mode [ 117.113426][ T5084] device syzkaller0 entered promiscuous mode [ 117.199889][ T5096] device pim6reg1 entered promiscuous mode [ 117.428441][ T5116] device macsec0 entered promiscuous mode [ 117.498397][ T5117] device veth1_macvtap entered promiscuous mode [ 117.524426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.872000][ T5256] device pim6reg1 entered promiscuous mode [ 119.912326][ T5258] device sit0 left promiscuous mode [ 119.961382][ T5261] device sit0 entered promiscuous mode [ 120.084448][ T5263] device sit0 left promiscuous mode [ 120.271796][ T5274] syz.2.1401[5274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.271901][ T5274] syz.2.1401[5274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.536444][ T5285] device syzkaller0 left promiscuous mode [ 121.559255][ T5338] ÿÿÿÿÿÿ: renamed from vlan1 [ 122.205557][ T5357] device pim6reg1 entered promiscuous mode [ 122.793307][ T5382] device veth0_vlan left promiscuous mode [ 122.817442][ T5382] device veth0_vlan entered promiscuous mode [ 122.847725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.857034][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 122.865141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 123.668943][ T5423] device sit0 entered promiscuous mode [ 124.069241][ T5442] device syzkaller0 entered promiscuous mode [ 124.363771][ T5466] FAULT_INJECTION: forcing a failure. [ 124.363771][ T5466] name failslab, interval 1, probability 0, space 0, times 1 [ 124.423560][ T5466] CPU: 1 PID: 5466 Comm: syz.1.1460 Tainted: G W 5.10.237-syzkaller #0 [ 124.433145][ T5466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 124.443376][ T5466] Call Trace: [ 124.446681][ T5466] __dump_stack+0x21/0x24 [ 124.451023][ T5466] dump_stack_lvl+0x169/0x1d8 [ 124.455707][ T5466] ? thaw_kernel_threads+0x220/0x220 [ 124.460993][ T5466] ? show_regs_print_info+0x18/0x18 [ 124.466190][ T5466] ? proc_fail_nth_read+0x210/0x210 [ 124.471399][ T5466] dump_stack+0x15/0x1c [ 124.475552][ T5466] should_fail+0x3c1/0x510 [ 124.479965][ T5466] ? map_get_next_key+0x213/0x4c0 [ 124.484989][ T5466] __should_failslab+0xa4/0xe0 [ 124.489753][ T5466] should_failslab+0x9/0x20 [ 124.494257][ T5466] __kmalloc_track_caller+0x5f/0x320 [ 124.499542][ T5466] memdup_user+0x25/0xb0 [ 124.503781][ T5466] map_get_next_key+0x213/0x4c0 [ 124.508634][ T5466] ? security_bpf+0x82/0xa0 [ 124.513144][ T5466] __se_sys_bpf+0x31d/0x680 [ 124.517652][ T5466] ? __x64_sys_bpf+0x90/0x90 [ 124.522231][ T5466] ? fpu__clear_all+0x20/0x20 [ 124.526904][ T5466] __x64_sys_bpf+0x7b/0x90 [ 124.531306][ T5466] do_syscall_64+0x31/0x40 [ 124.535712][ T5466] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 124.541585][ T5466] RIP: 0033:0x7f2074a0d969 [ 124.545990][ T5466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.565592][ T5466] RSP: 002b:00007f2073076038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.573992][ T5466] RAX: ffffffffffffffda RBX: 00007f2074c34fa0 RCX: 00007f2074a0d969 [ 124.581946][ T5466] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 124.589917][ T5466] RBP: 00007f2073076090 R08: 0000000000000000 R09: 0000000000000000 [ 124.597874][ T5466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.605829][ T5466] R13: 0000000000000000 R14: 00007f2074c34fa0 R15: 00007fff9a6caa98 [ 124.957881][ T5505] cgroup: fork rejected by pids controller in /syz2 [ 125.045571][ T5536] device sit0 entered promiscuous mode [ 125.160657][ T5557] FAULT_INJECTION: forcing a failure. [ 125.160657][ T5557] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 125.231558][ T5557] CPU: 1 PID: 5557 Comm: syz.0.1474 Tainted: G W 5.10.237-syzkaller #0 [ 125.241151][ T5557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 125.251201][ T5557] Call Trace: [ 125.254491][ T5557] __dump_stack+0x21/0x24 [ 125.258826][ T5557] dump_stack_lvl+0x169/0x1d8 [ 125.263503][ T5557] ? show_regs_print_info+0x18/0x18 [ 125.268705][ T5557] dump_stack+0x15/0x1c [ 125.272862][ T5557] should_fail+0x3c1/0x510 [ 125.277278][ T5557] should_fail_usercopy+0x1a/0x20 [ 125.282300][ T5557] _copy_from_user+0x20/0xd0 [ 125.287073][ T5557] memdup_user+0x5e/0xb0 [ 125.291313][ T5557] map_get_next_key+0x213/0x4c0 [ 125.296165][ T5557] ? security_bpf+0x82/0xa0 [ 125.300664][ T5557] __se_sys_bpf+0x31d/0x680 [ 125.305154][ T5557] ? __x64_sys_bpf+0x90/0x90 [ 125.309729][ T5557] ? fpu__clear_all+0x20/0x20 [ 125.314388][ T5557] __x64_sys_bpf+0x7b/0x90 [ 125.318795][ T5557] do_syscall_64+0x31/0x40 [ 125.323197][ T5557] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 125.329079][ T5557] RIP: 0033:0x7fde1efb3969 [ 125.333502][ T5557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.353096][ T5557] RSP: 002b:00007fde1d61c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.361499][ T5557] RAX: ffffffffffffffda RBX: 00007fde1f1dafa0 RCX: 00007fde1efb3969 [ 125.369455][ T5557] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 125.377409][ T5557] RBP: 00007fde1d61c090 R08: 0000000000000000 R09: 0000000000000000 [ 125.385363][ T5557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.393321][ T5557] R13: 0000000000000000 R14: 00007fde1f1dafa0 R15: 00007ffcdbaf8838 [ 125.607852][ T5593] device syzkaller0 entered promiscuous mode [ 125.955274][ T5633] FAULT_INJECTION: forcing a failure. [ 125.955274][ T5633] name failslab, interval 1, probability 0, space 0, times 0 [ 125.991817][ T5633] CPU: 0 PID: 5633 Comm: syz.0.1491 Tainted: G W 5.10.237-syzkaller #0 [ 126.001497][ T5633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 126.011553][ T5633] Call Trace: [ 126.014856][ T5633] __dump_stack+0x21/0x24 [ 126.019198][ T5633] dump_stack_lvl+0x169/0x1d8 [ 126.023875][ T5633] ? thaw_kernel_threads+0x220/0x220 [ 126.029158][ T5633] ? show_regs_print_info+0x18/0x18 [ 126.034368][ T5633] ? proc_fail_nth_read+0x210/0x210 [ 126.039582][ T5633] dump_stack+0x15/0x1c [ 126.043738][ T5633] should_fail+0x3c1/0x510 [ 126.048151][ T5633] ? map_get_next_key+0x274/0x4c0 [ 126.053173][ T5633] __should_failslab+0xa4/0xe0 [ 126.057934][ T5633] should_failslab+0x9/0x20 [ 126.062433][ T5633] __kmalloc+0x60/0x330 [ 126.066589][ T5633] map_get_next_key+0x274/0x4c0 [ 126.071435][ T5633] __se_sys_bpf+0x31d/0x680 [ 126.075938][ T5633] ? __x64_sys_bpf+0x90/0x90 [ 126.080529][ T5633] ? fpu__clear_all+0x20/0x20 [ 126.085207][ T5633] __x64_sys_bpf+0x7b/0x90 [ 126.089625][ T5633] do_syscall_64+0x31/0x40 [ 126.094041][ T5633] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.099932][ T5633] RIP: 0033:0x7fde1efb3969 [ 126.104342][ T5633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.123949][ T5633] RSP: 002b:00007fde1d61c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.132365][ T5633] RAX: ffffffffffffffda RBX: 00007fde1f1dafa0 RCX: 00007fde1efb3969 [ 126.140356][ T5633] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 126.148342][ T5633] RBP: 00007fde1d61c090 R08: 0000000000000000 R09: 0000000000000000 [ 126.156326][ T5633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.164306][ T5633] R13: 0000000000000000 R14: 00007fde1f1dafa0 R15: 00007ffcdbaf8838 [ 126.650604][ T5673] FAULT_INJECTION: forcing a failure. [ 126.650604][ T5673] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 126.704958][ T5673] CPU: 1 PID: 5673 Comm: syz.4.1504 Tainted: G W 5.10.237-syzkaller #0 [ 126.714529][ T5673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 126.724583][ T5673] Call Trace: [ 126.727874][ T5673] __dump_stack+0x21/0x24 [ 126.732201][ T5673] dump_stack_lvl+0x169/0x1d8 [ 126.736878][ T5673] ? show_regs_print_info+0x18/0x18 [ 126.742088][ T5673] dump_stack+0x15/0x1c [ 126.746251][ T5673] should_fail+0x3c1/0x510 [ 126.750678][ T5673] should_fail_alloc_page+0x4f/0x60 [ 126.756138][ T5673] __alloc_pages_nodemask+0x109/0x5f0 [ 126.761518][ T5673] ? map_get_next_key+0x274/0x4c0 [ 126.766541][ T5673] ? __kasan_kmalloc+0xec/0x110 [ 126.771387][ T5673] ? __kasan_kmalloc+0xda/0x110 [ 126.776244][ T5673] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 126.781806][ T5673] ? do_syscall_64+0x31/0x40 [ 126.786399][ T5673] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.792478][ T5673] kmalloc_order+0x4c/0x160 [ 126.796978][ T5673] kmalloc_order_trace+0x16/0x80 [ 126.801915][ T5673] __kmalloc+0x1ee/0x330 [ 126.806152][ T5673] trie_get_next_key+0x26e/0x6f0 [ 126.811082][ T5673] ? __kmalloc+0x1a7/0x330 [ 126.815490][ T5673] ? map_get_next_key+0x274/0x4c0 [ 126.820503][ T5673] map_get_next_key+0x2e5/0x4c0 [ 126.825346][ T5673] __se_sys_bpf+0x31d/0x680 [ 126.829840][ T5673] ? __x64_sys_bpf+0x90/0x90 [ 126.834424][ T5673] ? fpu__clear_all+0x20/0x20 [ 126.839094][ T5673] __x64_sys_bpf+0x7b/0x90 [ 126.843503][ T5673] do_syscall_64+0x31/0x40 [ 126.847914][ T5673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.853805][ T5673] RIP: 0033:0x7f7c0eb39969 [ 126.858211][ T5673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.877809][ T5673] RSP: 002b:00007f7c0d1a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.886218][ T5673] RAX: ffffffffffffffda RBX: 00007f7c0ed60fa0 RCX: 00007f7c0eb39969 [ 126.894184][ T5673] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 126.902157][ T5673] RBP: 00007f7c0d1a2090 R08: 0000000000000000 R09: 0000000000000000 [ 126.910120][ T5673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.918084][ T5673] R13: 0000000000000000 R14: 00007f7c0ed60fa0 R15: 00007fff641da888 [ 127.103910][ T5683] Ÿë: port 1(veth0_to_team) entered blocking state [ 127.116145][ T5683] Ÿë: port 1(veth0_to_team) entered disabled state [ 127.128708][ T5683] device veth0_to_team entered promiscuous mode [ 127.142334][ T5687] device wg2 left promiscuous mode [ 127.206906][ T5683] Ÿë: port 2(erspan0) entered blocking state [ 127.213013][ T5683] Ÿë: port 2(erspan0) entered disabled state [ 127.219583][ T5683] device erspan0 entered promiscuous mode [ 127.279262][ T5683] device erspan0 left promiscuous mode [ 127.288946][ T5683] Ÿë: port 2(erspan0) entered disabled state [ 127.304665][ T5683] device veth0_to_team left promiscuous mode [ 127.312057][ T5683] Ÿë: port 1(veth0_to_team) entered disabled state [ 128.238734][ T5734] device macsec0 left promiscuous mode [ 128.662811][ T5753] device pim6reg1 entered promiscuous mode [ 128.851863][ T5764] device sit0 left promiscuous mode [ 130.078679][ T5809] device pim6reg1 entered promiscuous mode [ 130.822457][ T5838] device syzkaller0 entered promiscuous mode [ 130.888172][ T5839] device wg2 left promiscuous mode [ 131.811615][ T5876] device sit0 left promiscuous mode [ 132.476752][ T5886] Q±6ã`Ò˜: renamed from lo [ 133.569008][ T5908] device syzkaller0 entered promiscuous mode [ 133.801519][ T5926] tun0: tun_chr_ioctl cmd 1074025676 [ 133.806921][ T5926] tun0: owner set to 0 [ 136.227842][ T6044] device veth0_vlan left promiscuous mode [ 136.242289][ T6044] device veth0_vlan entered promiscuous mode [ 136.289476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.300991][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.318736][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.257516][ T6098] device wg2 entered promiscuous mode [ 137.352792][ T6106] device syzkaller0 entered promiscuous mode [ 137.359343][ T6109] device sit0 left promiscuous mode [ 137.426593][ T6109] device sit0 entered promiscuous mode [ 137.824853][ T6116] device pim6reg1 entered promiscuous mode [ 137.932889][ T6141] device veth0_vlan left promiscuous mode [ 137.941991][ T6141] device veth0_vlan entered promiscuous mode [ 137.949394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.963585][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.971741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.127421][ T6163] device pim6reg1 entered promiscuous mode [ 138.289468][ T6199] device pim6reg1 entered promiscuous mode [ 138.794515][ T6221] device wg2 left promiscuous mode [ 139.933418][ T6263] device syzkaller0 entered promiscuous mode [ 140.937170][ T6298] device syzkaller0 entered promiscuous mode [ 141.395321][ T6316] device pim6reg1 entered promiscuous mode [ 141.792281][ T6330] ref_ctr_offset mismatch. inode: 0x646 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 141.858847][ T6330] GPL: port 1(erspan0) entered blocking state [ 141.867815][ T6330] GPL: port 1(erspan0) entered disabled state [ 141.896675][ T6330] device erspan0 entered promiscuous mode [ 141.949769][ T6347] GPL: port 1(erspan0) entered blocking state [ 141.955901][ T6347] GPL: port 1(erspan0) entered forwarding state [ 142.160025][ T6344] device syzkaller0 entered promiscuous mode [ 142.411217][ T6383] device pim6reg1 entered promiscuous mode [ 143.033958][ T6409] device pim6reg1 entered promiscuous mode [ 143.643404][ T6434] device pim6reg1 entered promiscuous mode [ 145.914707][ T6527] device pim6reg1 entered promiscuous mode [ 146.103099][ T6537] device pim6reg1 entered promiscuous mode [ 146.387479][ T6548] device syzkaller0 entered promiscuous mode [ 147.051431][ T6593] device wg2 entered promiscuous mode [ 147.790674][ T6617] device pim6reg1 entered promiscuous mode [ 147.828927][ T6621] syz.4.1769[6621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.828983][ T6621] syz.4.1769[6621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.584661][ T6695] syz.4.1789[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.648872][ T6695] syz.4.1789[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.325696][ T6707] device syzkaller0 entered promiscuous mode [ 150.633308][ T6720] device pim6reg1 entered promiscuous mode [ 151.093103][ T6741] device pim6reg1 entered promiscuous mode [ 151.248290][ T6756] -1: renamed from syzkaller0 [ 151.600771][ T6766] device macsec0 left promiscuous mode [ 151.613315][ T6766] device macsec0 entered promiscuous mode [ 152.272968][ T6776] device syzkaller0 left promiscuous mode [ 152.398853][ T6794] syz.4.1818[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.398908][ T6794] syz.4.1818[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.513104][ T6800] device syzkaller0 entered promiscuous mode [ 154.497101][ T24] audit: type=1400 audit(1748249416.180:155): avc: denied { create } for pid=6848 comm="syz.1.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 156.062292][ T6866] device pim6reg1 entered promiscuous mode [ 156.716879][ T24] audit: type=1400 audit(1748249418.400:156): avc: denied { read } for pid=6887 comm="syz.2.1842" dev="nsfs" ino=4026532451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 156.774594][ T24] audit: type=1400 audit(1748249418.420:157): avc: denied { open } for pid=6887 comm="syz.2.1842" path="cgroup:[4026532451]" dev="nsfs" ino=4026532451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 156.779628][ T6895] syz.2.1845[6895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.924440][ T6895] syz.2.1845[6895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.502904][ T6967] device veth0_vlan left promiscuous mode [ 159.558459][ T6967] device veth0_vlan entered promiscuous mode [ 159.697736][ T24] audit: type=1400 audit(1748249421.380:158): avc: denied { create } for pid=6966 comm="syz.2.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 160.005181][ T7001] device veth0_vlan left promiscuous mode [ 160.035324][ T7001] device veth0_vlan entered promiscuous mode [ 160.071638][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.079775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 160.114259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.739701][ T7087] device wg2 left promiscuous mode [ 161.747996][ T7087] device wg2 entered promiscuous mode [ 162.317257][ T7114] device sit0 left promiscuous mode [ 162.368411][ T7114] device sit0 entered promiscuous mode [ 163.241926][ T7150] device veth0_vlan left promiscuous mode [ 163.248255][ T7150] device veth0_vlan entered promiscuous mode [ 164.132396][ T7201] device syzkaller0 entered promiscuous mode [ 164.523202][ T7242] device sit0 entered promiscuous mode [ 165.422554][ T7271] device syzkaller0 entered promiscuous mode [ 165.530147][ T24] audit: type=1400 audit(1748249427.210:159): avc: denied { create } for pid=7286 comm="syz.2.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 165.636319][ T7273] device syzkaller0 entered promiscuous mode [ 165.645983][ T7285] device syzkaller0 left promiscuous mode [ 166.505244][ T7322] syz.2.1969[7322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.505302][ T7322] syz.2.1969[7322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.051172][ T7326] device syzkaller0 entered promiscuous mode [ 169.429007][ T7447] device syzkaller0 entered promiscuous mode [ 169.519900][ T7455] device pim6reg1 entered promiscuous mode [ 170.255179][ T7499] device pim6reg1 entered promiscuous mode [ 173.555202][ T7666] device veth0_vlan left promiscuous mode [ 173.622212][ T7666] device veth0_vlan entered promiscuous mode [ 173.674444][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.693304][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 173.713033][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 173.996088][ T7672] device syzkaller0 entered promiscuous mode [ 174.338452][ T7702] device syzkaller0 entered promiscuous mode [ 174.734969][ T7740] GPL: port 1(erspan0) entered blocking state [ 174.741092][ T7740] GPL: port 1(erspan0) entered disabled state [ 174.747632][ T7740] device erspan0 entered promiscuous mode [ 174.889032][ T7751] device syzkaller0 entered promiscuous mode [ 175.578988][ T7806] tun0: tun_chr_ioctl cmd 1074025692 [ 175.590965][ T7809] cgroup: fork rejected by pids controller in /syz1 [ 175.846186][ T7825] device wg2 left promiscuous mode [ 175.913016][ T7825] device wg2 entered promiscuous mode [ 176.038094][ T7837] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 176.050044][ T7837] ip6erspan0: linktype set to 805 [ 176.096388][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.103831][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.112909][ T7831] device bridge_slave_0 entered promiscuous mode [ 176.130583][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.138019][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.145715][ T7831] device bridge_slave_1 entered promiscuous mode [ 176.199623][ T24] audit: type=1400 audit(1748249437.880:160): avc: denied { write } for pid=7831 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 176.204487][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.227123][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.234410][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.241443][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.262782][ T24] audit: type=1400 audit(1748249437.880:161): avc: denied { read } for pid=7831 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 176.264485][ T7847] device veth0_vlan left promiscuous mode [ 176.302173][ T7847] device veth0_vlan entered promiscuous mode [ 176.347721][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.356375][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.363793][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.371281][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.380094][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.387885][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.399957][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.408491][ T442] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.415566][ T442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.429526][ T7857] device veth1_macvtap entered promiscuous mode [ 176.442975][ T7857] device macsec0 entered promiscuous mode [ 176.480425][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.493110][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.502587][ T442] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.509714][ T442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.517509][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.526966][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.555154][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.571675][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.580772][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.588593][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.598301][ T7831] device veth0_vlan entered promiscuous mode [ 176.623998][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.675449][ T7831] device veth1_macvtap entered promiscuous mode [ 176.719795][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.762211][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.779617][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.034739][ T307] device erspan0 left promiscuous mode [ 177.045990][ T307] GPL: port 1(erspan0) entered disabled state [ 177.151381][ T7900] device sit0 left promiscuous mode [ 177.319459][ T307] device veth1_macvtap left promiscuous mode [ 177.346281][ T307] device veth0_vlan left promiscuous mode [ 177.783251][ T7919] device syzkaller0 entered promiscuous mode [ 177.844877][ T7928] syz.0.2148[7928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.844957][ T7928] syz.0.2148[7928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.072969][ T7927] device sit0 entered promiscuous mode [ 178.268491][ T7946] device sit0 left promiscuous mode [ 178.314199][ T7946] device sit0 entered promiscuous mode [ 178.500977][ T7952] syz.2.2155[7952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.501033][ T7952] syz.2.2155[7952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.903751][ T7963] device syzkaller0 entered promiscuous mode [ 179.208113][ T7973] syz.3.2161[7973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.208162][ T7973] syz.3.2161[7973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.410585][ T7984] device wg2 entered promiscuous mode [ 179.473412][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 179.502485][ T7987] device wg2 left promiscuous mode [ 179.635280][ T24] audit: type=1400 audit(1748249441.320:162): avc: denied { ioctl } for pid=7991 comm="syz.0.2166" path="uts:[4026532456]" dev="nsfs" ino=4026532456 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 180.260378][ T8020] device wg2 entered promiscuous mode [ 180.291685][ T8024] device wg2 entered promiscuous mode [ 180.306172][ T8024] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 180.578138][ T8043] @0ÿ: renamed from bond_slave_0 [ 180.670850][ T24] audit: type=1400 audit(1748249442.350:163): avc: denied { create } for pid=8047 comm="syz.2.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 181.537484][ T8115] device sit0 left promiscuous mode [ 181.763070][ T8126] device syzkaller0 left promiscuous mode [ 182.829162][ T8169] device syzkaller0 entered promiscuous mode [ 183.039778][ T24] audit: type=1400 audit(1748249444.720:164): avc: denied { append } for pid=8182 comm="syz.3.2224" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 183.177895][ T8180] device pim6reg1 entered promiscuous mode [ 184.236994][ T8227] device sit0 left promiscuous mode [ 184.667467][ T8258] device pim6reg1 entered promiscuous mode [ 184.795748][ T8260] device pim6reg1 entered promiscuous mode [ 186.672403][ T8355] device pim6reg1 entered promiscuous mode [ 187.082389][ T8389] device wg2 left promiscuous mode [ 187.097665][ T8389] device wg2 entered promiscuous mode [ 187.111890][ T8389] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 187.198346][ T8402] syz.3.2289[8402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.198391][ T8402] syz.3.2289[8402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.218382][ T8403] syz.3.2289[8403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.230077][ T8403] syz.3.2289[8403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.373958][ T8418] syz.3.2293[8418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.439147][ T8428] device pim6reg1 entered promiscuous mode [ 187.513569][ T8418] syz.3.2293[8418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.065194][ T8472] device syzkaller0 entered promiscuous mode [ 188.632947][ T8515] device syzkaller0 entered promiscuous mode [ 188.828339][ T8524] device pim6reg1 entered promiscuous mode [ 189.441695][ T8530] device wg2 left promiscuous mode [ 189.451434][ T8534] device wg2 entered promiscuous mode [ 189.459635][ T8534] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 190.731627][ T8583] device syzkaller0 entered promiscuous mode [ 191.053617][ T24] audit: type=1400 audit(1748249452.740:165): avc: denied { create } for pid=8613 comm="syz.0.2343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 194.138001][ T8672] device syzkaller0 entered promiscuous mode [ 194.992959][ T8694] device syzkaller0 entered promiscuous mode [ 195.309602][ T8736] device pim6reg1 entered promiscuous mode [ 195.612753][ T8750] device sit0 entered promiscuous mode [ 195.786452][ T8755] device sit0 entered promiscuous mode [ 196.122558][ T8778] tun0: tun_chr_ioctl cmd 1074025676 [ 196.129151][ T8778] tun0: owner set to 0 [ 196.159134][ T8776] tun0: tun_chr_ioctl cmd 1074025676 [ 196.168540][ T8776] tun0: owner set to 0 [ 196.291838][ T8799] tap0: tun_chr_ioctl cmd 1074025677 [ 196.297932][ T8799] tap0: linktype set to 768 [ 199.074634][ T8864] @0Ù: renamed from bond_slave_1 [ 199.674407][ T8897] device pim6reg1 entered promiscuous mode [ 200.286170][ T8925] device pim6reg1 entered promiscuous mode [ 200.321781][ T8936] device syzkaller0 entered promiscuous mode [ 200.977928][ T8992] device syzkaller0 entered promiscuous mode [ 201.393997][ T9027] device veth0_vlan left promiscuous mode [ 201.420526][ T9027] device veth0_vlan entered promiscuous mode [ 201.529839][ T9034] device pim6reg1 entered promiscuous mode [ 201.794826][ T9044] device syzkaller0 entered promiscuous mode [ 202.157483][ T9071] device syzkaller0 entered promiscuous mode [ 203.386316][ T24] audit: type=1400 audit(1748249465.070:166): avc: denied { read } for pid=9155 comm="syz.4.2495" name="cgroup.subtree_control" dev="cgroup2" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 203.599421][ T9167] device syzkaller0 left promiscuous mode [ 205.953913][ T9280] device veth1_macvtap left promiscuous mode [ 206.080956][ T9283] device wg2 left promiscuous mode [ 206.165792][ T9282] device wg2 entered promiscuous mode [ 206.171282][ T9282] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 206.395475][ T9290] ªªªªªª: renamed from vlan0 [ 207.731593][ T9338] device pim6reg1 entered promiscuous mode [ 207.879979][ T9361] syz.4.2557[9361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.880035][ T9361] syz.4.2557[9361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.902312][ T9361] device syzkaller0 entered promiscuous mode [ 208.040125][ T9341] device pim6reg1 entered promiscuous mode [ 208.697026][ T9418] device veth0_vlan left promiscuous mode [ 208.774532][ T9418] device veth0_vlan entered promiscuous mode [ 208.838013][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.853168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 208.889785][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 209.141830][ T9447] device veth0_vlan left promiscuous mode [ 209.150124][ T9447] device veth0_vlan entered promiscuous mode [ 209.199123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.216663][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.237112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.825070][ T9516] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.833495][ T9516] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.712737][ T9547] device veth0_vlan left promiscuous mode [ 211.723909][ T9547] device veth0_vlan entered promiscuous mode [ 211.740098][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.749555][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.760492][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.182181][ T9561] device veth0_vlan left promiscuous mode [ 212.243167][ T9561] device veth0_vlan entered promiscuous mode [ 212.440653][ T9572] device syzkaller0 entered promiscuous mode [ 212.701743][ T24] audit: type=1400 audit(1748249474.380:167): avc: denied { attach_queue } for pid=9589 comm="syz.0.2621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 212.892177][ T9601] device veth0_vlan left promiscuous mode [ 212.905177][ T9601] device veth0_vlan entered promiscuous mode [ 212.936445][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.956993][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 212.965310][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.103028][ T9607] device sit0 entered promiscuous mode [ 213.633394][ T9634] device syzkaller0 entered promiscuous mode [ 213.690175][ T9634] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 213.970171][ T9658] device wg2 left promiscuous mode [ 214.034758][ T9666] bridge0: port 3(veth0) entered disabled state [ 214.041806][ T9666] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.050018][ T9666] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.101079][ T9658] device wg2 entered promiscuous mode [ 214.139277][ T9658] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 214.328806][ T9682] device pim6reg1 entered promiscuous mode [ 214.365590][ T9673] device pim6reg1 entered promiscuous mode [ 214.412801][ T9685] syz.4.2648[9685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.412888][ T9685] syz.4.2648[9685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.187782][ T24] audit: type=1400 audit(1748249476.870:168): avc: denied { create } for pid=9737 comm="syz.2.2665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 216.472243][ T9814] device sit0 entered promiscuous mode [ 216.592264][ T9819] device bridge_slave_1 left promiscuous mode [ 216.602925][ T9819] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.629735][ T9819] device bridge_slave_0 left promiscuous mode [ 216.644602][ T9819] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.773798][ T9824] device sit0 left promiscuous mode [ 216.905374][ T9828] device sit0 entered promiscuous mode [ 217.436067][ T9852] device syzkaller0 entered promiscuous mode [ 218.844434][ T9897] device syzkaller0 entered promiscuous mode [ 219.667851][ T9928] device veth0_vlan left promiscuous mode [ 219.674005][ T9928] device veth0_vlan entered promiscuous mode [ 219.764743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.783182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 219.860394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 220.178376][ T9949] syz.1.2729[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.178458][ T9949] syz.1.2729[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.061700][ T9977] device veth0_vlan left promiscuous mode [ 221.080680][ T9977] device veth0_vlan entered promiscuous mode [ 222.172498][T10009] device wg2 left promiscuous mode [ 222.241651][T10010] device wg2 entered promiscuous mode [ 223.392871][T10035] device pim6reg1 entered promiscuous mode [ 224.281935][T10071] ±ÿ: renamed from team_slave_1 [ 225.093549][T10107] Â: renamed from pim6reg1 [ 225.645015][T10115] syz.2.2771[10115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.645087][T10115] syz.2.2771[10115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.688741][T10166] device pim6reg1 entered promiscuous mode [ 229.205803][T10196] device syzkaller0 entered promiscuous mode [ 229.304846][T10212] device wg2 left promiscuous mode [ 229.330450][T10216] device wg2 entered promiscuous mode [ 229.876426][ T24] audit: type=1400 audit(1748249491.550:169): avc: denied { create } for pid=10253 comm="syz.3.2812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 230.900854][T10292] device wg2 left promiscuous mode [ 231.114050][T10286] device wg2 entered promiscuous mode [ 231.148119][T10286] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 235.302352][ T24] audit: type=1400 audit(1748249496.980:170): avc: denied { mounton } for pid=10438 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 235.473997][T10427] device veth0_vlan left promiscuous mode [ 235.481170][T10427] device veth0_vlan entered promiscuous mode [ 235.511087][T10431] device pim6reg1 entered promiscuous mode [ 235.608830][T10438] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.615970][T10438] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.623678][T10438] device bridge_slave_0 entered promiscuous mode [ 235.630808][T10438] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.638101][T10438] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.645864][T10438] device bridge_slave_1 entered promiscuous mode [ 235.691931][T10438] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.699051][T10438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.706401][T10438] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.713463][T10438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.745598][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.754683][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.762010][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.790138][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.806743][ T442] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.813822][ T442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.823639][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.832392][ T442] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.839465][ T442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.905020][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.913190][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.973717][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 236.007226][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.043921][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.063717][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.084228][T10438] device veth0_vlan entered promiscuous mode [ 236.120605][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.129264][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.442745][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.451346][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.461226][T10438] device veth1_macvtap entered promiscuous mode [ 236.482158][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.490070][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.498421][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.507050][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.515390][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.575183][ T24] audit: type=1400 audit(1748249498.260:171): avc: denied { unmount } for pid=10438 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 237.043123][T10530] device syzkaller0 entered promiscuous mode [ 237.770601][T10564] syz.4.2900[10564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.770682][T10564] syz.4.2900[10564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.899836][T10564] syz.4.2900[10564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.088892][T10571] device syzkaller0 entered promiscuous mode [ 238.477734][T10590] device veth0_vlan left promiscuous mode [ 238.500198][T10590] device veth0_vlan entered promiscuous mode [ 238.565940][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.591466][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.622976][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.806133][ T7] device veth0 left promiscuous mode [ 238.812873][ T7] bridge0: port 3(veth0) entered disabled state [ 238.821547][T10608] syz.1.2911[10608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.822390][T10608] syz.1.2911[10608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.875258][ T7] device bridge_slave_1 left promiscuous mode [ 238.892909][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.900312][ T7] device bridge_slave_0 left promiscuous mode [ 238.906452][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.914631][ T7] device veth1_macvtap left promiscuous mode [ 238.920664][ T7] device veth0_vlan left promiscuous mode [ 239.559829][T10660] device veth1_macvtap left promiscuous mode [ 239.566196][T10660] device macsec0 entered promiscuous mode [ 239.612106][T10664] device veth1_macvtap entered promiscuous mode [ 239.718774][T10661] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.725973][T10661] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.734067][T10661] device bridge_slave_0 entered promiscuous mode [ 239.747314][T10661] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.758740][T10661] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.766401][T10661] device bridge_slave_1 entered promiscuous mode [ 239.841020][ T24] audit: type=1400 audit(1748249501.520:172): avc: denied { create } for pid=10704 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 239.912680][T10661] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.919792][T10661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.927109][T10661] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.934156][T10661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.963114][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.971715][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.980260][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.022753][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.038832][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.045934][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.058295][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.066621][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.073803][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.105246][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.147075][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.172598][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.188084][T10661] device veth0_vlan entered promiscuous mode [ 240.196241][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.205224][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.216155][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.230121][T10661] device veth1_macvtap entered promiscuous mode [ 240.246213][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.263844][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.282480][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.335133][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.358130][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.496133][T10796] device syzkaller0 entered promiscuous mode [ 241.847191][T10813] device sit0 entered promiscuous mode [ 242.203558][T10821] device sit0 left promiscuous mode [ 242.604023][ T7] device veth0_vlan left promiscuous mode [ 243.071004][T10858] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.078143][T10858] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.085878][T10858] device bridge_slave_0 entered promiscuous mode [ 243.092921][T10858] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.100388][T10858] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.109350][T10858] device bridge_slave_1 entered promiscuous mode [ 243.468869][T10858] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.475952][T10858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.483333][T10858] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.490390][T10858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.585010][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.613213][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.626570][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.673179][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.682106][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.689220][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.734541][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.752920][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.760163][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.768122][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.776371][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.855037][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.863795][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.872061][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.879961][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.888131][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.896171][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.914157][T10858] device veth0_vlan entered promiscuous mode [ 243.947852][T10858] device veth1_macvtap entered promiscuous mode [ 243.954913][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.030341][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.038866][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.400832][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.434033][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.442474][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.450683][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.784966][ T7] device veth0_vlan left promiscuous mode [ 246.217502][T10979] device syzkaller0 entered promiscuous mode [ 246.807420][T10993] device pim6reg1 entered promiscuous mode [ 246.814513][T10996] ÿÿÿÿÿÿ: renamed from vlan1 [ 250.557624][T11141] ref_ctr_offset mismatch. inode: 0xcc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 251.902674][T11201] syz.0.3083[11201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.902732][T11201] syz.0.3083[11201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.451178][T11224] device syzkaller0 entered promiscuous mode [ 252.822136][T11233] syz.3.3093[11233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.822220][T11233] syz.3.3093[11233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.849094][T11232] device pim6reg1 entered promiscuous mode [ 253.013840][T11241] device veth1_macvtap left promiscuous mode [ 253.019996][T11241] device macsec0 left promiscuous mode [ 253.308355][T11257] device syzkaller0 entered promiscuous mode [ 253.993847][T11315] syz.1.3119[11315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.993929][T11315] syz.1.3119[11315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.554290][T11328] device syzkaller0 entered promiscuous mode [ 255.749373][T11391] device pim6reg1 entered promiscuous mode [ 256.030006][T11404] tap0: tun_chr_ioctl cmd 1074025677 [ 256.043533][T11404] tap0: linktype set to 774 [ 256.099061][T11406] device wg2 entered promiscuous mode [ 256.543110][T11439] syz.2.3154[11439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.543169][T11439] syz.2.3154[11439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.172776][T11539] device syzkaller0 entered promiscuous mode [ 258.943157][T11575] device sit0 entered promiscuous mode [ 259.571453][T11585] device pim6reg1 entered promiscuous mode [ 260.615452][T11658] device veth0_vlan left promiscuous mode [ 260.666407][T11658] device veth0_vlan entered promiscuous mode [ 260.703692][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.711961][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 260.725107][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.187923][T11695] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.195168][T11695] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.216212][T11695] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.225982][T11695] device bridge_slave_0 left promiscuous mode [ 261.232188][T11695] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.941392][T11739] device macsec0 entered promiscuous mode [ 261.996423][T11740] device pim6reg1 entered promiscuous mode [ 262.079075][T11740] device syzkaller0 entered promiscuous mode [ 262.196893][T11758] device pim6reg1 entered promiscuous mode [ 263.237667][T11786] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.255159][T11786] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.291716][T11786] device bridge_slave_0 entered promiscuous mode [ 263.400360][T11786] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.407549][T11786] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.415604][T11786] device bridge_slave_1 entered promiscuous mode [ 264.008515][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.022636][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.047292][T11815] syz.2.3269[11815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.047372][T11815] syz.2.3269[11815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.065992][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.087105][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.104070][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.111155][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.120409][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.128860][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.137336][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.144429][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.177185][T11814] device pim6reg1 entered promiscuous mode [ 264.193999][T11815] device pim6reg1 entered promiscuous mode [ 264.209585][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.226569][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 264.236492][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.247764][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 264.256476][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.276416][T11826] device veth1_macvtap left promiscuous mode [ 264.288658][T11826] device macsec0 entered promiscuous mode [ 264.296865][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.308838][T11786] device veth0_vlan entered promiscuous mode [ 264.334139][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.342625][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.350312][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.373263][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.385226][T11786] device veth1_macvtap entered promiscuous mode [ 264.410602][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.423894][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.441985][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.450804][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.595986][ T7] GPL: port 1(erspan0) entered disabled state [ 265.456402][ T7] device erspan0 left promiscuous mode [ 265.461909][ T7] GPL: port 1(erspan0) entered disabled state [ 265.635276][T11850] device veth0_vlan left promiscuous mode [ 265.677661][T11850] device veth0_vlan entered promiscuous mode [ 265.801109][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.855712][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.874719][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.057855][ T7] device veth1_macvtap left promiscuous mode [ 266.065642][ T7] device veth0_vlan left promiscuous mode [ 266.672795][T11934] syz.2.3302[11934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.672877][T11934] syz.2.3302[11934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.901133][T11956] device pim6reg1 entered promiscuous mode [ 267.008301][T11962] device veth0_vlan left promiscuous mode [ 267.062040][T11962] device veth0_vlan entered promiscuous mode [ 267.187816][T11970] device pim6reg1 entered promiscuous mode [ 267.456432][T11978] 7B’ç÷ï: renamed from syzkaller0 [ 267.678459][T12001] syz.0.3324[12001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.678517][T12001] syz.0.3324[12001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.888016][T12022] device macsec0 entered promiscuous mode [ 267.927061][T12022] device veth1_macvtap entered promiscuous mode [ 267.952033][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.478589][T12072] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.485782][T12072] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.496617][T12072] device bridge_slave_1 left promiscuous mode [ 268.502774][T12072] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.560149][T12072] device bridge_slave_0 left promiscuous mode [ 268.566557][T12072] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.675147][T12122] device syzkaller0 entered promiscuous mode [ 269.876925][T12128] device veth1_to_bond entered promiscuous mode [ 269.953863][T12128] ÿÿÿÿÿÿ: renamed from vlan1 [ 270.782083][T12150] device veth1_macvtap left promiscuous mode [ 271.202779][T12162] FAULT_INJECTION: forcing a failure. [ 271.202779][T12162] name failslab, interval 1, probability 0, space 0, times 0 [ 271.215620][T12162] CPU: 0 PID: 12162 Comm: syz.4.3372 Tainted: G W 5.10.237-syzkaller #0 [ 271.225248][T12162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 271.235414][T12162] Call Trace: [ 271.238716][T12162] __dump_stack+0x21/0x24 [ 271.243055][T12162] dump_stack_lvl+0x169/0x1d8 [ 271.247728][T12162] ? thaw_kernel_threads+0x220/0x220 [ 271.253319][T12162] ? show_regs_print_info+0x18/0x18 [ 271.258525][T12162] ? tipc_nametbl_subscribe+0x13b4/0x1600 [ 271.264249][T12162] dump_stack+0x15/0x1c [ 271.268436][T12162] should_fail+0x3c1/0x510 [ 271.272853][T12162] ? tipc_nametbl_insert_publ+0x6a2/0x1430 [ 271.278666][T12162] __should_failslab+0xa4/0xe0 [ 271.283429][T12162] should_failslab+0x9/0x20 [ 271.287931][T12162] kmem_cache_alloc_trace+0x3a/0x2e0 [ 271.293223][T12162] tipc_nametbl_insert_publ+0x6a2/0x1430 [ 271.298864][T12162] ? tipc_topsrv_kern_subscr+0x29a/0x380 [ 271.304501][T12162] ? __kasan_check_write+0x14/0x20 [ 271.309625][T12162] tipc_nametbl_publish+0x222/0x3e0 [ 271.314869][T12162] tipc_sk_join+0x3dc/0x830 [ 271.319379][T12162] tipc_setsockopt+0x684/0x900 [ 271.324140][T12162] ? tipc_shutdown+0x960/0x960 [ 271.328903][T12162] ? security_socket_setsockopt+0x82/0xa0 [ 271.334616][T12162] ? tipc_shutdown+0x960/0x960 [ 271.339433][T12162] __sys_setsockopt+0x2ed/0x460 [ 271.344289][T12162] ? __ia32_sys_recv+0xb0/0xb0 [ 271.349059][T12162] ? ksys_write+0x1eb/0x240 [ 271.353565][T12162] ? fpu__clear_all+0x20/0x20 [ 271.358241][T12162] __x64_sys_setsockopt+0xbf/0xd0 [ 271.363265][T12162] do_syscall_64+0x31/0x40 [ 271.367680][T12162] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 271.373567][T12162] RIP: 0033:0x7f98b60ab969 [ 271.377980][T12162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.397610][T12162] RSP: 002b:00007f98b4714038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 271.406034][T12162] RAX: ffffffffffffffda RBX: 00007f98b62d2fa0 RCX: 00007f98b60ab969 [ 271.414011][T12162] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 271.421982][T12162] RBP: 00007f98b4714090 R08: 0000000000000127 R09: 0000000000000000 [ 271.429956][T12162] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 271.437927][T12162] R13: 0000000000000000 R14: 00007f98b62d2fa0 R15: 00007ffdea4045a8 [ 271.445961][T12162] tipc: Failed to bind to 4294967295,0,0, no memory [ 271.603755][T12178] device pim6reg1 entered promiscuous mode [ 271.775689][T12201] FAULT_INJECTION: forcing a failure. [ 271.775689][T12201] name failslab, interval 1, probability 0, space 0, times 0 [ 271.788350][T12201] CPU: 1 PID: 12201 Comm: syz.3.3385 Tainted: G W 5.10.237-syzkaller #0 [ 271.797968][T12201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 271.808004][T12201] Call Trace: [ 271.811437][T12201] __dump_stack+0x21/0x24 [ 271.815754][T12201] dump_stack_lvl+0x169/0x1d8 [ 271.821129][T12201] ? thaw_kernel_threads+0x220/0x220 [ 271.826549][T12201] ? show_regs_print_info+0x18/0x18 [ 271.831757][T12201] dump_stack+0x15/0x1c [ 271.836125][T12201] should_fail+0x3c1/0x510 [ 271.840553][T12201] ? tipc_nametbl_insert_publ+0x9bb/0x1430 [ 271.846368][T12201] __should_failslab+0xa4/0xe0 [ 271.851144][T12201] should_failslab+0x9/0x20 [ 271.855655][T12201] kmem_cache_alloc_trace+0x3a/0x2e0 [ 271.860938][T12201] ? tipc_dest_list_len+0x60/0x60 [ 271.865958][T12201] tipc_nametbl_insert_publ+0x9bb/0x1430 [ 271.871594][T12201] tipc_nametbl_publish+0x222/0x3e0 [ 271.876786][T12201] tipc_sk_join+0x3dc/0x830 [ 271.881287][T12201] tipc_setsockopt+0x684/0x900 [ 271.886042][T12201] ? tipc_shutdown+0x960/0x960 [ 271.890801][T12201] ? security_socket_setsockopt+0x82/0xa0 [ 271.896514][T12201] ? tipc_shutdown+0x960/0x960 [ 271.901276][T12201] __sys_setsockopt+0x2ed/0x460 [ 271.906120][T12201] ? __ia32_sys_recv+0xb0/0xb0 [ 271.910882][T12201] ? ksys_write+0x1eb/0x240 [ 271.915377][T12201] ? fpu__clear_all+0x20/0x20 [ 271.920071][T12201] __x64_sys_setsockopt+0xbf/0xd0 [ 271.925087][T12201] do_syscall_64+0x31/0x40 [ 271.929504][T12201] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 271.935428][T12201] RIP: 0033:0x7f7874508969 [ 271.939841][T12201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.959533][T12201] RSP: 002b:00007f7872b71038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 271.967963][T12201] RAX: ffffffffffffffda RBX: 00007f787472ffa0 RCX: 00007f7874508969 [ 271.976116][T12201] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 271.984115][T12201] RBP: 00007f7872b71090 R08: 0000000000000127 R09: 0000000000000000 [ 271.992105][T12201] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 272.000083][T12201] R13: 0000000000000000 R14: 00007f787472ffa0 R15: 00007ffd4146e858 [ 272.008123][T12201] tipc: Failed to bind to 4294967295,0,0, no memory [ 273.164910][T12290] 7B’ç÷ï: renamed from syzkaller0 [ 273.797382][T12340] device wg2 entered promiscuous mode [ 274.084945][T12347] device veth1_macvtap left promiscuous mode [ 274.521674][T12390] device pim6reg1 entered promiscuous mode [ 275.591100][T12422] device wg2 left promiscuous mode [ 275.623293][T12422] device wg2 entered promiscuous mode [ 275.802079][T12442] device lo entered promiscuous mode [ 276.232010][T12472] device wg2 left promiscuous mode [ 276.572879][T12490] device pim6reg1 entered promiscuous mode [ 276.592077][T12485] device pim6reg1 entered promiscuous mode [ 277.144206][T12511] device syzkaller0 entered promiscuous mode [ 277.529511][T12535] device syzkaller0 entered promiscuous mode [ 278.311929][T12546] device macsec0 left promiscuous mode [ 279.607048][T12549] device syzkaller0 entered promiscuous mode [ 280.562097][T12565] device syzkaller0 entered promiscuous mode [ 280.578989][T12567] tun0: tun_chr_ioctl cmd 2147767507 [ 281.069953][T12574] device syzkaller0 entered promiscuous mode [ 285.831255][T12806] device veth1_to_team entered promiscuous mode [ 287.338871][T12908] ±ÿ: renamed from team_slave_1 [ 287.380165][T12916] device veth0_vlan left promiscuous mode [ 287.413212][T12916] device veth0_vlan entered promiscuous mode [ 287.447529][T12913] device wg2 left promiscuous mode [ 287.456733][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.474641][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.512682][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 288.280909][T12956] device syzkaller0 entered promiscuous mode [ 290.074130][T13101] device pim6reg1 entered promiscuous mode [ 290.340439][T13137] device syzkaller0 entered promiscuous mode [ 292.665404][T13348] device syzkaller0 entered promiscuous mode [ 293.170698][T13362] device sit0 left promiscuous mode [ 293.305555][T13391] tap0: tun_chr_ioctl cmd 1074025675 [ 293.310897][T13391] tap0: persist enabled [ 293.323873][T13391] tap0: tun_chr_ioctl cmd 1074025675 [ 293.330067][T13391] tap0: persist disabled [ 293.467992][T13402] device sit0 left promiscuous mode [ 294.309697][T13471] device syzkaller0 entered promiscuous mode [ 294.753203][T13475] device veth0_vlan left promiscuous mode [ 294.772220][T13475] device veth0_vlan entered promiscuous mode [ 294.971833][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.985686][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.003659][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 297.758206][T13544] device veth0_vlan left promiscuous mode [ 297.774082][T13544] device veth0_vlan entered promiscuous mode [ 297.782207][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.790808][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.798639][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.403869][T13591] device pim6reg1 entered promiscuous mode [ 300.670271][T13630] device pim6reg1 entered promiscuous mode [ 300.855215][T13634] device veth0_vlan left promiscuous mode [ 300.876677][T13634] device veth0_vlan entered promiscuous mode [ 300.956452][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.003155][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.043666][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.315297][T13704] device pim6reg1 entered promiscuous mode [ 303.830927][T13791] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 303.844309][T13791] device syzkaller0 entered promiscuous mode [ 307.103713][T13897] device veth0_vlan left promiscuous mode [ 307.122586][T13897] device veth0_vlan entered promiscuous mode [ 308.626275][T13972] device syzkaller0 entered promiscuous mode [ 309.139637][T14004] @ÿ: renamed from bond_slave_0 [ 309.191489][T14011] device sit0 entered promiscuous mode [ 309.834856][T14021] device syzkaller0 entered promiscuous mode [ 310.185581][T14036] device syzkaller0 entered promiscuous mode [ 312.671038][T14065] syz.0.3927[14065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.671127][T14065] syz.0.3927[14065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.802066][T14074] device sit0 left promiscuous mode [ 313.021478][T14101] device sit0 entered promiscuous mode [ 313.216146][T14115] device macsec0 entered promiscuous mode [ 314.235252][T14143] device wg2 entered promiscuous mode [ 342.914949][T14166] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.922713][T14166] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.930493][T14166] device bridge_slave_0 entered promiscuous mode [ 342.956148][T14166] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.963191][T14166] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.970752][T14166] device bridge_slave_1 entered promiscuous mode [ 343.032023][T14168] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.039159][T14168] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.046667][T14168] device bridge_slave_0 entered promiscuous mode [ 343.053658][T14168] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.060689][T14168] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.068113][T14168] device bridge_slave_1 entered promiscuous mode [ 343.113214][T14173] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.120508][T14173] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.127898][T14173] device bridge_slave_0 entered promiscuous mode [ 343.136980][T14173] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.144234][T14173] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.151498][T14173] device bridge_slave_1 entered promiscuous mode [ 343.162385][T14167] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.169552][T14167] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.176945][T14167] device bridge_slave_0 entered promiscuous mode [ 343.185179][T14167] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.192204][T14167] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.199693][T14167] device bridge_slave_1 entered promiscuous mode [ 343.271470][T14172] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.278706][T14172] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.286100][T14172] device bridge_slave_0 entered promiscuous mode [ 343.308154][T14172] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.315470][T14172] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.322736][T14172] device bridge_slave_1 entered promiscuous mode [ 343.352001][T14166] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.359061][T14166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.366328][T14166] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.373338][T14166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.431901][T14168] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.438972][T14168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.446244][T14168] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.453252][T14168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.469076][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.477140][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.484538][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.492284][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.499671][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.531437][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.540046][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.547116][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.564422][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.578376][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.586613][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.593695][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.601410][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.613099][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.638751][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.646916][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.653949][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.661297][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.670353][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.677434][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.684815][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.692733][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.700674][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.708888][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 343.733035][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.740697][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.749092][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.756138][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.764505][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.772608][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.779649][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.787148][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.795573][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.802598][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.809991][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 343.835852][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.844831][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.852993][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.860038][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.868362][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.876601][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.884547][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.892572][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.907760][T14166] device veth0_vlan entered promiscuous mode [ 343.976984][T14173] device veth0_vlan entered promiscuous mode [ 343.983527][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 343.991885][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.000686][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.010226][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.019720][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.027731][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.035822][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.044231][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.052315][ T2327] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.059351][ T2327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.066968][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.075426][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.083706][ T2327] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.090709][ T2327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.098144][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.106133][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.114128][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.121546][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.129010][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.136598][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.144157][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.166466][T14166] device veth1_macvtap entered promiscuous mode [ 344.173687][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.181902][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.189981][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.198259][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.206811][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.214887][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.222750][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.231199][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.239524][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.247728][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.255937][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.267318][T14167] device veth0_vlan entered promiscuous mode [ 344.281336][T14173] device veth1_macvtap entered promiscuous mode [ 344.287942][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.295988][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.305216][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.314309][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.322588][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.330959][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.339278][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.347075][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.354780][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.370965][T14167] device veth1_macvtap entered promiscuous mode [ 344.378963][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.387618][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.397394][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.405900][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.414337][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.422595][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.439469][T14172] device veth0_vlan entered promiscuous mode [ 344.447740][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.456196][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.463953][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.471285][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.479931][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.488395][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.497051][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.505550][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.513874][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.522636][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.530641][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.548036][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.555583][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.562933][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.571471][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.580681][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.589221][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.602523][T14168] device veth0_vlan entered promiscuous mode [ 344.634100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.647469][T14172] device veth1_macvtap entered promiscuous mode [ 344.665070][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.685835][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.700983][T14168] device veth1_macvtap entered promiscuous mode SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 344.731485][ T24] audit: type=1400 audit(1748249606.410:173): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[13981]" dev="pipefs" ino=13981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 344.829319][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.843200][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.862003][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.880256][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.894509][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.932077][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.953930][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.962468][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.970915][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.016888][ T442] device bridge_slave_1 left promiscuous mode [ 346.023042][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.030583][ T442] device bridge_slave_0 left promiscuous mode [ 346.036727][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.045970][ T442] device bridge_slave_1 left promiscuous mode [ 346.052097][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.059967][ T442] device bridge_slave_0 left promiscuous mode [ 346.066415][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.074289][ T442] device bridge_slave_1 left promiscuous mode [ 346.080372][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.087781][ T442] device bridge_slave_0 left promiscuous mode [ 346.094737][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.103153][ T442] device veth0_vlan left promiscuous mode [ 346.109316][ T442] device veth1_macvtap left promiscuous mode [ 346.115603][ T442] device veth0_vlan left promiscuous mode [ 349.218247][ T442] device bridge_slave_1 left promiscuous mode [ 349.224433][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.231802][ T442] device bridge_slave_0 left promiscuous mode [ 349.238033][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.245783][ T442] device bridge_slave_1 left promiscuous mode [ 349.251867][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.259397][ T442] device bridge_slave_0 left promiscuous mode [ 349.265668][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.274123][ T442] device bridge_slave_1 left promiscuous mode [ 349.280219][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.287891][ T442] device bridge_slave_0 left promiscuous mode [ 349.294272][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.301916][ T442] device bridge_slave_1 left promiscuous mode [ 349.308130][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.315475][ T442] device bridge_slave_0 left promiscuous mode [ 349.321567][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.329507][ T442] device bridge_slave_1 left promiscuous mode [ 349.335742][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.343041][ T442] device bridge_slave_0 left promiscuous mode [ 349.349355][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.357588][ T442] device veth1_macvtap left promiscuous mode [ 349.363641][ T442] device veth0_vlan left promiscuous mode [ 349.369474][ T442] device veth1_macvtap left promiscuous mode [ 349.375619][ T442] device veth0_vlan left promiscuous mode [ 349.381440][ T442] device veth1_macvtap left promiscuous mode [ 349.387565][ T442] device veth0_vlan left promiscuous mode [ 349.393377][ T442] device veth1_macvtap left promiscuous mode [ 349.399527][ T442] device veth0_vlan left promiscuous mode [ 349.405513][ T442] device veth1_macvtap left promiscuous mode [ 349.411486][ T442] device veth0_vlan left promiscuous mode