last executing test programs: 14m43.327744391s ago: executing program 32 (id=1485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b1, 0x0, @perf_config_ext={0x0, 0xd35}, 0x14802, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="0000000000950000561e27f100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x42) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000967f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) recvmsg$unix(r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f0000000140)=""/240, 0x32, 0xf0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) 14m43.175057273s ago: executing program 33 (id=1487): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0xd0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b0000000500000002000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) close(r5) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x10, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000610f000000000000090000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8535580d882887037edbd6b4495175bffffffb702000008000000b7030000070000008500000006000000d475f0ffffffff060000000000000000180000000000000000000000090000009500000000"], &(0x7f0000001080)='GPL\x00', 0x200, 0x20, &(0x7f00000010c0)=""/32, 0x0, 0x10, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001200)={0x5, 0x0, 0x8, 0xfff}, 0x10, 0xb6ad, 0xffffffffffffffff, 0x0, &(0x7f00000015c0)=[0xffffffffffffffff, r7], &(0x7f0000001600), 0x10, 0x1, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000009d86000000000000", @ANYRES32=r0, @ANYBLOB="ffffffff020000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000040000000100"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 14m43.154829374s ago: executing program 34 (id=1492): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x24, 0x0, 0xffffffffffffffff, @void, @value}, 0x14) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-010d \x00'}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x10}}], 0x10, 0x20044080}, 0x20004001) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x3, 0x9c, 0x9, 0x0, 0x8, 0x80000, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000180), 0x1}, 0x1230, 0x8, 0x8000, 0x6, 0x0, 0x8, 0x9, 0x0, 0x2, 0x0, 0xeb}, r7, 0xb, r6, 0x2) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0x1, 0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xb3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000400000008000000080000000000", @ANYBLOB="0000fffffffffffffffffffffffd5f2e"], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000001fe, 0x98821, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="18100000", @ANYRES32=r3, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r9}, 0x10) 14m43.124554984s ago: executing program 35 (id=1489): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r3, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb, @void, @value, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) close(r6) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0f00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg(r6, &(0x7f0000000700)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)="385c1c1c9116aa3622224092b50749c45812fa66f33d80f1ca913e1649388b38a9257daf06aaf0c9222c1eee3cf7c832476318c34bfb1a0886dde4466d050046082d82af566e117bcd7f67949f984e2891f38e3b5219013739aa29a1c82d7c9ac6242e888c9b2ce2e0", 0x69}], 0x1, &(0x7f0000000680)=[{0x30, 0x10c, 0x7fffffff, "f9cf90691dfc569ec253bae79137c0e3f4f7b5d370c7bb533a7e82370a55"}, {0x50, 0x102, 0x5, "39961493caeb4df86e58e3519918f0e6d4d05640aef3a9103db308601ed27d494a2b96ed891714e46f39e69dd437bf846918623b3ec148b13dc5"}], 0x80}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xe, 0x31, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x4}, [@generic={0xb4, 0xf, 0xb, 0x5, 0x10001}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8968}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}]}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x7f, &(0x7f0000000a80)=""/127, 0x41000, 0x4c, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000e40)={0x1, 0xc, 0x7ff, 0x1}, 0x10, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0xe, @void, @value}, 0x94) 14m43.093388824s ago: executing program 36 (id=1472): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r1, 0x1, r4, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x1b, &(0x7f00000005c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @generic={0x3, 0x7, 0x9, 0x5, 0x50}, @map_fd={0x18, 0x7}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf}, @map_fd={0x18, 0xb}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x4, 0x7, 0x6, 0x0, 0xfffffffffffffff0}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x35ad, 0xeb, &(0x7f0000000340)=""/235, 0x41100, 0x8, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1], 0x0, 0x10, 0x7, @void, @value}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_merged\x00', 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, r8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000500)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x0, 0x2}}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e1836156aecde7202bf69591cc585d2d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c81be3110a36a27aeffe0ad5a8a7385a1913a64fb2db630e8fc8017828cea60f327c3a510b441d94d32584e55f7c2320d89b2ba3d44d832b8e7c5f45442de9ef37d057e6d0c6664e8d74e23f18336d41a3e38c2cda49050cb32ca7040a388c75741ac07d3befc714df35dc92ff70ad041cf17b70a971c142bb89ecfe25290750e989c8666560a61b62fdc4fadef7f30b6269a669ef99be7e7ba7ddddf99949fedc0c331796988c6eedb5c66cbe2870a2affce0b550c3411a2aaf302481ee93398c0fbc0c815cfe1e78bf8fed7f19f2c2dae17a4533aa85f6b787f8072adda379118d76dbba3cebfc4c8aacbb1f79a28ec3a0ec99816", 0xe50}, {&(0x7f0000000700)="91c1f3da326e8207e7145e78d65d68b488721e406bd9f4fbee6b09064acf10e79055ef8b43077d00e8b9430291a17d86635a35610eef5fa110d29a32273b92c04f2f98d9672d1be57873095c0f298ea3d8667aa9c4181c664e7f2efb09d508bbfa25af0e1113f3863d6f7830d842e26ffb007ac1e8ce843c4f9e11e3", 0x7c}, {0x0}, {0x0}, {0x0}], 0x5}, 0x1) 12m53.260344999s ago: executing program 37 (id=2224): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000186800000c00000000000000680300009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair(0x2c, 0x2, 0x3, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) (async, rerun: 64) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x5421, 0x110e22fff7) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f00000008c0)=ANY=[@ANYBLOB="294013630e48d6365fcbee417a51b0e97263b12f8742cb7327dabb3b01a1f5b04c680a73972e0200000000000000d9044334af4283be6926134e7b6facbd4b27fc5bf6fcd7964999bd0a442641f18befc9f3632b07f3c59359a7038473451a2b7c279e624e5dbf9fb1810968f2986d4b335082b6999901f1ae8346b956f1d37dd8f2bba9796caf03f12b763cf54e2ee3daf06ca8ef333a4ac7ac7b519fd2626876466557f45ccbd86c7d8d8ed99ace263f279c4f272747b0810373702d57ed7265c354ed44ab"], 0x4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) (async) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x27, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000700000000000000ff7f000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001864000002000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000000000085000000860000002974ecc6fcffffff18010000696c6c2500000000002020207b1af8ffa4b80000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000a378455ceb1175d76779cdcb3426255bafb16701a1be1ec55d0d4b6a9ccc54ac677a0e4d6bfa1dc9a5244e6fa287aff487b16b5ad8907418c3a730c5cc183d94dc8b1bc7f79eadaeeae176471c133e63e8f1f9dc24f12ceabe04b34a8cd3b11eb74d3e22c2943f785902eed615ae66f6ff36c2c8a2737e12cbee359081bac4a68622f3cbf9ed85776a62"], &(0x7f0000000080)='GPL\x00', 0x6, 0xa1, &(0x7f00000004c0)=""/161, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0xa, 0x38235e2f, 0x10}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000005c0)=[r6, r6, r0, r0, r6], &(0x7f0000000600)=[{0x1, 0x5, 0xa, 0xc}, {0x0, 0x4, 0xf, 0x6}, {0x0, 0x5, 0x8, 0xa}, {0x2, 0x2, 0xf, 0x2}, {0x1, 0x2, 0x8, 0xb}], 0x10, 0x5, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000740)={r8, r0}, 0xc) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x13, 0x0}, 0x16140) 12m53.117522391s ago: executing program 38 (id=2225): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x54, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=r1, @ANYRES64=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r6, 0x80, 0x8}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r10, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(r9) 12m53.065077603s ago: executing program 39 (id=2226): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000007000000fc0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b17e5dc2f559cc52c29118da8e10b7fc6d28ca89ab341c30e0e8071a599ac20a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x5, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x214, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800"], &(0x7f0000000240)=""/199, 0x33, 0xc7, 0x1, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce81020329"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\v\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x9, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000a0000000bc0900000000000035090200000000009500000000000000bf9800000000000056090000000000008500000050000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000540)='ext4_es_shrink_scan_exit\x00', r1}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1], 0xfdef) 12m53.035550653s ago: executing program 40 (id=2223): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) recvmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/211, 0xd3}, {}], 0x2, &(0x7f00000004c0)}, 0x40000001) 12m53.005081424s ago: executing program 41 (id=2222): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x20, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="0500000000000000711188000000000085100000020000008500000002000000950000000000006e9500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xaf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x220100, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) 9m34.854713278s ago: executing program 42 (id=4097): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104046, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0xc8, 0x7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="54000000000000000000000400000000000000010000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@restrict, @datasec={0x2, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x1}], "25ff"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "b8b3"}]}, {0x0, [0xca4a26e823d4cfbe, 0x5f]}}, &(0x7f0000000540)=""/145, 0x50, 0x91, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r11}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4m28.277881325s ago: executing program 44 (id=6981): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000140000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x41000000, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000dd0000000a00000000000000", @ANYRES32, @ANYBLOB="0000000000000000008f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x19, 0x4, 0x8, 0x10000208, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb60000000000000000850000007500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff00"/24], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x6, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b70000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0xd, 0x18, &(0x7f0000000780)=""/24, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xe, 0x5, 0x1000}, 0x10, 0x0, r7, 0x4, 0x0, &(0x7f0000000b00)=[{0x4, 0x1, 0xe, 0x4}, {0x5, 0x4, 0xd, 0x3}, {0x1, 0x1, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x9}], 0x10, 0x8d2, @void, @value}, 0x94) 3m53.815098314s ago: executing program 0 (id=7281): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1, 0x0, 0x0, @void, @value}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000001c0)={'vlan0\x00', 0x400}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000da032c8e4876916976c8de585500"/41], 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xff00}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0xe00}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3m53.509727238s ago: executing program 0 (id=7282): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000002b05000000000000000000000000000000000000000000d7b907bf96f453de3ea3847b4cc158721a8ae44575d67f81932e85b12fabfa59faba9b1bc041b02932"], 0x19) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="bc6b538779f83eb2a261bac0d90000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000950000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mem_hardwall\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xb3, 0x0, 0x4, 0x3, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x112340, 0x400, 0x2, 0x0, 0x5, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7b84cf6a, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, r1, 0x3) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x61, &(0x7f0000000200)}, 0x40002120) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) 3m53.41733757s ago: executing program 0 (id=7283): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba53886dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='wake_reaper\x00', r0, 0x0, 0x2}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000006000000850000006100000085200000080000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x8, 0x8, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x1509, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x2140, 0x1, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 3m53.334798991s ago: executing program 3 (id=7284): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x57, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0x2d, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x6c, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00007b8af8ff0000000062d98bb755561592dca16befa0afbbd5665fb4b431044fb588d0a20007020000f8ffff08b8167c3f7f6214ea922b6369a8b243b51c91f7bc5f09f910ec224d906a102fe1b54943c5f9831c89295601019c34e5658713bd48"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000600850000009e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x9, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) 3m53.133804684s ago: executing program 5 (id=7285): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xffa5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) close(r3) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) mkdirat$cgroup(r3, &(0x7f00000004c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f0000000280)=r2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xdd11}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b0000000000000000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000f2f54352", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x10) 3m53.132408284s ago: executing program 3 (id=7286): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc73c0bf9141fb414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x40, 0xc8, 0x0, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x36}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0], 0x0, 0x2a, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000500), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r6, 0x4) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x3315}, 0xa28e, 0xc8, 0x5, 0x5}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x4, 0x5, 0x2, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={r0}, 0xc) 3m53.076284295s ago: executing program 3 (id=7287): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x32, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000046682d562c31630100000000000000b52f0d6086e274aa97a91fa46cdcefe7534fda04ca542b4c4904446290f93bce3177127ebc0c24e7e718c0b1da96d9c9fa8e95238403007cb9806b9641253a7b99504c950fcba378fae7ec90b6da825996012194da80cc7621803fe840ccedca203b30524e6258edbfe64d0900cdf79924bfb82ad5cfe25853d4f3a2841f7d7e692bfb1387c1211d00d4cace5a0ae3fad859bc7cb33f20922abe3780b6d07d9dde639e27dc79daef403b188d618ab4928773db8fba724f8d8f46ff88fdf1e61dceef4ac7bb085eb915eb2f14927a5caef0f5224ef0e7219c3fe37b272f27e9aab8a31e258d6c14be1f1a31a8e68d00"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n'], 0x98) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 3m52.529464894s ago: executing program 3 (id=7289): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x3, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4000000, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x83}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000100"], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) close(r6) close(r7) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 3m52.527602604s ago: executing program 7 (id=7290): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='&'], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0xa, 0x200, 0x7, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r0, &(0x7f0000000a40)="260000000000000095", &(0x7f0000000040)=""/98}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/89}, 0x20) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x104002, 0x0, 0x0, 0x1, 0x6f00000000000, 0x2, 0x0, 0x0, 0xffffbffe, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) (async) close(0xffffffffffffffff) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002bc0)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000fc0)={&(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0, 0x0, &(0x7f0000000e00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0xd}}}}], 0x20}, 0x40) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 3m52.483595954s ago: executing program 7 (id=7291): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x84, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000080000000000000000000850000007d00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="823b821f17584b1d570000ff93cb030000000000000000000000000000000004000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000000400000004000000be3a000000000000", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000081ffff00"/28], 0x48) 3m52.280352208s ago: executing program 0 (id=7292): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={r1, 0xb444, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x19, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5585, 0x0, 0x0, 0x0, 0x1}, [@exit, @exit, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r3}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000700)='GPL\x00', 0x8001, 0x18, &(0x7f0000000740)=""/24, 0x41100, 0x2, '\x00', r2, 0x0, r6, 0x8, &(0x7f00000007c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x10, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000009c0)=[r7], &(0x7f0000000a00)=[{0x4, 0x4, 0xd, 0x6}], 0x10, 0xe0000, @void, @value}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x19, 0xf, &(0x7f0000001600)=ANY=[@ANYBLOB="180800000000000000000000000000001811000096f263455fd68c20ede13ab59130fe4a70798aeb944ed145afedd6e53304e59c3a9d1909dcf8991fab5c9d26", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b70600001fffffff8500000031000000bf0900000000000026090100000000009500000000000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r8, 0x58, &(0x7f0000000180)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0300000004000000043a63ca0000000a00000000", @ANYBLOB="03000000", @ANYRES32, @ANYRES32, @ANYBLOB="02000000010000000100"/28], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20001) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b0000000700000001000100090000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/2356], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 3m51.981652372s ago: executing program 5 (id=7295): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000001c0)="b9ff03076003008cb89e08f588a8", 0x0, 0x402f, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0xa, &(0x7f0000000880)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x2c, 0xa, 0x8, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r7, 0xc0189436, 0x1ffffffe) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 3m51.926509903s ago: executing program 7 (id=7296): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x800, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xd4) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1000000000, 0x8}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000000010000000100000900000001"], 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000010001091659ebd18a000000000000000000000000000000c7207c5e884bc77f3a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000007480000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xad3}, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(r5, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYRES16=r3, @ANYBLOB="8dfe3d61615af3d7c248c2f6c91864fc65ab42449ea074c8c5d0a40705c6", @ANYRESDEC=r6], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x1e, 0x4, &(0x7f0000000500)=ANY=[@ANYRESDEC=r4, @ANYRESHEX=r7, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000200)=[{0x1d, 0x0, 0xa7, 0x1}, {0x8b19, 0x5f, 0xd6, 0x9}]}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000880)=')[\"\x8f(\b%\xad<\xd4rD\'\x0fopw\v\xb6\xe9\xb3\xd2:\xbe\xd9jS_\x8bp\xc4\xe1\xca\xaa\x8b\x1b\xf4\xed\xd1\xea\xea\xb5;ZdSU\xb8!0\x14\xce\xe6 \xc00j\x91\xc0R5\x19}=\xf8\xce\x99\xf2\x01|\x05P\xf9\xacj\x01\xa2\xe5\xad\xab\\vo8\x15-\xbf\xab\xe0\xae\xb0`@\xae\xce\x9d\xe0\xff\x81\xac\x9ey\x15\x1f\xd9\x14\xae\xd7p\x9d\x91k\x96\xf5\x14\xb4NN\x94\xd5\x83\x96m\xcb\x0f\xf0p\x8a\xad\x89') bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="15000000100000000200"/20, @ANYRES32, @ANYBLOB="c675f220", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000180100002020001000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r10, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000400)="5aee41dea43e9eee28e622e563a3", 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) 3m51.925466623s ago: executing program 4 (id=7297): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYBLOB, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_free_inode\x00', r0}, 0x18) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe8b) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async, rerun: 64) close(r3) (async, rerun: 64) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110c23003f) write$cgroup_type(r3, &(0x7f0000000080), 0x9) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = getpid() write$cgroup_pid(r3, &(0x7f0000000000)=r9, 0x12) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) (rerun: 32) 3m51.898543714s ago: executing program 5 (id=7298): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x52) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) (async) syz_clone(0x4eb82100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x8004745a, 0x2000000c) (async) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB='ids '], 0xb) (async) ioctl$SIOCSIFHWADDR(r0, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='ext4_es_insert_delayed_block\x00', r0, 0x0, 0x4}, 0x18) r11 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff3bf}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, r10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000780)=ANY=[@ANYRES16=r11, @ANYRES32=r3, @ANYBLOB="034b856c6086491b5a4a99832688659092ffd85e217f0e05a9749ee352f9a526b0b3cd244941710765e5bff89751b92ba04a6f3371546d9c6a73b86cd5f1c08e4f16d4cdf2511ec3ebe7ac0e2f09df36345dddee47502a95f9416755b28a9602ac3284d9a085f8f20b9027ef11549721c8e0bbd04cb14708cd48fc7e0fe6be3e67a12a0cc6ef1a2428ab5d65b6f1eee99f683b33484fa66de9b0e1e2ced7cf093cd4616e850b5e7e50e74724", @ANYRES64=r5, @ANYRES16=0x0, @ANYRES32=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r12}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r13 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000900000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/20, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x50) 3m51.876712364s ago: executing program 4 (id=7299): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000000020"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYRES16=r0], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11368}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008000000d2c10000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000200"/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x26, 0x5, 0x800000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) write$cgroup_subtree(r6, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17f, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1001000}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) 3m51.742296866s ago: executing program 3 (id=7300): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000Lf3'], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020200000000007010000f8ffffffb702000008000000b70300000000000085000000710000009500000000000000b5e95e045f4dfe87bc3d0093142477b3f8d7969105b051bfb9a5e7664878ec481ee0f48d48993f812af445ba8adadd35c8469a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000c1000071a2130000000000b5000000009066000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x0, @perf_bp={0x0}, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0xa4}, {0x6}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000005000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x0, 0x0, @void, @value}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x2, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x58, &(0x7f0000000240)}, 0x10) 3m51.600897128s ago: executing program 7 (id=7301): bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000100000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000040000000060000000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="009d6d8b080000000000000000000700"/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0600000004000000040040020900008000000000", @ANYRES32=r1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/13, 0xd}, {&(0x7f0000000800)=""/221, 0xdd}, {&(0x7f0000000900)=""/49, 0x31}, {&(0x7f0000000940)=""/224, 0xe0}, {&(0x7f0000000b00)=""/53, 0x35}, {&(0x7f0000000b40)=""/28, 0x1c}, {&(0x7f0000000b80)=""/43, 0x2b}], 0x7, &(0x7f0000000c40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x2000) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a"], 0x5) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x11, 0x5, &(0x7f00000000c0)=@framed={{0x2e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000680), 0x4) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000480)="c45d02f9671ba3167226e9afa4fedd505d5ddfd207f53ddbd47ba90d65d4e8e7191977464a3d2546b4b3da01b188b426e2897f563020a4a48995377d0da5f9890530ef0a01776da2f1a746ccb9b757af56f217b6eda6b640dba81706e133d06860befa37bcf3880d23153445cbf184adc7eb92781e07b7fc725dc32aa23278bb524f1536f22dc2794f5d659e610345ed5e025a070c9c6b56f9ba4593756687b263b7d3af6c36ace4625948bbf2080d32741098be96cdb947c2412ce629851e5089094129685beb8cdaeef57368aad0e77bfa167fff5af5a630553ca45ce8f29785bd47bc3a01", &(0x7f0000000000)=""/174, &(0x7f0000000100)="0d079244d0c07d623f63b18d722a8d31cd84096d74d8f31b7d95ab3e0cc6cf91ef70e448a3258b1505cc1060ba4ea85114f27b94d4e098e1f7a5e6d070b330649c003fcd8e0445806464", &(0x7f00000001c0)="7965c04a81b690c6fb2b0fa3eeb7d4d6cb1dbba8c01f4dca72a4d04a54c43991c7c633e866f44391c72debca1e4cec4096e2a68f1d95ac57346ca5c2bfa0628577e72b1fa63ce701395befef178fc1304f9119e4494fec4d10bc7fef97fde9badb5f0494035428e788c1cb", 0x0, r2}, 0x38) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000014f, 0xfffffffffffffc9e, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x19, 0x10, 0x8, 0x2, 0x0}}, 0x10) 3m51.597838268s ago: executing program 4 (id=7302): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x9) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) (async) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='\x00') (async) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x4, 0x10, 0x4, 0x2, 0x0, 0xffffffffffff3655, 0x40200, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x10, 0x9, 0x0, 0x0, 0xffffffffffffadcd, 0x9, 0xbee, 0x0, 0x6, 0x0, 0x8}, r0, 0xb, r0, 0x1b) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x9) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x18, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0xf, 0x0, 0x0, 0x41000, 0x3a, '\x00', 0x0, @cgroup_skb, r0, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x6, 0x0, &(0x7f00000003c0)=[{0x2, 0x4, 0x3}, {0x1, 0x1, 0xd, 0xb}, {0x1, 0x3, 0xe, 0xb}, {0x3, 0x1, 0x10, 0x6}, {0x1, 0x5, 0x5, 0x3}, {0x2, 0x2, 0x0, 0x1}], 0x10, 0x6b0e, @void, @value}, 0x94) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xee, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x9e, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r3, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000b00)=[0x0, 0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0], 0x0, 0xec, &(0x7f0000000b80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xb, 0x11, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, [@ldst={0x3, 0x2, 0x3, 0x5, 0x0, 0x50, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000600)='syzkaller\x00', 0x60, 0xf5, &(0x7f0000000640)=""/245, 0x40f00, 0x10, '\x00', r5, @fallback=0x20, r0, 0x8, &(0x7f0000000a40)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x4, 0x0, 0xb}, 0x10, r7, r0, 0x1, &(0x7f0000000dc0)=[r0], &(0x7f0000000e00)=[{0x0, 0x4, 0x2, 0x4}], 0x10, 0xfffffffd, @void, @value}, 0x94) (async) r9 = gettid() syz_open_procfs$namespace(r9, &(0x7f0000000f00)='ns/user\x00') (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000000f40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x7, [@const={0x8}, @struct={0x7, 0x6, 0x0, 0x4, 0x0, 0x6, [{0xa, 0x0, 0xfffffffe}, {0x3, 0x3, 0x7}, {0x7, 0x1, 0x200}, {0x5, 0x0, 0xf}, {0x7, 0x4, 0x6}, {0x0, 0x4, 0xfffffffd}]}, @var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0xa, 0x0, 0x0, 0xe, 0x5, 0x1}]}, {0x0, [0x5f, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f0000001000)=""/45, 0x9f, 0x2d, 0x0, 0xa, 0x0, @void, @value}, 0x28) (async) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000010c0)=@generic={&(0x7f0000001080)='./file0\x00'}, 0x18) (async) perf_event_open(&(0x7f0000001100)={0x7, 0x80, 0x81, 0x9, 0x7f, 0x8, 0x0, 0x0, 0x4, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1b6b, 0x4, @perf_config_ext={0xbe4, 0x4cf}, 0x10000a, 0x8, 0x0, 0x3, 0x6, 0x23, 0xc9, 0x0, 0x8000, 0x0, 0x8000}, r9, 0x5, r2, 0x2) (async, rerun: 64) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001180)='./cgroup/syz0\x00', 0x200002, 0x0) (rerun: 64) openat$cgroup_subtree(r11, &(0x7f00000011c0), 0x2, 0x0) (async) write$cgroup_int(r0, &(0x7f0000001200)=0x9206, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000012c0)={{r0, 0xffffffffffffffff}, &(0x7f0000001240), &(0x7f0000001280)=r10}, 0x20) perf_event_open(&(0x7f0000001340)={0x3, 0x80, 0xa, 0x64, 0x1, 0x2, 0x0, 0x1ff, 0xc4282, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000001300)}, 0x8202, 0x8, 0x88e, 0x5, 0x3ff, 0x7ff, 0x6, 0x0, 0x8, 0x0, 0x5}, r9, 0xe, r0, 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001400)={&(0x7f00000013c0)='i2c_read\x00', r8, 0x0, 0xbe5e}, 0x18) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6e, 0x6e, 0x9, [@datasec={0x5, 0x8, 0x0, 0xf, 0x2, [{0x5, 0x3, 0x800}, {0x2, 0x400, 0x7fffffff}, {0x2, 0x3, 0x7}, {0x4, 0x5, 0x3}, {0x1, 0x7f}, {0x1, 0xe, 0x3}, {0x4, 0x1}, {0x3, 0x8, 0x6}], "e669"}]}, {0x0, [0x30, 0x2e, 0x2e, 0x5f, 0x30, 0x0, 0x2e]}}, &(0x7f0000001500)=""/168, 0x91, 0xa8, 0x0, 0x8, 0x10000, @value=r0}, 0x28) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x1f, 0x16, &(0x7f0000001600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xf9f6000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000016c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x9, '\x00', r6, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001700)={0x1, 0x7, 0x9, 0x8001}, 0x10, r7, r3, 0x0, &(0x7f0000001740)=[r12], 0x0, 0x10, 0x2, @void, @value}, 0x94) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001840)='blkio.bfq.io_wait_time_recursive\x00') (async) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) 3m51.53069748s ago: executing program 5 (id=7303): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000080000000a"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000003000000040001000500000000000000", @ANYRES32, @ANYBLOB="0000009e73260cf02cdb88c1be15c16a65a660d0cfe3ba4859", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000500000000000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r2}, 0x18) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3m51.529164569s ago: executing program 7 (id=7304): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001800000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000540)="d2ffdd934517f3e145fa02e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r5, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbe, &(0x7f0000000500)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000580), 0x8, 0xfc, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x1, &(0x7f0000000000)=@raw=[@alu={0x7, 0x3afeb170aa58a863, 0x1, 0x7, 0x2, 0x30, 0xfffffffffffffffc}], &(0x7f0000000100)='GPL\x00', 0x6, 0xe9, &(0x7f0000000140)=""/233, 0x41000, 0x8, '\x00', r6, @fallback=0x14, r8, 0x8, &(0x7f0000000280)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x6, 0x9, 0x6}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f00000003c0)=[r9], 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_kthread_stop\x00', r10}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 3m51.528082049s ago: executing program 4 (id=7305): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x11502, 0x0, 0xfffffffc, 0x6, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r5}, 0x57) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r7, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x50) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000006000000000000000000000902000000040000000000000700000000000000005f"], &(0x7f0000000540)=""/228, 0x36, 0xe4, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="f9ff000004000000080000070000000000000000", @ANYRESHEX=r6, @ANYRESDEC=r8, @ANYRESOCT, @ANYRESDEC=r6, @ANYBLOB="0100a3ea000000000000000000000000000080000000000005e5ecc27412d7a54b1f901572c37873"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESDEC=r9, @ANYRESHEX=0x0, @ANYRES32], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3m51.415930761s ago: executing program 4 (id=7306): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xffa5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) close(r3) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) mkdirat$cgroup(r3, &(0x7f00000004c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f0000000280)=r2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xdd11}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b0000000000000000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000f2f54352", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x10) 3m51.413152081s ago: executing program 5 (id=7316): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01"], 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3072d51f5104fa2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x3, 0x46, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) write$cgroup_type(r9, &(0x7f0000000280), 0xfffffeed) (async) write$cgroup_type(r9, &(0x7f0000000280), 0xfffffeed) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r10}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 3m51.402140371s ago: executing program 0 (id=7307): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x6368, 0x1, 0xbb22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x94c3}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0xde, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300), &(0x7f00000003c0)=[{0x2, 0x1, 0x10, 0x3}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000400)}, 0x20) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r3, 0x0, 0x20}, 0x38) 3m51.334817902s ago: executing program 3 (id=7308): r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=ANY=[@ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES8=r2, @ANYRES16=r0, @ANYBLOB="dfa13ded657b9e61b4582c8e5bd8b3ed7366ca5d94becc216fe0478ed54d8dcd1dd75f6812a12608598d3e1428cdd8b32f44778dde3ccb50aa410ee84d8cb7738ebcb5c640f6c448b3ea3aef26626eeb82850c0e9949135840ab86c685ca97463302ee914520c52cf071eebd0d8600554f327ad2c14b082c234e98a3324de364863a554083c940e0304422", @ANYRESOCT=r1, @ANYRESHEX=r1, @ANYRESOCT=r0], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000005740)=ANY=[], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe87) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f00"/20, @ANYRES32, @ANYBLOB="0000004a056067cea9a4c8f0f3e81a70879e910000000000000000000000000200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r4}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xc}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) close(r5) 3m51.157406065s ago: executing program 5 (id=7309): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001f00)={@ifindex, 0x3, 0x1, 0x9, &(0x7f0000000680)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], &(0x7f0000000980)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001fc0)=ANY=[@ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\v\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="1e0f76c2c206d71f908cb59f8611a22224cbb012ae35a3aa2523fa2367195ea07b76999b03bac298500fefc708cf4ff4a7ba14ea7d70c150aa5044577151556b2fd681db40e0969344a1c345a7ca2923bdfa", @ANYRES64=r1], 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1c00000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000000000000000000000000000000003bd8000000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r3], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00009cbc91d57ee0891d83ae5e5d67fa00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000000800000000000000000000041"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0xf, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x40) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xfffffffffffffe62}], 0x1}, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001f80), 0x2, 0x0) recvmsg(r9, &(0x7f00000003c0)={&(0x7f0000000300)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000840)=""/209, 0xd1}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000c80)=""/223, 0xdf}, {&(0x7f0000000b00)=""/134, 0x86}, {&(0x7f0000000380)=""/1, 0x1}, {&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/178, 0xb2}], 0x7, &(0x7f0000001e40)=""/155, 0x9b}, 0x10101) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/250, 0xfa}], 0x1}, 0x0) 3m41.566377695s ago: executing program 4 (id=7310): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000010000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB='-cpu'], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x9) 3m31.473315653s ago: executing program 7 (id=7311): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000001c0)="f676e5c305550ee01709347f8d5dc609b5a03a97c070facbc59b9ba26f289808996260287658495c0a0250a9fb6d92c48ed4345753635b0d4cfd80fab9749ad808b91fa56383feb421ea38b536fdf420bcd525932e3e840b57d9e94390139b5751c5256c584b67a9f7b77f3432096abde7309875f5688a0fe722517cee1cf6e5490b1a88afda2869a583ac57f995002140a37f7ccc6644b51c6a2276013f1f56ddd10585d20fea7eb5693b50f958b7127c62cb7d64469ed2a56726f467", &(0x7f0000000000)=""/1}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 3m31.472414243s ago: executing program 0 (id=7312): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x8, 0x7f, 0x4, 0x0, 0x9, 0x8, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xa, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x6a8, 0x73b, 0x1, 0x0, 0x2, 0x7, 0x2, 0x0, 0x5, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0xa) perf_event_open(&(0x7f0000000700)={0xfffffffffffffffe, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffeffffffffffffd, r1, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3m31.461496913s ago: executing program 45 (id=7309): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001f00)={@ifindex, 0x3, 0x1, 0x9, &(0x7f0000000680)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], &(0x7f0000000980)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001fc0)=ANY=[@ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\v\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="1e0f76c2c206d71f908cb59f8611a22224cbb012ae35a3aa2523fa2367195ea07b76999b03bac298500fefc708cf4ff4a7ba14ea7d70c150aa5044577151556b2fd681db40e0969344a1c345a7ca2923bdfa", @ANYRES64=r1], 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1c00000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000000000000000000000000000000003bd8000000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r3], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00009cbc91d57ee0891d83ae5e5d67fa00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000000800000000000000000000041"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0xf, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x40) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xfffffffffffffe62}], 0x1}, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001f80), 0x2, 0x0) recvmsg(r9, &(0x7f00000003c0)={&(0x7f0000000300)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000840)=""/209, 0xd1}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000c80)=""/223, 0xdf}, {&(0x7f0000000b00)=""/134, 0x86}, {&(0x7f0000000380)=""/1, 0x1}, {&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/178, 0xb2}], 0x7, &(0x7f0000001e40)=""/155, 0x9b}, 0x10101) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/250, 0xfa}], 0x1}, 0x0) 3m31.224575407s ago: executing program 46 (id=7308): r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=ANY=[@ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES8=r2, @ANYRES16=r0, @ANYBLOB="dfa13ded657b9e61b4582c8e5bd8b3ed7366ca5d94becc216fe0478ed54d8dcd1dd75f6812a12608598d3e1428cdd8b32f44778dde3ccb50aa410ee84d8cb7738ebcb5c640f6c448b3ea3aef26626eeb82850c0e9949135840ab86c685ca97463302ee914520c52cf071eebd0d8600554f327ad2c14b082c234e98a3324de364863a554083c940e0304422", @ANYRESOCT=r1, @ANYRESHEX=r1, @ANYRESOCT=r0], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000005740)=ANY=[], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe87) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f00"/20, @ANYRES32, @ANYBLOB="0000004a056067cea9a4c8f0f3e81a70879e910000000000000000000000000200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r4}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xc}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) close(r5) 3m12.854410544s ago: executing program 47 (id=7312): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x8, 0x7f, 0x4, 0x0, 0x9, 0x8, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xa, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x6a8, 0x73b, 0x1, 0x0, 0x2, 0x7, 0x2, 0x0, 0x5, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0xa) perf_event_open(&(0x7f0000000700)={0xfffffffffffffffe, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffeffffffffffffd, r1, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3m12.842728444s ago: executing program 48 (id=7311): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000001c0)="f676e5c305550ee01709347f8d5dc609b5a03a97c070facbc59b9ba26f289808996260287658495c0a0250a9fb6d92c48ed4345753635b0d4cfd80fab9749ad808b91fa56383feb421ea38b536fdf420bcd525932e3e840b57d9e94390139b5751c5256c584b67a9f7b77f3432096abde7309875f5688a0fe722517cee1cf6e5490b1a88afda2869a583ac57f995002140a37f7ccc6644b51c6a2276013f1f56ddd10585d20fea7eb5693b50f958b7127c62cb7d64469ed2a56726f467", &(0x7f0000000000)=""/1}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 3m12.823414714s ago: executing program 49 (id=7310): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000010000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB='-cpu'], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x9) 9.719196989s ago: executing program 2 (id=8678): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x10b, 0x2, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%pI4 \x00', 0x2}, 0x20) 9.536323332s ago: executing program 2 (id=8682): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r5, r6, 0x2, 0x2, 0x0, @void, @value}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r3, r4, 0x2, 0x2, 0x0, @void, @value}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[], 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x98}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r5, r6, 0x2, 0x2, 0x0, @void, @value}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r3, r4, 0x2, 0x2, 0x0, @void, @value}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[], 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x98}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) 9.318853286s ago: executing program 2 (id=8685): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 8.866967423s ago: executing program 2 (id=8691): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000ffffffffff1f00000000000000000000d6847c707627a3fa56de074710182d08cc5d"], 0x48) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$tipc(r3, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) close(r2) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)="ab", 0x1}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="00960253"], 0x18}, 0x20040001) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="10000000040000000463c4ddeb6262855c5c457b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYBLOB="18ae583ee39df2d52a025c948fc81bee42cfae9cfecdf791f74854377fd52044fc85117d88ac9c269fcb822bbce292f49f6ec2dba467c1bd89dfe77c665de2df43f62844ca6fa6dbf26c57283d4438a90af6102a681f31e42a3b66e804d181282d73b6ae752cd6cfc4a0300d59db3bb2716820f5", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r6}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[], 0x48) (async, rerun: 32) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x31) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xc}}, 0x0, 0xffefffffffffffff, r7, 0x8) 6.970465922s ago: executing program 1 (id=8706): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002980)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x3, '\x00', r2, r4, 0x4, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) 6.467268839s ago: executing program 6 (id=8709): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4e50a0a0500feff"], &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708", @ANYRES32, @ANYBLOB="0000000000000000b704000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x10001, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x9}}]}, {0x0, [0x5f, 0x0, 0x2e, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/145, 0x4f, 0x91, 0x0, 0x8000, 0x0, @void, @value}, 0x28) syz_open_procfs$namespace(r3, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000cc0)=ANY=[@ANYBLOB, @ANYRESOCT, @ANYRESDEC], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 6.061610586s ago: executing program 1 (id=8711): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0xe, 0x0, &(0x7f0000000b80)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000080000000000000000000000218110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000007b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) unlink(0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000400), 0xa}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1e, 0x5, 0x99739287, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7024000000000008500000086000000950000ebffffff00"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r8, 0xfffffffd, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = syz_clone(0x40000, &(0x7f0000000240)="973a9c06a0f0a46f7c68ad8bc1e400", 0xf, &(0x7f0000000300), &(0x7f0000000340), 0x0) write$cgroup_pid(r8, &(0x7f0000000380)=r10, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r11}, 0x10) 5.935713728s ago: executing program 1 (id=8712): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20284, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x2, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)='pim6reg1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000001000000007910480000000001a600ff31271cef49db87c80000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7040000080000008500000095000000956f4f686d0000009029405e0b40fa0e2884351e531f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x2000000}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 5.900334549s ago: executing program 2 (id=8691): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000ffffffffff1f00000000000000000000d6847c707627a3fa56de074710182d08cc5d"], 0x48) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$tipc(r3, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) close(r2) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)="ab", 0x1}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="00960253"], 0x18}, 0x20040001) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="10000000040000000463c4ddeb6262855c5c457b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYBLOB="18ae583ee39df2d52a025c948fc81bee42cfae9cfecdf791f74854377fd52044fc85117d88ac9c269fcb822bbce292f49f6ec2dba467c1bd89dfe77c665de2df43f62844ca6fa6dbf26c57283d4438a90af6102a681f31e42a3b66e804d181282d73b6ae752cd6cfc4a0300d59db3bb2716820f5", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r6}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[], 0x48) (async, rerun: 32) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x31) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xc}}, 0x0, 0xffefffffffffffff, r7, 0x8) 5.650839093s ago: executing program 6 (id=8718): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xffff, 0x7, 0x0, 0x20600, 0xffffffffffffffff, 0xe, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0x10, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x4, 0xf, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800020000000000000000002800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) write$cgroup_devices(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="80fd"], 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x8}, 0x8) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000800000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r0, @ANYRES32=r7, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="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", @ANYRES64=0x0], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 5.216471999s ago: executing program 1 (id=8720): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'erspan0\x00', 0x2000}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000380), 0xb9, &(0x7f0000002f40)=""/229, 0xe5}, 0x0) close(r3) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x25}, {0x35}, {0x6}]}) 5.108035561s ago: executing program 6 (id=8721): r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0x2, 0x0, 0x4, 0x0, 0x20000000, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001980)=ANY=[@ANYBLOB="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"/4693], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007e40)={&(0x7f0000007bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "000500"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "93"}]}}, &(0x7f0000007d80)=""/151, 0x42, 0x97, 0x1, 0x0, 0x0, @void, @value}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x301000, 0x0) ioctl$TUNGETVNETLE(r7, 0x800454dd, &(0x7f00000001c0)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r9 = syz_clone(0x20080, &(0x7f0000000380)="67c79ca408146d6cc2c3d51ee353aea566f09ad9eec88205f0c57cacecec8598bc8090afa5228b76697e10592bc1a7c0ba3d56cce5acb3ad5054830401e50b7437ca161d1760565319b388884a4b562382c0215bf722ada3376c93be527ada65d6186d004816d9e8c453300168a46f", 0x6f, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000640)="cd54f7dc130424afce4d") r10 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x40, 0x8, 0x4, 0x4, 0x0, 0xac1, 0x5000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xf, 0x9}, 0x4000, 0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x200, 0x80, 0x0, 0x1, 0x0, 0x3}, r3, 0xf, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x3, 0x81, 0x4, 0x10, 0x0, 0x2, 0x4000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xd66}, 0x60, 0xa, 0x9, 0x2, 0x4, 0x3, 0x200, 0x0, 0x100, 0x0, 0x8}, r9, 0xd, r10, 0x2) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) write$cgroup_subtree(r8, 0x0, 0x36) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) 5.107225441s ago: executing program 8 (id=8722): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB="01320000310000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f80)=ANY=[@ANYRES32=r0, @ANYRES32=r7, @ANYBLOB="1a0000000800000000000000", @ANYRES32=r3, @ANYBLOB="f97cdfb8b64cdc5632ff83c238df205594e2f05bcdb6f9c0d09ac37feaa16886ea7382e5efcfcebedfde031fcb958b7f9c9ce583c79b20d455e475403859c49d2bed60f3bf445a830416ca4689d3cbe76ce2699acadbef84e550d9f33d02b6521475b101f0b24a9ac1ae74275ff67ae126064401aef09e19bda2f3b725a573d16f82b77154293c035608c6798efde3", @ANYRES64=0x0], 0x20) close(r1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x19, 0xf, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000e40)="b87b2afa1cc6cffc687b32b6bd5397151134800197bf3595387263a364b6782e5d3c3714dbffef48b672fd11c85be2800600000098ae4c2d02c68099a9239019a1e9d636007990362df52426ccb3c2ce234bc424ae3219d703e6140100084d561ebf7adab2ecc8979fc0dce88a4c90fde6dfc0d2ae5fbcde443e77e981fc5098958b757fc9346402afa72edcdb5661a1", &(0x7f0000000cc0)="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", 0x3, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffaf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c40)={r11, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1300"/12, @ANYRES32, @ANYBLOB="47be2c364a70f9cb5b71c07b85071aa7372037f85393748d430ef026361e9ed87e92819e81713021751730adde05f4dff20be64be371a6366671f77a8856cca955d4a94363bea30e7ec605cd4a68afac3f", @ANYRES64=0x0], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) 3.702152753s ago: executing program 1 (id=8723): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000001400)=@abs, 0x6e, &(0x7f0000002c00)=[{&(0x7f0000001480)=""/39, 0x27}, {&(0x7f0000002680)=""/32, 0x20}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/146, 0x92}, {&(0x7f0000002580)=""/170, 0xaa}], 0x5, &(0x7f00000011c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x9fb6a484c1782696) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001100), 0x8}, 0x0, 0x0, 0xffff, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair(0x8, 0xa, 0x6, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000e65385000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x18, 0x28, &(0x7f0000001040)=ANY=[], &(0x7f0000001180)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001240)=[r0], &(0x7f0000001280)=[{0x4, 0x4, 0xa, 0x8}, {0x3, 0x4, 0x5}, {0x2, 0x5, 0x5, 0x5}, {0x3, 0x3, 0xa, 0x1}], 0x10, 0xc5e, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) 2.658872549s ago: executing program 8 (id=8724): bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="000000e49fd2d2aab92200"/27, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00010400001d0000000000008100000081"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={&(0x7f0000000500)="6793eba53604b014ff2a7e144463", &(0x7f0000000540)=""/88, &(0x7f00000005c0)="1222926d84bbc8c9dc815f1ea721bc1052906bd0f9fef02bf5f745ae7dc64dbd462811b022cfee2ffddfd9b8f054add01b70169e8069f36b10f73948846ceade", &(0x7f00000008c0)="eed227aa37013cbebc2068e2c495141c55190b85a079468a924065e08421ac48ba4691fbea02f054c06454b787ea7c0df7ab05abdf5de18c5a58ef57b475e7ba9fe699251bd608212a5274b7c64c778ae1967ff554713645c6837246cf2cc4ee00e31a89eb88a3409cd8159bb8a93a0d9f108f354c76e3b1560b793b749543b890712222275ae51573580df90abb7b729e5e214b11f1c3d2f96bc6856a67b2db47d7f8e035df8ed5f1da195ffb0bf7ff89abcab8d135a8531fee1c85c36b7685443bf87f6e2275b89785a090759402d63932244a20fd69", 0x7, 0xffffffffffffffff, 0x4}, 0x38) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000003000000001812000006b4c46308feef561f38deb28729aef6324aee60b7b3e267a861b8bd1a1a8dc6a4", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) write$cgroup_type(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0b0000000500000002000000f9ffffff05002000914601d971563bda4912c0a9a28c33b7814157e753a0f1db7d0368047d4831643b1f02b8f6f0c9cf9ac23fa052fa953efa7007a97a57dbe11b9b83f5222b9f554c284cdec12f74f93f4839b91e3c51e2b73b355a3f967b967646430ee343d05e01a15a85489a8d2f13828b095c313adddf04fa145080f91b6856813baaad766ff6a3", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000440)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @exit, @cb_func={0x18, 0xda34d79e8507abc6, 0x4, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @exit, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r8}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x40000}, 0x0, 0x0, r10, 0x9) 2.56259009s ago: executing program 6 (id=8725): getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1807000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.269525595s ago: executing program 9 (id=8728): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000004c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x2000022a, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) (rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940), 0x4) (async, rerun: 32) write$cgroup_pressure(r0, &(0x7f0000000400)={'some', 0x20, 0xa4e9, 0x20, 0x4}, 0x2f) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181200002803b5d0edcda791ec5378ca8f26445516ccbbbfba0ac15318ca5be5b3625c6230bcb7d58602e3bcc81994e89f59895a6938fabdcfc2aad11b97109e3cf2d8dcc684130b5251416f8e2b84c20b659ffd7deb208fdccf23b82e9f6efa2a0d162374ed083e10e4ce1bbd5e067d435edc35c9d626651ac47fb35eabfa551d3a15343b", @ANYRES64, @ANYBLOB="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"], &(0x7f0000000780)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000200000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="05000000010000008e00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r3}, 0x38) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000cf5d2f3fff102f857e5355bf24bb8ec4bbeb26beb99b2bb3a71db12375d0f1317a3d63447c04d5172aa1b5705c64995221c9fc2bdc468e47b83e422695a8d4ba6fae848817575e06a00d1a54e7ff4a680b84fc302ba0359cd0293e3f5606cbd929ee55c44283512f2a34fff816ea3d9e2f479db67673d1a81367d3a43d07b364968902422bd7a3658f9d7d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8, @ANYBLOB="ced9d76f9f71bebba1b9f50ed10852ad20048788168dc3fef851ae6a0e077b18219d789b980a1505f5060574a9d23486a4b333431beaa3202a0dee2c934c18f62a51ba3d9317bba48847375928a2106c107d324ab26d3103cb06f2aec18d219391c441c50d39dad06591cf714f257429fc50ff37df", @ANYBLOB="000000000000000004f5ffffffffffffff00"/28], 0x50) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r4}, 0x10) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x240, 0x10000000, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd47) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffffffffe9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0xc, 0x6, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x200002, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) 2.268749355s ago: executing program 6 (id=8729): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x3ab000, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a0000000000000000000000000000cf7b6c4ba9bec153d6834bfef080df374703a8ff56a63ec1fe5f2e05a79e3cace7283dd68d41e94420c325fe4dae144fde5ec25a87d625cab20753a77b323fa3783c8b675859b9012647885a242adfee2fe812ecbe5191e0a15142f7349e7627cc39d724e2e34e7a24154f26ae3125b36d0504965295d0453902ac7079b11a3a1e655e482331e3dc35b2e7e4e3ea99064fe5b9c8ae0ca3e5fd653f3286a99d81ce4eba765c38d097391ad4babac38ce5b4344e24a361cd54e5"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r4}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) mkdir(0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$tipc(r7, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0x8e9}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.186025786s ago: executing program 9 (id=8730): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe12, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r4}, 0x18) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r6 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0xc6e04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, @perf_config_ext={0xb, 0x2}, 0x8044, 0x8, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r8}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r11}, 0x4) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r12}, 0x10) (async) close(r10) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r9, &(0x7f0000000440)=ANY=[], 0xfdef) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 2.185101236s ago: executing program 9 (id=8731): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x2000000}, 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'gre0\x00', 0x400}) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1900000004000000040000000400000004000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000a3151a9cdf3c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.048639908s ago: executing program 8 (id=8732): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 1.833311502s ago: executing program 1 (id=8733): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000100"/20, @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0, 0xc}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x895}, 0x0, 0x0, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.775188383s ago: executing program 8 (id=8734): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffa5) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000f2f54352", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) 1.574894956s ago: executing program 6 (id=8735): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000008000001000026000000cfcf47f24db1fa7205f38c0e612f647b2d49a42cb7b09af8c1bed335c5a1b092da623bbc5ab88016d6df62fbaa4bb968c61647fad272c1a29b54f96138a5785edc92829eab838f7c4379e43a6677c131480486c2e25b11fc98e119933d891b7a1020b6d60b7889e5f73ada98e63cadb0cfa35eca8e316a0d662028b7352353e72d41326994482a36555b82f9a50b1846c061b85b9e37029835332a86897cf42e9d13f45ebc6506e57ddc756e06e9f65efd83ec13a5b50d5d6576fa25c67b57657c5981e23f92e445302c337bd1a408dff5ac0f7f286c562768519b6f2343de48a9540a2fdb25e1a5", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) close(r5) (async) close(r5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000004000000040000000900000000000000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00u\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 1.573456085s ago: executing program 9 (id=8736): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffa5) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000f2f54352", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) 761.451648ms ago: executing program 9 (id=8737): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1100001f79a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000001a000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffffffff55bb2007ee51050512da90b5b42128aa090a79507df719af36349f298129da4871307b534bf901115e17392ac66ad022186a8929d1c000006146001e04aeacea799a22a2fa030000c412f6cae80043eb27d53319d0ad229e5752548300000000dbc2777df1509516f06f1330cf8c3a8b1ff72e6127b0dd488318b5790bee7ebd4745b7cdd77b85b941092314fd085f028f4e09d63781987af2abd55a87ac0394b2f92ffab7d153d62058d0a413b217369ca8b6712f000000001b1df65b3e1b9bf115646914ce53d13d0ccacda1ef16fdcceaede3faedc51d29a47fc813ce3d32cfc7a504c271d6d6f4ea6bf97f2f1be2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de7940b0000db8db03d4b7745fef1d04ec633dee254a6d491b8496da787e814c4fdf0b4a387b4c8149d18c1020029a18986252a70f8f92eb6f0e8c7db000068fbaa2e2a27efd9104297f2c58159f02d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa909ac06b57479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0ef94234db1f00000000000000c20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b35f421c3552772ca7f3e2c25a65f75ca13fb7c8bbd6ff43cb78b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41aad8bda74d66f47cc17d8ba3eec0fd80f82c5f573c6d294d366505000000da0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da323947004cacadcaff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389485ee7af1f0387c93559653f50a471c69608241730459f012b060e7d23fd39206000000000000eb55d00162325ba141bd587cc9dad46de56ef907b059b99a79ae5498f6589880ed6eea7b9c670012f80cd6a1397953ba5870786554df26236ebced9390cb6941b8365d936a7d2120eca291963eb2d537d87cbb54e588ee5d6944ee4de5c183c960119451c31539b22809e1d7f0c7a06a9fa87d64cb77872a0aa9a104e16b3b8c6e64836ac3f32f53c9a2bae513464ca03aff14b9aa4bd9539f5096412b92012e095b84c202060098df3314f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c363000000000223201780200c6ed7966130b547dbf8b497af0a77f52f2cd39000000200000e81c23cf14156951210001c800000000001500000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921e0128dfd70b438af60b060000000000000056642b49b745f3bf2c01808b6d7d748308eea09f0161b4735efbf3411738d6ee7aebf9ef40662d7836d252c566e1ee938a9a6804ed3a1079b0282a12043408cd60b9e53978c81839be0000000000456f7d2a42cb13da2022f23eaec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea394cd8ffd3d628293e591dc6f71c2710a7ea8a4fdc214e1cc275b26adfa892e6de9200000000e50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c73de2f04f15d005387577f480000ea65559eb00e014df20fa209bcbb5c252b11a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633c26d3927ae1beb065f5ac33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2b2bdc0af7c4c61241750d50515a59a3ad09e8802e8f4f535447dc0fc9d5f99a145dfcedad69da9cd4b75c624600e78f4458542b14f29611f95d4a318384eb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d583f436137a3c5dc714c9402c21d181aae59efb28d4f91652f6750b9195599d60c534ee8e8ff0755b09004c25edb85bcff24c757aa80900000000b6638c420eb4304f66e3a37aaf000000c42a570f0e9d76fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284df80e4636c25b96174326d82761c26e329555f9290af40000000000000100000fd3763655500344bae34347f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419a5c16e2055b8505809ed2ee9647c5d3b0000bc00edf5e9020c09ab004321610b857e8717974b633b21cb32f0e03280e09758bd445ab91d201782d656ab09f508bbbaca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92b32af00f191b66b6a6f732a91f0a2e9120be61e58c79d497247d278888901d44bf77e8246605a644e9e3d769db497c3960df05caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f3101985602688888ccb85c87b4f8ffffff7f000000002c331fca28541b7ca211115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000000102000000000000000000000027c9585c0cead5d619d18475ccde2857279a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77a23b0000e49666c464d35ca9b50f3ed3b3da8c17a23692759ccf5a205311b7d122532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769da52b3d42c68a3102fa1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e8918a0d6e2949affcacb5ba0a56aa063b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d395832f1e2aad3e519f1634e8fbd8d31330d89069f9448a2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4cfb0b9c8c80158b44ecae9420654f7016b0aac117087406d343e27b372d6027ab2aec8f2bcad7fe6bb932bc5751d2974e95455a277fa3b472bc7bbdd2ac5a1ea608e8137ace03361607cc1a84be659355629ab13ad49008c3fcfa2423439a3607961d5b59da48a0155e8e42cc13c702cc40c99cf86c2021d72f9f4ab1b00de555a5a39593c93871ff7eb5ecadb64837a2d88723ef65aa5152e3d55e5c66585e2112f5ec64b639a9864e57581b61f2b0960600000000000000265f091e7bce17d20604c5ab751773a5cf8a719a7ada06ed03832bf274707c7c970edc20f4a1eaa3b61045a20097208d03f7a146a6901913618738679d4e0af53eae997eecfa0dc3dcec19d3d9205450765d659200c92701ee75c8710470d9eb6f62c5c721883f1544ba66271c8dab05a933746c16b6e93294b561c6715a32a394ed1e6c01670c931bfa76c58c6f34d64e758a7a7f7d33c49336d4cba2cbb170ad7539a45774dfcc55257215c8ae719dc1c232fc6699ef01005887d04a543030b4328ab48744ac23ff56fd2da52eb9fb2eefcdd2d92d73ac1b111ea895e1fec36a3579879acfe366d393f1fa9cbe08d9ba57a443643e9cd251dc88e91a5e458e66ea1e822d55d4dd919a95eb4c25a08cb6e1070000003a0fd07a4ad9df240e00006aaa2db0dfe416146840d88bd08365e547c970e2983200703864a3b9c4682cb479dad6d34d211b05267eb1355520e9ec0c5014b0832f7fb35782fdbfcbf5e23a7f5d51ea480371748d18d8e10608ab8261fe058d1732f28814a9981d84a04a2bb36c89bdd245e3293a14df1ac567301a79514f103abd387d6ef2d9d94508ac0f6135c8921279573eefd5d4e33b9ef585980789a94d9848906f545559d30000b5040f0776703363249ca984cbb09752f099efbb9e7362e4999594c1086d8958e9469db01d85fb0b9b3148663e9ea2e755d96c70e540b4200e4cf82986712dd733b26d00e947d03c42215118426d548cb2077b43b89e4163d260faea1db53e2cf3427c90aefa2662a1c2b28b0e020e872bda1d39da508de5dbc37d03ee056b2579a1d16799589a2600000000aa00006c94bcaf115fbbcb216e3cb7fd9afe16d1fff2d047e508aa5f6de0ea4e9ec1b3a4ab1f8b5f312fc50000000000000000000000000042709db6de7e969ac0ce18b47280fb1b1b1531648122fed3e25edecb5200f5000000000000166f7d36b2966c19af7ffa6afa69e50821c9aa3ae60fbc196cf8ad2f7f86d79db1bb0ecbf9c3d0d3d407574def838e4def26ed9c7e6c69858f7813be8ffc565583663bebfe7485660b67e1436cbc6d4d3c48ab7b033d7d1195173edb16643f69cb779802839d490a4df94e5ea89c192af2ae83876edd59c9a7140e12ba591f073ec604f7e8f1e100cd414e9237ecfc052d9a73a868cd0e4b06da0435af72fb0d25657e8f5464b19fa83f977e6900000000367871fa37420e7a232ef9b440bb0639994c655d144c5786939d6a187b81f9ddd2bec36cd28371b1754cb6c53697fb23576ee0d3fd0a5803c9be9fe364803184f1a7a9a8eb64d17d238fa3238a001aa8ed040a69e9ec0a627e3b3ca64d4680d819c14c71684581000000000000000000000000000000000000c6a6587715865fe14558960bc936bc838bd1f2a00b17a407457681d0760000000000000040000000000000000000004faeabea6de40ae30291662594c993099ef041c264a64d77d69e0cdfa620a191704cef91e269044acf844de65a099200265e13c2a8f9b717886dea8e79407e34bc268a17965033ca1dfeeaf9b49bc68f1546595642f9fc008875ddb7aebda7a16b1d20dd8b65bcdac8cdc75a173fd2e57a9c37bf5a52ea001ec981dd7ad4e5944575ced39233ada8f3c1b856644812828bb79536a5188d14fe537250dc107121534cbbc7598f48aa2335616ae8eb72acf6982048e568e37f1f58e9714343587734c7ec0fa5c44d13165d6384bf9500757b4b0275950d6e7c451eef3fd353d47c54c4c2cf7318e6c24583ba0966225284d1abac80786519c563ddf0e6c023d537ca6e0d6d4e072c98f45415d13f0dcea174f162ebd00b42264f6fa3dccd09f4101dd254e54423b30e06713eccfacb6ffb38afff920980af938a4d78f4b9a6b5c7424e91121cda789104ee490d25843f1622bba93257cc23e45cd7ed42abdb991d51804e674e507dfd53b5ab6944df33f4f494b926f2ceb329550b46e82a939ad82b385e66809d7d4d3630b6f22c2f41fdaa0fadeea09fa4f7005813643c2d6307d55689faf6f656327ac5872a3bd4c11363909a8b9f30e5401993a0f6e1a9b42287542647d1e86b02b7e36319414629ac1f35e1457f922da0c2de76c9e97944efad0a3ad78cda81c5b82709d696e85bbf4595ef9664a6aff8cf96446cb6c26595f4eb659d26c846471f6551dbb24fc6c03a01e33efcd5939472b687d31be9bd9bd1bcda45bd2236f06c000000007d348ebcb9d810d4dc3d55bbe4055ce9c45267daeec7a7d8b498f507e933cc02fb53c2c28fa09ce5ada5de1415309761f6378c794f8ce23c1f7add4f65280ab446ea2d130000000000000000000000d1a0313ff63bc4e4463688db1d6ac7f4595a02c89349a973f118d936f33ea18e69d7739f4532e1b8580ef125b47cf5b402b6f2beffed6cc9afe2b548c4dbc78363118818d9473f29d52444685c41620eeaeb1f8786e87aeaf287fb9b63b30e6761507503dcd47b64f0b6157999c82bd151bee0c67f3e664225bd917b38aeae1da5524eefef1772d759df9ec9b4197383f9a66217e180e434e650dd560aa3ed42acddd44d6f45807a3c63e15929cfbebc7eef1a319d3147a6c06bd974168ac689392fa851ebdf524ca2331148ff7e855cccc106074ca92153734d5c5e3f9efc6592b08e0c07c7b5d42ec71484bb2a4c0f4293138369f39f9fa4a9cc607b42ba6102f918ce4e76d66fba450e940ed6a6a301a0b761a9cd849962fae5059bda419fd2a170ea387c10a4ada5893f38486069ef1bfdbb432ab322c887d7a94fa967135833157bafbed3b48bb267fc3aa56d1e5b66417a673b40884fc91ec9558eab6a08222dfe37767095b2d94cda881290d6017137595cdd53972353f485adfde8015cac0e1acd64ca97d67023f75a54b1ebe55053652ad16292a15e79dc58ba080f795f1a548da6f669e5c34afc272e5a32e85d5f44979431eab3fcd8d33d54000000000000000000ff1f3f6f4b33adcbee66736b4b35b5b909bc7ddd03f17f5f6436156a56c7e77e0808703b370f0cb4f00074200ae3e4ea0611d548f34582848903e4459d0a18ab9b113ebc614fafe4bd03cb1a8843e592f1b102b1bb87f13c50a1dc5df223e5bbcd06c55393f9c0e08ab6509bbed0dfedbf37309c99bf1e1fc7512afb7bd334653356419f8aa57f1224a54a85a3041657fb5037dda5b0f2e6a9673cc0d51b28954ef8c0ca82e69d198729b2c984a04b0f6ef9486767f5928461df5b8f84e0b790fa7d9088fdb7b7e6f020d4eae420155f1739307421fc3e9d4ffaffff2434f3d167d24bead3c6cedb2dd480d5c8b21c0edb06893c1fb18e9e716525f115055a84daca135d8972280324a9ffd4e636c87225c2512eb3e0fe65972c84361536e52a6ea677ffcb4bf8fac2009f24c01b7c86c203ce9093dd53b154110f033a25034752dc8561ed7bb7343e069ba1ad6f1d7437b584d2c292088d3d80e8834ae8760cc0211cb03f3ed168131eba4c8a0000000000000000000000000019c2dbe83523a58f68e66fa9fdf1d2878bf2ff524e6da7f918e87c1b1de17ff8077ba247fd5498310ae532b9bc6c583edfa97f7a4c00cce855a225dc017afc3c06e8a72b62bdb64e83cb6a319eb551345cfb24aaa02ddc4ec2daa942dc6e2332d724b11c0d9c8ff4ee94849938f5d231fdb5984d5442b564c079fce70ac620dcf7739693beca9dff66e957dd2fc03ce462da31e7f7a657118387727e8500"/5107], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x4a, 0x0, &(0x7f0000000140)="d510faffffdb674c5ae4000b0094", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 724.459439ms ago: executing program 8 (id=8738): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) (async) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff7) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="bc00"], 0x50) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) (async, rerun: 32) write$cgroup_subtree(r5, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) (async, rerun: 32) r7 = openat$cgroup_type(r3, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) 630.92389ms ago: executing program 9 (id=8739): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000340), 0x9) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000000880)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000900)=""/158, 0x9e}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x80012141) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000022c0)="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", 0x800}, {&(0x7f0000000480)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361e1", 0x4a}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7615de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000780)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def06111800cdd1bfa8dad1b527355170d7374b5746eeb372f023739b202037e6aad1465e4d837004cbf92a5236d7d56fc3c6a80a8af8118d9c9e957", 0xaa}, {&(0x7f00000032c0)="61b605c601d7de6ae32d119f9689f3c40a637939010d73c5d122e431ad5b18d55939039891d115d9f67ba8038eac04aaa6c432944abbe029ffbbbfd6b29ea66820fa9eaceeb70932d83b9340e9039eebe5633c0218ace9743f86206683f9962df475837b578c98379f2fa3fb3b67d6a2ea236dcec05c55fda088b7b8f6e5841970778717a666854bc4f8a2fed607a15684d755c4c055888841d334216079b989e5a29cfe59409b5b2cde488f2ebf083366f7a9a589c1e8d16909cd1ea8223ab875015e96c3094e050098294d7a13d913da38295e7b23a9f7e080efa57dd6f0590fb60c8dab61b783cdafbfd6d7f2fc53b9118cd54b31aa24da4529440ee6637955ae2b62b09e9797448a5af6c5a343e346af5dc4864b7b59036ddc11662f37aadb3f9f3fd95f9f539672692ee584b1b62b4f3c295df2e1787fb947377d9d217378aebb7b5d27f20b61d3139967edb0ce18cd0a988fd3806755a114556a8fe95fcaf9eaa0a2c6869cba27a3ee6f6bb3b7360729c7dd3835d17e76a0f7af6cf71d6b6178a8e6e12de2523a670f9c200978c01419c33e05b7f95ecf8678b18c262725f26a57cc4aa4c0dd2c8a967e4618ab795735a8d8ac0cbb1ee2f7428eeee46f1400f33ea63be46e4d8e9dac44b3fb35a6a5f3bb0a1141234431fefc4fbbfc1b31968e9d6f4d041eeed0edb4db1cc7fe847325be929d6a3c549c697fd3e93ce31388c1ce82889eae5f4b41af1d17624ebc99e2b719454a04bd9df933c18fe7e5592771d061668a97734f70f584261ba989cca1b1c0e63dbb4d2320848158d9c8c49ec3f29dcbde19a781f080e980a1a0dd25c32060355ff35820782250457f12841e940c706e3d64946640aade5e53f4c34432ebae168b57be9f59514987410df039a0ba98f2122b4d26792ea3b4179de19df5c264c60b2d9e12101aae438829735fc0077b47388f34f2106f7b50770c8a62f48304b6bee347fe920e9014730d20fcd38c3471e4abebc2dd32a96491cf9382ceb39afb3884f704479491c8cd6cad2dbd9a228f5c061ce730d404f11281f3875a4ef2f7d545f123f24d2e95a5ada021727ffe2df8971a9c2b983fdb1da3dabc2e4b906b5a08b72d69e9d158d0d7501b2fa6c0684a4b9de6eb73479aa2c11e8286ecf30b5d6a1863f4edcc757f2b60955a4d1277690b6a0dfaf7777dac93d950740f2448f0b95fd1c6ff664cf9f64e098774bff7cda47eb2163ec69428c6c1e2e21b57ebc741d27177a7da15082f3463840b4b4d6922ca27cd3ed5fb3e6c5c2d62fead796b92e4945ef7ccc5278f4c9c1953ea56d16c00b2ab77075e11a1f77ef84fdbfbaf8d3049477bfe65b04205740297498a52790beaec017a43ccaa1549c4b0c56a4262218bb98d9fa082fd300b2bb495c8de8bbe5f14e3b59a418d80c6f1fba0d988bbd6a25fe1602a1837745ede269896b8b3717cba709447401f05d5c94b2b0ae9177912dfba87234b31a4cdfbd48674daa79655d9ae9dcd8e767d44d63ab8028c8f7c9be33b2f44b6d458ac20f53af8294c3b0518d00a9373049e8653ecea7db3bda7d38ccde0b361c01c9b1ef797c2f65004a080e417c99bb58f30c1a1b909fc8b4177e6d7cead7981ee32b24482e1833b904266fccef5bf92fcd51444f28908b745eaac4e97aec4020a202000c98b931214d51447776d6504b410bd7989494a2a8c79d4fcbd877196c08b8a68be185f44f470f426d9525a73873860b0add5e11118643b3689bb51bce4b5045ca3d8958f899bba5d41b73e639a25ce8f7ba0f57c9dcf79c3273ec4b5ec40ce6c43d868bdade612db32d837a39968e1e2dc577affb1048b4a850854601cd862febd0fb6d4d95745881e18f2deb4738195cfbff8d1acdde96b776b3a3ba43adef8c91408a976ac70e72c41c5aa5bb2fb12ed103d1b702e534665b040142511055219e314ce5ad36ccca9fd573b7d4ae7af62f1caad7d6e8a523ce7a1ecd0bfd6810a045599722dea2e72706f9704741fa64fe04c9b9f853032724e202028562327bc5c9473c440e123cc44429e527f2f4448ba44f2e3dbd47b947064b40e3c847c7156edc8dda2b89a90e54d3278a3a6e254855932b56c18ce3ce2828ed60b44acfe16f8ab39e5a21031c727adea46b3b1d60e6a7a23e792872268468a00b379b8e64c0cf62e4947802139dfbb33e490a968f3669806f5611141e21a3c189c002b6d2fd085e99e05068e51b26aaae0882868ff72d86093e4e529a01623eadf28165eae4ab731c0c19f06b8f8ba0295367fd252d0de4bd68ed012457939083ad994a9a5c4af982a9ee88ea5cf46eaee5d315d03fb8de1398df3eff42ffb09781e6e233d996102571c2820cb5e1f30a7f98e849693d13555681a722945c743246a5a9e782c88a1b7563ac6e652bfa67b420da46f1a3c47510ec2d72e045e3a7176c7063f0a499364bfeb443026f4e4cfdd3d866de22f3fc37a86480a663b652be728c4d8c0ea741b69e6c3fb757f64eb4f363607ce3e96e6343abff5c932ce0a477d3d69217e4f382f09f4886dfb9abd2d02023077986f0245040793cf9f46be4d4ec2c8375a09fa1b3b649b55a274794dad004e41e8e924d48ec1df0e961fae3d2b00fd8ffb741af0269c6704b049b86ea3b7532ae886ab83e9ddca6ee5fbd1017a573a0f7ec55eb2c0a949e913a2e91db6eb24a476b3247423f0e306ec1e4ced1a4114d8d5e426c2ac0ce2d3e46e8b0eee2d1c0f453fecc293935a0702590fa0c3a38c3f0a7ea53d955b38d4a07a3f37576adc949db6f5febbea07fa77d1acce5cf1b83e740fb31db7c02e6981a92120d8b9d1ed88b71db7fcd3e61df6b3bb51e742db07545d2af1edf6b7a26baf85d2360811745f70a44edb34e41b9dd587120b92cb7a927e780a017e02941cb1fd4f9037815c055924b3c47a583c7b371f3a9e58f0f8543b279dd6e955c64842eda1a2d41bfaecc621c8571ee62a2cadb9264bc4f9fa7ace8c350555e98df8ddd360133a6b77b3e306a2138fe3f20564c27055f0c34a5931cd2ca522bc85a2ca8b7b6a6dbdd216732770f3a3c48601afa3158ae5bca98e14b92a0374a34db1cca775551ab3ec3868c90ceb4d2205bdc396a26c9c78d34006018cc84c8c150997908e7215746b8be00d7650dad572dcda53d3e0fc2e8c2cc755dd8c61b94de4652edd2b60ed461fae9da60dacf02973fac88f44165232efdfd446d7c731054d9ead4ad57ed6ad3daac54464163b7fe58f1adf70af359a1517c6df14c186a4c2181895b67bac07c2e48c3ae12f8260ce8d27c555cf42cbef691910f8f4a04c214a155cc00c3b203818b5aee5e050902b732a16657a94066f082f088c5393668f18fcef5c539237906003c6f4fb1f1c5b0325509d7d5be9c7eb1210969bfcde8dc391c47285675cb95b77d13438f15ccc6118da3d32a517dc108f62d48ff966fb7bfd5015d826a593b3e848ece2823a6d600ad27553aaaf615358efa95352d24e75323959c0c76059eb8aea6992bb7210db990be6ac25f230ea92ce1f9ac4e814c6f70abf05a1a43f503c78cd6f68a66b3152481f3f38c22a457149b2f07fd497ff08b6bd60259871dca168da32ce335f5d3e70ee62bee02ce3e75aa09ceadcf925c6714a4d43d3510a1582c91bbcfe756ee775876fb92117750244fb10990409f0ae007f27bcca820d2115e3de119600dd9cfd9f9c148f7d620aa2a49d82bb40b145601f76eff47613570b3d716f303b172a088227cd25b5086a0545f68f3bce5952b5881fd96043eb9fd68aefd87816acfd301d627ebc97e1f94dba89fe399fba02baae592c91defed9e681bbb92613b4a148150ed3a17420e8ed9ed56f7b1840c11e0ce0cb5d9268f56c7e8c46573711e587291c0a20922717300c26185d3c9c560479a37f3b66575a8671e420c698b7db82ef7baf2fb9f97a3fed71bd1a7312a6a863d22c702af4525d97d5f63c972ea175533533659f736869b56647d8cbf0ecb18662cd49c139593835750ec7b74df8a76e78d9709aa6e7a2e48369a064a44c12d574b5d8cfb51b0ff1eb390dffd180f216d259acaa5753f8dd14e35f35ae27717c7549513a42a76eb9e01c684a5b91b6105510040c3df26bccc415314954ace1832e2f8f0942434c35c8575dc9f51ea784cbeac9c95dfc97cb2a3cf9c32c09be3d5882b6d44d8fde2e0b1a2aadcad06735435f9b9a0d07663a1421493e10a4fd9ba846640178e6dde9bdf2ca7e3d915e9b68ca9249a5788c087b6bd31bc9d5580d9179c47c0af84b68fe83e4be557694361ebb5c4cf5ba2e156a4a1c419508f15b162142e3a141672270ab2a7a7de51bfb0d828dc383e3fbb0e9a845b1ca67fa351b968d51295dd2fc70d857b365fbd25eab55fe33530779d2fa5e228dae57b7ac101d19c0d71fb5124d29d4d1b7ed6b520d36e01e40feceff70bfd10c07883d533c6acb884bbf2d2aac4842bd731e15d33a557535219d470aa4bd158d11ccdb045428620f21c0bc8789c28b9f30c933503c5046050b873e5ccfcc614e78f69ece40966dd6eb73df75ddc13dd65f2aa85b51e7ff19dff0347bb0c65bdcf32befde2438d6aff11944d7a9455d606818262569cdfb6d6c7e2bd478f9c023d0f21a7d75c80e7ee87c037be0f3817f19faf2ba8b4d10a67557b3d56738229ec01025ed63b0995a26dc3beacf905dd1e2de1e002eb89662cb8fdf3c91ebc36b3b9bf2fcc76a14f5b9f06287f640df5697529117403b29b469596af815cd15f30a697475dee7bb568dd9785df3c0f6da693147335c40d6133b170c27cf679ce7775f503e7f7e61d4709e95a3f6ad5700ad7ddc7386a10a3ef1b5749472841432a925a578a18316ae8e5ad3bc186b746285b93a54ddc4c308f7c4a43ff129262fec439ea8051520fc211b782a96dccc33ce6b0d7028ec40c42ae350f4593df6ebfed1a61da4a32142c04daa15981811b66da93b45ef294414a25de609edda8eb10d499c5554f9d73eb0b8b3f32bd6c2b6427876e5683f926b7a80472eb8dab6ae89d7374a3d42225e355485beef92e5ec6f2845684dff4aa7618c16500c18ce6d75e07ac64692ba0e49a8789d2e5c6900fc9a375ac659b4ba6e45f8ddf2ca5ba82bef5f239004b733acb5c2687bf98c6a6a9ea093303a34b110bcefe3a80f018ce35b8c5e549e237854a2397cd3fae219cd935b5dc00d42e4b86b4e7e4b3b5f2167a7b2f70a13f3339cc3b2e46dc9387a2e7c8351cd9fb76ab6082ccd1b3bf923b93c654a72f7859a27acd6f268c6fbde1d5796acdee53361fbef1be9e967e8d4bb0cbe49dbf4758c84580efc3d9cfa6a0a14a4e0731ad843e008584ed2ada6228248ad8f6d513866d45ee56fcc787abf7a4099d8a59bfee3c5ef1582c08c243aace046b67cd5167dde5af524eff5b116d8323289323d5b014e6ad036844b6ed9175f066aa124af3cc0a664c095697837869c05e39442ff268c757df196ee8039f21718ad22d5d89d3671c1d9d0744a75a21daaeb70a1aa2d8b608a2aa09e984c7a8f8c0343ca955a8d4ca7be7306e1e36a015bba16eb01ee0734dfcb6796651eb5bf8f22c8d502fbd41af245bf2b91f674f9bff33333c85d8c06bcc7b282bd42e3a3f1613989f545442e661f8d111663540170c28b490ac1b133d4a65905ad723d6d95152a3fbaa3ff9193119641679651987f44ebe5336741f9ed808152cea48faf8c46648ac9679db4c571ba47102cdbbd9d8b5330592f2a799ed698f3a8670319e99feec5971ffe3d1aab5f8cc0f3", 0x1000}], 0x6, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x1c, 0x0, 0x0) close(r1) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) close(0xffffffffffffffff) 461.939653ms ago: executing program 8 (id=8740): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x1100, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@decl_tag={0x3, 0x0, 0x0, 0x11, 0x1, 0x6}, @fwd={0x10}]}, {0x0, [0x5f, 0x5f, 0x0]}}, &(0x7f00000003c0)=""/231, 0x39, 0xe7, 0x1, 0x5, 0x10000, @value}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0xa6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r4}, 0x18) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x4, 0x12) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000001c0)={'gre0\x00', 0x400}) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) 0s ago: executing program 2 (id=8691): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000ffffffffff1f00000000000000000000d6847c707627a3fa56de074710182d08cc5d"], 0x48) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$tipc(r3, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) close(r2) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)="ab", 0x1}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="00960253"], 0x18}, 0x20040001) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="10000000040000000463c4ddeb6262855c5c457b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYBLOB="18ae583ee39df2d52a025c948fc81bee42cfae9cfecdf791f74854377fd52044fc85117d88ac9c269fcb822bbce292f49f6ec2dba467c1bd89dfe77c665de2df43f62844ca6fa6dbf26c57283d4438a90af6102a681f31e42a3b66e804d181282d73b6ae752cd6cfc4a0300d59db3bb2716820f5", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r6}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[], 0x48) (async, rerun: 32) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x31) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xc}}, 0x0, 0xffefffffffffffff, r7, 0x8) kernel console output (not intermixed with test programs): e0: port 1(bridge_slave_0) entered forwarding state [ 619.373934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 619.393049][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 619.408246][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.415460][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.535751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 619.545626][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 619.607585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 619.616626][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.650256][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 619.669200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 619.719360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 619.747729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 619.766337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 619.776213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 619.806782][T17247] device veth0_vlan entered promiscuous mode [ 619.847329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 619.888332][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 619.929246][T17247] device veth1_macvtap entered promiscuous mode [ 619.971047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 619.988749][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 620.017839][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 620.064833][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 620.078032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 620.755996][T17296] device syzkaller0 entered promiscuous mode [ 620.814289][T17308] device syzkaller0 entered promiscuous mode [ 621.008579][ T26] syzkaller0: tun_net_xmit 48 [ 621.030498][T17304] syzkaller0: tun_net_xmit 1280 [ 621.258111][T17309] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.297719][T17309] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.305191][T17309] device bridge_slave_0 entered promiscuous mode [ 621.395332][T17309] bridge0: port 2(bridge_slave_1) entered blocking state [ 621.487577][T17309] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.495427][T17309] device bridge_slave_1 entered promiscuous mode [ 621.665944][T17309] bridge0: port 2(bridge_slave_1) entered blocking state [ 621.673092][T17309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 621.680561][T17309] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.687767][T17309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 621.728418][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 621.758179][ T451] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.775486][ T451] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.917066][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 621.951063][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.958225][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 621.996432][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 622.017839][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.025041][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.151606][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 622.180036][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 622.197870][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 622.255494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 622.273706][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 622.300733][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 622.315378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.325413][T17309] device veth0_vlan entered promiscuous mode [ 622.374927][T17353] device syzkaller0 entered promiscuous mode [ 622.415054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 622.427707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 622.559479][ T8] GPL: port 1(erspan0) entered disabled state [ 622.577565][ T8] device erspan0 left promiscuous mode [ 622.583082][ T8] GPL: port 1(erspan0) entered disabled state [ 622.712131][T17309] device veth1_macvtap entered promiscuous mode [ 622.744341][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 622.759811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 622.817821][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 622.929937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 622.961877][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 623.139039][T17364] device macsec0 entered promiscuous mode [ 623.192997][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 623.218031][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 623.412145][ T8] device veth1_macvtap left promiscuous mode [ 623.433194][ T8] device veth0_vlan left promiscuous mode [ 623.598922][T17373] device sit0 left promiscuous mode [ 623.676268][T17384] bond_slave_1: mtu less than device minimum [ 623.704859][T17385] device sit0 entered promiscuous mode [ 623.889676][T17397] device sit0 left promiscuous mode [ 623.924375][T17399] bond_slave_1: mtu less than device minimum [ 623.944285][T17397] device sit0 entered promiscuous mode [ 624.083649][T17401] device macsec0 entered promiscuous mode [ 626.053212][T17444] device sit0 entered promiscuous mode [ 626.454869][T17458] device pim6reg1 entered promiscuous mode [ 627.159065][T17454] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.171679][T17454] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.237073][T17454] device bridge_slave_0 entered promiscuous mode [ 627.418312][T17454] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.429517][T17454] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.488037][T17454] device bridge_slave_1 entered promiscuous mode [ 627.794601][ T8] GPL: port 2(erspan0) entered disabled state [ 627.813965][ T8] device erspan0 left promiscuous mode [ 627.840275][ T8] GPL: port 2(erspan0) entered disabled state [ 627.916887][T17473] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.924230][T17473] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.131294][T17476] device syzkaller0 entered promiscuous mode [ 628.327884][ T8] device veth0_to_team left promiscuous mode [ 628.336606][ T8] GPL: port 1(veth0_to_team) entered disabled state [ 628.395992][ T8] device veth1_macvtap left promiscuous mode [ 628.412354][ T8] device veth0_vlan left promiscuous mode [ 628.711193][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 628.725845][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 628.745506][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 628.761381][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 628.777711][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.784860][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.857067][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 628.917880][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 628.966560][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.973696][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.046869][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 629.055180][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.095885][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.131233][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.140084][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.291364][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 629.300719][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.315791][T17454] device veth0_vlan entered promiscuous mode [ 629.336741][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.351051][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.404142][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.428306][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.602132][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.637968][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.749625][T17454] device veth1_macvtap entered promiscuous mode [ 629.774445][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.796401][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.898783][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.927955][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.946586][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.263061][T17506] device veth1_macvtap left promiscuous mode [ 630.297511][T17506] device macsec0 left promiscuous mode [ 630.441717][T17497] device syzkaller0 entered promiscuous mode [ 630.567157][T17519] device sit0 left promiscuous mode [ 630.595465][T17522] device pim6reg1 entered promiscuous mode [ 630.602694][T17523] device sit0 entered promiscuous mode [ 630.785274][T17531] device syzkaller0 entered promiscuous mode [ 631.843226][T17579] device pim6reg1 entered promiscuous mode [ 632.493605][T17594] device macsec0 entered promiscuous mode [ 633.397626][T17632] device veth1_macvtap entered promiscuous mode [ 633.417949][T17632] device macsec0 entered promiscuous mode [ 633.446958][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 634.085070][T17670] device pim6reg1 entered promiscuous mode [ 634.653235][T17685] device sit0 left promiscuous mode [ 634.900893][T17704] device syzkaller0 entered promiscuous mode [ 635.336097][T17724] ref_ctr_offset mismatch. inode: 0x52 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 635.511990][T17717] device syzkaller0 entered promiscuous mode [ 635.942942][T17744] device pim6reg1 entered promiscuous mode [ 636.229614][T17755] device sit0 left promiscuous mode [ 636.310948][T17755] device sit0 entered promiscuous mode [ 636.564785][T17779] device sit0 entered promiscuous mode [ 636.969172][T17788] ÿÿÿÿÿÿ: renamed from vlan1 [ 637.566143][T17808] device wg2 entered promiscuous mode [ 638.150399][T17822] device sit0 left promiscuous mode [ 638.212908][T17822] device sit0 entered promiscuous mode [ 639.097292][T17826] device syzkaller0 entered promiscuous mode [ 639.299570][T17847] device sit0 left promiscuous mode [ 639.332077][T17849] device pim6reg1 entered promiscuous mode [ 639.372584][T17847] device sit0 entered promiscuous mode [ 639.864119][T17896] device sit0 left promiscuous mode [ 639.955150][T17896] device sit0 entered promiscuous mode [ 640.120257][T17899] ref_ctr_offset mismatch. inode: 0x40c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 640.451279][T17927] device wg2 left promiscuous mode [ 640.666160][T17937] device sit0 entered promiscuous mode [ 642.548943][T17951] device syzkaller0 entered promiscuous mode [ 644.051917][T17983] device syzkaller0 entered promiscuous mode [ 646.559705][T18085] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.572291][T18085] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.580305][T18085] device bridge_slave_0 entered promiscuous mode [ 646.588869][T18085] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.596261][T18085] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.604563][T18085] device bridge_slave_1 entered promiscuous mode [ 646.772903][T18085] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.780128][T18085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.787493][T18085] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.794873][T18085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.935193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.985306][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.036680][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.118983][T18115] device pim6reg1 entered promiscuous mode [ 647.134405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.148194][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.155468][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.185681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 647.200733][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.208298][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 647.297640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 647.309005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 647.318218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 647.327075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 647.337982][ T45] GPL: port 1(erspan0) entered disabled state [ 647.348088][ T45] device erspan0 left promiscuous mode [ 647.353659][ T45] GPL: port 1(erspan0) entered disabled state [ 647.406465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 647.423929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 647.467319][T18085] device veth0_vlan entered promiscuous mode [ 647.487776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 647.507251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.527874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 647.555694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.605915][T18085] device veth1_macvtap entered promiscuous mode [ 647.638703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 647.649333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 647.659262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 647.728795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.740594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.773242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.791272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 647.820813][ T45] device veth0_vlan left promiscuous mode [ 647.968753][T18157] device macsec0 entered promiscuous mode [ 648.127184][T18161] device syzkaller0 entered promiscuous mode [ 648.379262][T18183] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.387993][T18183] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.405324][T18182] device bridge_slave_1 left promiscuous mode [ 648.414083][T18182] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.425077][T18182] device bridge_slave_0 left promiscuous mode [ 648.432544][T18182] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.515982][T18268] device syzkaller0 entered promiscuous mode [ 651.892841][T18277] device sit0 left promiscuous mode [ 652.126026][T18281] device syzkaller0 entered promiscuous mode [ 652.198812][T18277] device sit0 entered promiscuous mode [ 652.964226][T18308] device syzkaller0 entered promiscuous mode [ 653.009932][T18323] device veth0_vlan left promiscuous mode [ 653.078196][T18323] device veth0_vlan entered promiscuous mode [ 653.100391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.148750][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.203953][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 653.342204][T18134] syzkaller0: tun_net_xmit 76 [ 653.351658][T18134] syzkaller0: tun_net_xmit 48 [ 653.401295][T18134] syzkaller0: tun_net_xmit 76 [ 653.647638][T18134] syzkaller0: tun_net_xmit 76 [ 653.699714][T18134] syzkaller0: tun_net_xmit 76 [ 654.550377][T18398] device sit0 left promiscuous mode [ 654.694731][T18404] device sit0 entered promiscuous mode [ 655.976273][T18481] device syzkaller0 entered promiscuous mode [ 656.043128][T18485] device syzkaller0 entered promiscuous mode [ 656.982249][T18505] device sit0 entered promiscuous mode [ 657.541575][T18524] ref_ctr_offset mismatch. inode: 0x90 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 657.580648][T18520] device sit0 entered promiscuous mode [ 657.772565][T18518] GPL: port 1(erspan0) entered blocking state [ 657.781873][T18518] GPL: port 1(erspan0) entered disabled state [ 657.804675][T18518] device erspan0 entered promiscuous mode [ 657.822901][T18524] GPL: port 1(erspan0) entered blocking state [ 657.829602][T18524] GPL: port 1(erspan0) entered forwarding state [ 658.394010][T18539] device syzkaller0 entered promiscuous mode [ 658.691380][T18550] device sit0 left promiscuous mode [ 658.813009][T18554] bond_slave_1: mtu less than device minimum [ 658.853260][T18550] device sit0 entered promiscuous mode [ 659.392342][T18570] device veth0_vlan left promiscuous mode [ 659.406282][T18570] device veth0_vlan entered promiscuous mode [ 659.549842][T18584] ref_ctr_offset mismatch. inode: 0x4f2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 659.582454][T18589] ref_ctr_offset mismatch. inode: 0xa1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 659.597302][T18584] GPL: port 1(erspan0) entered blocking state [ 659.625151][T18584] GPL: port 1(erspan0) entered disabled state [ 659.637886][T18584] device erspan0 entered promiscuous mode [ 659.644154][T18584] GPL: port 1(erspan0) entered blocking state [ 659.650669][T18584] GPL: port 1(erspan0) entered forwarding state [ 659.693008][T18592] cgroup: fork rejected by pids controller in /syz4 [ 660.532026][T18733] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.540077][T18733] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.547956][T18733] device bridge_slave_0 entered promiscuous mode [ 660.555881][T18733] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.568296][T18733] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.576780][T18733] device bridge_slave_1 entered promiscuous mode [ 660.737320][T18733] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.744858][T18733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.753144][T18733] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.761979][T18733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.806420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 660.816307][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.824874][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.840849][T18746] ref_ctr_offset mismatch. inode: 0x17a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 660.894330][ T8] device bridge_slave_1 left promiscuous mode [ 660.903540][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.945694][ T8] device bridge_slave_0 left promiscuous mode [ 660.960007][T18752] ref_ctr_offset mismatch. inode: 0x169 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 660.976557][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.998359][ T8] device veth1_macvtap left promiscuous mode [ 661.007846][ T8] device veth0_vlan left promiscuous mode [ 661.110237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 661.119377][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.126627][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 661.134353][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 661.143029][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.150099][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 661.210174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 661.218780][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 661.238115][T18744] GPL: port 1(erspan0) entered blocking state [ 661.245215][T18744] GPL: port 1(erspan0) entered disabled state [ 661.293254][T18744] device erspan0 entered promiscuous mode [ 661.310176][T18744] GPL: port 1(erspan0) entered blocking state [ 661.316677][T18744] GPL: port 1(erspan0) entered forwarding state [ 661.341426][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 661.349924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 661.386885][T18733] device veth0_vlan entered promiscuous mode [ 661.395536][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 661.427182][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 661.497898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 661.521289][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.798736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.817212][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.885724][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 661.958125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 661.993498][T18733] device veth1_macvtap entered promiscuous mode [ 662.023569][T18788] device sit0 left promiscuous mode [ 662.156316][T18790] device sit0 entered promiscuous mode [ 662.443807][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 662.478028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 662.487321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 662.497287][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 662.507400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 662.732740][T18804] device veth0_vlan left promiscuous mode [ 662.745777][T18804] device veth0_vlan entered promiscuous mode [ 662.760620][T18806] device sit0 left promiscuous mode [ 662.844048][T18808] device sit0 entered promiscuous mode [ 664.505250][T18834] device syzkaller0 entered promiscuous mode [ 664.526978][T18836] device pim6reg1 entered promiscuous mode [ 665.567777][T18860] device veth0_vlan left promiscuous mode [ 665.618653][T18860] device veth0_vlan entered promiscuous mode [ 665.632482][T18863] device sit0 left promiscuous mode [ 665.718224][T18866] device pim6reg1 entered promiscuous mode [ 665.870725][T18872] device macsec0 entered promiscuous mode [ 666.648668][T18913] device syzkaller0 entered promiscuous mode [ 667.395227][T18921] device veth0_vlan left promiscuous mode [ 667.417881][T18921] device veth0_vlan entered promiscuous mode [ 667.428163][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.441164][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.452261][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.594530][T18963] device pim6reg1 entered promiscuous mode [ 668.815038][T18968] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 668.900499][T18972] device syzkaller0 entered promiscuous mode [ 670.697147][T19013] device syzkaller0 entered promiscuous mode [ 672.701784][T19082] device syzkaller0 entered promiscuous mode [ 674.190683][T19139] device syzkaller0 entered promiscuous mode [ 675.489515][T19163] device dummy0 entered promiscuous mode [ 675.752984][T19171] device veth0_to_bond entered promiscuous mode [ 676.323070][T19185] device syzkaller0 entered promiscuous mode [ 676.693783][T19206] device veth1_macvtap left promiscuous mode [ 679.603566][T19240] device syzkaller0 entered promiscuous mode [ 679.963832][T19258] device veth1_macvtap left promiscuous mode [ 681.136927][T19283] device syzkaller0 entered promiscuous mode [ 681.298544][T19288] device syzkaller0 entered promiscuous mode [ 681.840034][T19313] device sit0 entered promiscuous mode [ 682.105612][T19332] device syzkaller0 entered promiscuous mode [ 682.121831][T19334] device veth1_macvtap left promiscuous mode [ 682.131585][T19334] device macsec0 left promiscuous mode [ 683.236856][T19374] device syzkaller0 entered promiscuous mode [ 684.250227][T19441] device veth1_macvtap entered promiscuous mode [ 684.263139][T19449] syz.4.5696[19449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.263222][T19449] syz.4.5696[19449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.264485][T19441] device macsec0 entered promiscuous mode [ 684.351794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 684.381902][T19462] device syzkaller0 entered promiscuous mode [ 684.997794][T19503] device syzkaller0 entered promiscuous mode [ 685.441969][T19513] gretap0: refused to change device tx_queue_len [ 685.512532][T19509] device veth1_macvtap entered promiscuous mode [ 685.546876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 686.103146][T19544] device syzkaller0 entered promiscuous mode [ 686.209989][T19544] FAULT_INJECTION: forcing a failure. [ 686.209989][T19544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 686.270493][T19544] CPU: 0 PID: 19544 Comm: syz.5.5723 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 686.282623][T19544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 686.293353][T19544] Call Trace: [ 686.296750][T19544] [ 686.299797][T19544] __dump_stack+0x21/0x30 [ 686.304245][T19544] dump_stack_lvl+0xee/0x150 [ 686.309805][T19544] ? show_regs_print_info+0x20/0x20 [ 686.315162][T19544] dump_stack+0x15/0x20 [ 686.319597][T19544] should_fail+0x3c1/0x510 [ 686.325001][T19544] should_fail_usercopy+0x1a/0x20 [ 686.330236][T19544] _copy_from_iter+0x21a/0x1050 [ 686.335360][T19544] ? __kernel_text_address+0xa0/0x100 [ 686.340974][T19544] ? copy_mc_pipe_to_iter+0x770/0x770 [ 686.346569][T19544] ? bpf_prog_e6fc920cfeff8120+0x21/0xb04 [ 686.352579][T19544] ? arch_perf_update_userpage+0x3b0/0x3b0 [ 686.360185][T19544] ? _raw_spin_unlock+0x4d/0x70 [ 686.366470][T19544] tun_get_user+0x3dc/0x33c0 [ 686.371283][T19544] ? get_perf_callchain+0x310/0x480 [ 686.376910][T19544] ? tun_do_read+0x1c40/0x1c40 [ 686.382029][T19544] ? kstrtouint_from_user+0x1a0/0x200 [ 686.388056][T19544] ? kstrtol_from_user+0x260/0x260 [ 686.393564][T19544] ? avc_policy_seqno+0x1b/0x70 [ 686.399503][T19544] ? selinux_file_permission+0x2aa/0x510 [ 686.407089][T19544] tun_chr_write_iter+0x1eb/0x2e0 [ 686.413274][T19544] vfs_write+0x802/0xf70 [ 686.418089][T19544] ? file_end_write+0x1b0/0x1b0 [ 686.423618][T19544] ? __fget_files+0x2c4/0x320 [ 686.428926][T19544] ? __fdget_pos+0x1f7/0x380 [ 686.433750][T19544] ? ksys_write+0x71/0x240 [ 686.438867][T19544] ksys_write+0x140/0x240 [ 686.443578][T19544] ? __ia32_sys_read+0x90/0x90 [ 686.449642][T19544] ? debug_smp_processor_id+0x17/0x20 [ 686.455322][T19544] __x64_sys_write+0x7b/0x90 [ 686.460026][T19544] x64_sys_call+0x8ef/0x9a0 [ 686.465078][T19544] do_syscall_64+0x4c/0xa0 [ 686.469637][T19544] ? clear_bhb_loop+0x50/0xa0 [ 686.474921][T19544] ? clear_bhb_loop+0x50/0xa0 [ 686.480250][T19544] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 686.486750][T19544] RIP: 0033:0x7f30ee0f6929 [ 686.491993][T19544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 686.512395][T19544] RSP: 002b:00007f30ec75f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 686.521616][T19544] RAX: ffffffffffffffda RBX: 00007f30ee31dfa0 RCX: 00007f30ee0f6929 [ 686.530407][T19544] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 686.539122][T19544] RBP: 00007f30ec75f090 R08: 0000000000000000 R09: 0000000000000000 [ 686.548959][T19544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 686.557729][T19544] R13: 0000000000000000 R14: 00007f30ee31dfa0 R15: 00007ffe3a6e9828 [ 686.566275][T19544] [ 686.972760][T19575] device pim6reg1 entered promiscuous mode [ 687.700847][T19600] device syzkaller0 entered promiscuous mode [ 687.712986][T19600] FAULT_INJECTION: forcing a failure. [ 687.712986][T19600] name failslab, interval 1, probability 0, space 0, times 0 [ 687.727053][T19600] CPU: 1 PID: 19600 Comm: syz.0.5743 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 687.738659][T19600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 687.750102][T19600] Call Trace: [ 687.753568][T19600] [ 687.756699][T19600] __dump_stack+0x21/0x30 [ 687.761420][T19600] dump_stack_lvl+0xee/0x150 [ 687.766552][T19600] ? show_regs_print_info+0x20/0x20 [ 687.772063][T19600] ? avc_has_perm_noaudit+0x2f4/0x460 [ 687.778119][T19600] dump_stack+0x15/0x20 [ 687.782287][T19600] should_fail+0x3c1/0x510 [ 687.787655][T19600] __should_failslab+0xa4/0xe0 [ 687.792462][T19600] should_failslab+0x9/0x20 [ 687.797705][T19600] slab_pre_alloc_hook+0x3b/0xe0 [ 687.803043][T19600] ? __alloc_skb+0xe0/0x740 [ 687.808141][T19600] kmem_cache_alloc+0x44/0x260 [ 687.814131][T19600] __alloc_skb+0xe0/0x740 [ 687.818710][T19600] alloc_skb_with_frags+0xa8/0x620 [ 687.824133][T19600] sock_alloc_send_pskb+0x853/0x980 [ 687.830121][T19600] ? __kernel_text_address+0xa0/0x100 [ 687.836046][T19600] ? sock_kzfree_s+0x60/0x60 [ 687.841039][T19600] ? iov_iter_advance+0x1f9/0x360 [ 687.846362][T19600] tun_get_user+0x4e6/0x33c0 [ 687.851304][T19600] ? ____kasan_slab_free+0x125/0x160 [ 687.857197][T19600] ? __kasan_poison_object_data+0x30/0x30 [ 687.863543][T19600] ? slab_free_freelist_hook+0xc2/0x190 [ 687.869733][T19600] ? kmem_cache_free+0x100/0x320 [ 687.874914][T19600] ? __x64_sys_openat+0x136/0x160 [ 687.880042][T19600] ? x64_sys_call+0x219/0x9a0 [ 687.885425][T19600] ? tun_do_read+0x1c40/0x1c40 [ 687.890657][T19600] ? kstrtouint_from_user+0x1a0/0x200 [ 687.896154][T19600] ? kstrtol_from_user+0x260/0x260 [ 687.901661][T19600] ? avc_policy_seqno+0x1b/0x70 [ 687.906897][T19600] ? selinux_file_permission+0x2aa/0x510 [ 687.912748][T19600] tun_chr_write_iter+0x1eb/0x2e0 [ 687.918120][T19600] vfs_write+0x802/0xf70 [ 687.922562][T19600] ? file_end_write+0x1b0/0x1b0 [ 687.928299][T19600] ? __fget_files+0x2c4/0x320 [ 687.934352][T19600] ? __fdget_pos+0x1f7/0x380 [ 687.940447][T19600] ? ksys_write+0x71/0x240 [ 687.945493][T19600] ksys_write+0x140/0x240 [ 687.950437][T19600] ? __ia32_sys_read+0x90/0x90 [ 687.956758][T19600] ? debug_smp_processor_id+0x17/0x20 [ 687.963023][T19600] __x64_sys_write+0x7b/0x90 [ 687.969349][T19600] x64_sys_call+0x8ef/0x9a0 [ 687.974392][T19600] do_syscall_64+0x4c/0xa0 [ 687.979442][T19600] ? clear_bhb_loop+0x50/0xa0 [ 687.984538][T19600] ? clear_bhb_loop+0x50/0xa0 [ 687.989774][T19600] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 687.996141][T19600] RIP: 0033:0x7f5017917929 [ 688.000797][T19600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.023066][T19600] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 688.032477][T19600] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 688.040911][T19600] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 688.050326][T19600] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 688.059465][T19600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.068226][T19600] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 688.078516][T19600] [ 688.198981][T19608] device sit0 entered promiscuous mode [ 690.154458][T19658] device syzkaller0 entered promiscuous mode [ 690.850009][T19707] device pim6reg1 entered promiscuous mode [ 691.826002][T19727] device syzkaller0 entered promiscuous mode [ 693.143911][T19756] device syzkaller0 entered promiscuous mode [ 693.166098][T19756] FAULT_INJECTION: forcing a failure. [ 693.166098][T19756] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 693.182407][T19756] CPU: 1 PID: 19756 Comm: syz.3.5792 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 693.195681][T19756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 693.207853][T19756] Call Trace: [ 693.211663][T19756] [ 693.215322][T19756] __dump_stack+0x21/0x30 [ 693.220137][T19756] dump_stack_lvl+0xee/0x150 [ 693.225337][T19756] ? show_regs_print_info+0x20/0x20 [ 693.231113][T19756] ? __kasan_kmalloc+0xec/0x110 [ 693.236287][T19756] ? __kmalloc_track_caller+0x13c/0x2c0 [ 693.242976][T19756] ? __alloc_skb+0x21a/0x740 [ 693.248726][T19756] ? alloc_skb_with_frags+0xa8/0x620 [ 693.255829][T19756] ? tun_get_user+0x4e6/0x33c0 [ 693.262566][T19756] ? tun_chr_write_iter+0x1eb/0x2e0 [ 693.267976][T19756] ? vfs_write+0x802/0xf70 [ 693.273894][T19756] ? ksys_write+0x140/0x240 [ 693.278816][T19756] dump_stack+0x15/0x20 [ 693.283492][T19756] should_fail+0x3c1/0x510 [ 693.288928][T19756] should_fail_alloc_page+0x55/0x80 [ 693.294564][T19756] prepare_alloc_pages+0x156/0x600 [ 693.300282][T19756] ? __alloc_pages_bulk+0xab0/0xab0 [ 693.306455][T19756] __alloc_pages+0x10a/0x440 [ 693.311662][T19756] ? prep_new_page+0x110/0x110 [ 693.317039][T19756] ? __alloc_skb+0x463/0x740 [ 693.323042][T19756] alloc_skb_with_frags+0x20c/0x620 [ 693.329231][T19756] sock_alloc_send_pskb+0x853/0x980 [ 693.335586][T19756] ? __kernel_text_address+0xa0/0x100 [ 693.344528][T19756] ? sock_kzfree_s+0x60/0x60 [ 693.350380][T19756] ? iov_iter_advance+0x1f9/0x360 [ 693.356205][T19756] tun_get_user+0x4e6/0x33c0 [ 693.361740][T19756] ? ____kasan_slab_free+0x125/0x160 [ 693.368180][T19756] ? __kasan_poison_object_data+0x30/0x30 [ 693.376758][T19756] ? slab_free_freelist_hook+0xc2/0x190 [ 693.383769][T19756] ? kmem_cache_free+0x100/0x320 [ 693.389247][T19756] ? __x64_sys_openat+0x136/0x160 [ 693.396367][T19756] ? x64_sys_call+0x219/0x9a0 [ 693.402743][T19756] ? tun_do_read+0x1c40/0x1c40 [ 693.408088][T19756] ? kstrtouint_from_user+0x1a0/0x200 [ 693.413850][T19756] ? kstrtol_from_user+0x260/0x260 [ 693.419985][T19756] ? avc_policy_seqno+0x1b/0x70 [ 693.425144][T19756] ? selinux_file_permission+0x2aa/0x510 [ 693.431849][T19756] tun_chr_write_iter+0x1eb/0x2e0 [ 693.437001][T19756] vfs_write+0x802/0xf70 [ 693.441355][T19756] ? file_end_write+0x1b0/0x1b0 [ 693.446577][T19756] ? __fget_files+0x2c4/0x320 [ 693.451655][T19756] ? __fdget_pos+0x1f7/0x380 [ 693.456448][T19756] ? ksys_write+0x71/0x240 [ 693.461255][T19756] ksys_write+0x140/0x240 [ 693.465969][T19756] ? __ia32_sys_read+0x90/0x90 [ 693.471048][T19756] ? debug_smp_processor_id+0x17/0x20 [ 693.476809][T19756] __x64_sys_write+0x7b/0x90 [ 693.481721][T19756] x64_sys_call+0x8ef/0x9a0 [ 693.486798][T19756] do_syscall_64+0x4c/0xa0 [ 693.494069][T19756] ? clear_bhb_loop+0x50/0xa0 [ 693.499746][T19756] ? clear_bhb_loop+0x50/0xa0 [ 693.505139][T19756] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 693.512909][T19756] RIP: 0033:0x7f0c08781929 [ 693.518420][T19756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 693.542700][T19756] RSP: 002b:00007f0c06dea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 693.553686][T19756] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c08781929 [ 693.563685][T19756] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 693.573114][T19756] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 693.582400][T19756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 693.591042][T19756] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 693.599746][T19756] [ 693.943424][T19768] device syzkaller0 entered promiscuous mode [ 693.964941][T19772] device sit0 left promiscuous mode [ 694.063373][T19784] device pim6reg1 entered promiscuous mode [ 694.092927][T19795] device syzkaller0 entered promiscuous mode [ 694.314862][T19800] device wg2 entered promiscuous mode [ 694.374089][T19806] device syzkaller0 entered promiscuous mode [ 694.400919][T19806] FAULT_INJECTION: forcing a failure. [ 694.400919][T19806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.416542][T19806] CPU: 1 PID: 19806 Comm: syz.5.5808 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 694.428422][T19806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 694.438814][T19806] Call Trace: [ 694.442248][T19806] [ 694.445933][T19806] __dump_stack+0x21/0x30 [ 694.450584][T19806] dump_stack_lvl+0xee/0x150 [ 694.455687][T19806] ? show_regs_print_info+0x20/0x20 [ 694.461026][T19806] ? __kmalloc_track_caller+0x13c/0x2c0 [ 694.466967][T19806] ? alloc_skb_with_frags+0xa8/0x620 [ 694.472315][T19806] ? tun_chr_write_iter+0x1eb/0x2e0 [ 694.477902][T19806] ? vfs_write+0x802/0xf70 [ 694.482451][T19806] dump_stack+0x15/0x20 [ 694.486687][T19806] should_fail+0x3c1/0x510 [ 694.491816][T19806] should_fail_alloc_page+0x55/0x80 [ 694.497178][T19806] prepare_alloc_pages+0x156/0x600 [ 694.502615][T19806] ? __alloc_pages_bulk+0xab0/0xab0 [ 694.508192][T19806] __alloc_pages+0x10a/0x440 [ 694.513064][T19806] ? prep_new_page+0x110/0x110 [ 694.518342][T19806] ? __alloc_skb+0x463/0x740 [ 694.523042][T19806] alloc_skb_with_frags+0x20c/0x620 [ 694.528875][T19806] sock_alloc_send_pskb+0x853/0x980 [ 694.534905][T19806] ? __kernel_text_address+0xa0/0x100 [ 694.541702][T19806] ? sock_kzfree_s+0x60/0x60 [ 694.546534][T19806] ? iov_iter_advance+0x1f9/0x360 [ 694.552101][T19806] tun_get_user+0x4e6/0x33c0 [ 694.557029][T19806] ? ____kasan_slab_free+0x125/0x160 [ 694.562708][T19806] ? __kasan_poison_object_data+0x30/0x30 [ 694.569128][T19806] ? slab_free_freelist_hook+0xc2/0x190 [ 694.575142][T19806] ? kmem_cache_free+0x100/0x320 [ 694.580866][T19806] ? __x64_sys_openat+0x136/0x160 [ 694.586594][T19806] ? x64_sys_call+0x219/0x9a0 [ 694.591406][T19806] ? tun_do_read+0x1c40/0x1c40 [ 694.596550][T19806] ? kstrtouint_from_user+0x1a0/0x200 [ 694.602138][T19806] ? kstrtol_from_user+0x260/0x260 [ 694.607699][T19806] ? avc_policy_seqno+0x1b/0x70 [ 694.612675][T19806] ? selinux_file_permission+0x2aa/0x510 [ 694.618498][T19806] tun_chr_write_iter+0x1eb/0x2e0 [ 694.623976][T19806] vfs_write+0x802/0xf70 [ 694.628442][T19806] ? file_end_write+0x1b0/0x1b0 [ 694.633572][T19806] ? __fget_files+0x2c4/0x320 [ 694.638694][T19806] ? __fdget_pos+0x1f7/0x380 [ 694.643494][T19806] ? ksys_write+0x71/0x240 [ 694.648150][T19806] ksys_write+0x140/0x240 [ 694.652691][T19806] ? __ia32_sys_read+0x90/0x90 [ 694.657575][T19806] ? debug_smp_processor_id+0x17/0x20 [ 694.663151][T19806] __x64_sys_write+0x7b/0x90 [ 694.667786][T19806] x64_sys_call+0x8ef/0x9a0 [ 694.672812][T19806] do_syscall_64+0x4c/0xa0 [ 694.677365][T19806] ? clear_bhb_loop+0x50/0xa0 [ 694.682575][T19806] ? clear_bhb_loop+0x50/0xa0 [ 694.687590][T19806] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 694.693824][T19806] RIP: 0033:0x7f30ee0f6929 [ 694.698262][T19806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 694.718875][T19806] RSP: 002b:00007f30ec75f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 694.728333][T19806] RAX: ffffffffffffffda RBX: 00007f30ee31dfa0 RCX: 00007f30ee0f6929 [ 694.736619][T19806] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 694.746352][T19806] RBP: 00007f30ec75f090 R08: 0000000000000000 R09: 0000000000000000 [ 694.755533][T19806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.764472][T19806] R13: 0000000000000000 R14: 00007f30ee31dfa0 R15: 00007ffe3a6e9828 [ 694.773003][T19806] [ 695.877905][T19870] syz.5.5827[19870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.878047][T19870] syz.5.5827[19870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 697.465189][T19930] device syzkaller0 entered promiscuous mode [ 698.962029][T19988] device syzkaller0 entered promiscuous mode [ 699.303841][T20001] device syzkaller0 entered promiscuous mode [ 699.667700][T20034] FAULT_INJECTION: forcing a failure. [ 699.667700][T20034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.700750][T20034] CPU: 1 PID: 20034 Comm: syz.3.5876 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 699.716615][T20034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 699.727515][T20034] Call Trace: [ 699.731000][T20034] [ 699.734772][T20034] __dump_stack+0x21/0x30 [ 699.739826][T20034] dump_stack_lvl+0xee/0x150 [ 699.744583][T20034] ? show_regs_print_info+0x20/0x20 [ 699.749953][T20034] ? avc_has_perm+0x158/0x240 [ 699.754988][T20034] dump_stack+0x15/0x20 [ 699.759802][T20034] should_fail+0x3c1/0x510 [ 699.765402][T20034] should_fail_alloc_page+0x55/0x80 [ 699.771090][T20034] prepare_alloc_pages+0x156/0x600 [ 699.776559][T20034] ? __alloc_pages_bulk+0xab0/0xab0 [ 699.782446][T20034] ? 0xffffffffa0024000 [ 699.787028][T20034] ? is_bpf_text_address+0x177/0x190 [ 699.793326][T20034] __alloc_pages+0x10a/0x440 [ 699.799148][T20034] ? prep_new_page+0x110/0x110 [ 699.804041][T20034] skb_page_frag_refill+0x202/0x3a0 [ 699.809551][T20034] tun_get_user+0x785/0x33c0 [ 699.814381][T20034] ? __kasan_poison_object_data+0x30/0x30 [ 699.820364][T20034] ? kmem_cache_free+0x100/0x320 [ 699.825433][T20034] ? __x64_sys_openat+0x136/0x160 [ 699.831080][T20034] ? x64_sys_call+0x219/0x9a0 [ 699.837240][T20034] ? tun_do_read+0x1c40/0x1c40 [ 699.842158][T20034] ? kstrtouint_from_user+0x1a0/0x200 [ 699.847760][T20034] ? kstrtol_from_user+0x260/0x260 [ 699.853478][T20034] ? avc_policy_seqno+0x1b/0x70 [ 699.859980][T20034] ? selinux_file_permission+0x2aa/0x510 [ 699.865941][T20034] tun_chr_write_iter+0x1eb/0x2e0 [ 699.872223][T20034] vfs_write+0x802/0xf70 [ 699.878000][T20034] ? file_end_write+0x1b0/0x1b0 [ 699.883179][T20034] ? __fget_files+0x2c4/0x320 [ 699.888009][T20034] ? __fdget_pos+0x1f7/0x380 [ 699.893510][T20034] ? ksys_write+0x71/0x240 [ 699.898227][T20034] ksys_write+0x140/0x240 [ 699.902679][T20034] ? __ia32_sys_read+0x90/0x90 [ 699.908328][T20034] ? debug_smp_processor_id+0x17/0x20 [ 699.914371][T20034] __x64_sys_write+0x7b/0x90 [ 699.919087][T20034] x64_sys_call+0x8ef/0x9a0 [ 699.923773][T20034] do_syscall_64+0x4c/0xa0 [ 699.928575][T20034] ? clear_bhb_loop+0x50/0xa0 [ 699.934323][T20034] ? clear_bhb_loop+0x50/0xa0 [ 699.939213][T20034] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 699.945513][T20034] RIP: 0033:0x7f0c08781929 [ 699.950286][T20034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 699.970887][T20034] RSP: 002b:00007f0c06dea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 699.980215][T20034] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c08781929 [ 699.988208][T20034] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 699.996566][T20034] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 700.005367][T20034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.014191][T20034] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 700.023318][T20034] [ 700.481595][T20066] device sit0 left promiscuous mode [ 700.591951][T20069] device syzkaller0 entered promiscuous mode [ 700.629953][T20066] device sit0 entered promiscuous mode [ 701.050821][T20084] device pim6reg1 entered promiscuous mode [ 701.345937][T20093] FAULT_INJECTION: forcing a failure. [ 701.345937][T20093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.387507][T20093] CPU: 1 PID: 20093 Comm: syz.0.5892 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 701.401784][T20093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 701.412244][T20093] Call Trace: [ 701.415631][T20093] [ 701.418834][T20093] __dump_stack+0x21/0x30 [ 701.423454][T20093] dump_stack_lvl+0xee/0x150 [ 701.428482][T20093] ? show_regs_print_info+0x20/0x20 [ 701.434102][T20093] ? __alloc_pages+0x18f/0x440 [ 701.439626][T20093] dump_stack+0x15/0x20 [ 701.444599][T20093] should_fail+0x3c1/0x510 [ 701.449796][T20093] should_fail_usercopy+0x1a/0x20 [ 701.455469][T20093] copy_page_from_iter+0x2f6/0x680 [ 701.461371][T20093] tun_get_user+0x813/0x33c0 [ 701.466796][T20093] ? __kasan_poison_object_data+0x30/0x30 [ 701.472912][T20093] ? tun_do_read+0x1c40/0x1c40 [ 701.479595][T20093] ? kstrtouint_from_user+0x1a0/0x200 [ 701.485375][T20093] ? kstrtol_from_user+0x260/0x260 [ 701.490975][T20093] ? avc_policy_seqno+0x1b/0x70 [ 701.496358][T20093] ? selinux_file_permission+0x2aa/0x510 [ 701.502383][T20093] tun_chr_write_iter+0x1eb/0x2e0 [ 701.508205][T20093] vfs_write+0x802/0xf70 [ 701.512842][T20093] ? file_end_write+0x1b0/0x1b0 [ 701.518457][T20093] ? __fget_files+0x2c4/0x320 [ 701.523619][T20093] ? __fdget_pos+0x1f7/0x380 [ 701.528643][T20093] ? ksys_write+0x71/0x240 [ 701.533290][T20093] ksys_write+0x140/0x240 [ 701.538415][T20093] ? __ia32_sys_read+0x90/0x90 [ 701.543922][T20093] ? debug_smp_processor_id+0x17/0x20 [ 701.550057][T20093] __x64_sys_write+0x7b/0x90 [ 701.555187][T20093] x64_sys_call+0x8ef/0x9a0 [ 701.560261][T20093] do_syscall_64+0x4c/0xa0 [ 701.565442][T20093] ? clear_bhb_loop+0x50/0xa0 [ 701.570820][T20093] ? clear_bhb_loop+0x50/0xa0 [ 701.576252][T20093] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 701.583436][T20093] RIP: 0033:0x7f5017917929 [ 701.588522][T20093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 701.611436][T20093] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 701.622426][T20093] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 701.630717][T20093] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 701.639297][T20093] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 701.647988][T20093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.656000][T20093] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 701.664595][T20093] [ 701.980700][T20101] device bridge0 entered promiscuous mode [ 702.225900][T20104] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.360854][T20115] device syzkaller0 entered promiscuous mode [ 703.342028][T20127] FAULT_INJECTION: forcing a failure. [ 703.342028][T20127] name failslab, interval 1, probability 0, space 0, times 0 [ 703.464335][T20127] CPU: 1 PID: 20127 Comm: syz.3.5904 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 703.478956][T20127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 703.493347][T20127] Call Trace: [ 703.497601][T20127] [ 703.501536][T20127] __dump_stack+0x21/0x30 [ 703.507346][T20127] dump_stack_lvl+0xee/0x150 [ 703.513451][T20127] ? show_regs_print_info+0x20/0x20 [ 703.520737][T20127] ? __alloc_pages+0x440/0x440 [ 703.526231][T20127] dump_stack+0x15/0x20 [ 703.531125][T20127] should_fail+0x3c1/0x510 [ 703.536316][T20127] __should_failslab+0xa4/0xe0 [ 703.541669][T20127] should_failslab+0x9/0x20 [ 703.546937][T20127] slab_pre_alloc_hook+0x3b/0xe0 [ 703.552508][T20127] ? __build_skb+0x2d/0x310 [ 703.557850][T20127] kmem_cache_alloc+0x44/0x260 [ 703.563287][T20127] __build_skb+0x2d/0x310 [ 703.568091][T20127] build_skb+0x24/0x200 [ 703.573177][T20127] ? tun_get_user+0x85d/0x33c0 [ 703.578757][T20127] tun_get_user+0x879/0x33c0 [ 703.586559][T20127] ? __kasan_poison_object_data+0x30/0x30 [ 703.593049][T20127] ? tun_do_read+0x1c40/0x1c40 [ 703.599792][T20127] ? kstrtouint_from_user+0x1a0/0x200 [ 703.605782][T20127] ? kstrtol_from_user+0x260/0x260 [ 703.611567][T20127] ? putname+0x111/0x160 [ 703.616445][T20127] ? bpf_get_current_uid_gid+0xa7/0xf0 [ 703.622298][T20127] ? avc_policy_seqno+0x1b/0x70 [ 703.627681][T20127] ? selinux_file_permission+0x2aa/0x510 [ 703.633956][T20127] tun_chr_write_iter+0x1eb/0x2e0 [ 703.639472][T20127] vfs_write+0x802/0xf70 [ 703.644110][T20127] ? file_end_write+0x1b0/0x1b0 [ 703.649966][T20127] ? __fget_files+0x2c4/0x320 [ 703.655028][T20127] ? __fdget_pos+0x1f7/0x380 [ 703.660096][T20127] ? ksys_write+0x71/0x240 [ 703.664950][T20127] ksys_write+0x140/0x240 [ 703.669590][T20127] ? __ia32_sys_read+0x90/0x90 [ 703.674511][T20127] ? debug_smp_processor_id+0x17/0x20 [ 703.680401][T20127] __x64_sys_write+0x7b/0x90 [ 703.685283][T20127] x64_sys_call+0x8ef/0x9a0 [ 703.690453][T20127] do_syscall_64+0x4c/0xa0 [ 703.694973][T20127] ? clear_bhb_loop+0x50/0xa0 [ 703.700190][T20127] ? clear_bhb_loop+0x50/0xa0 [ 703.705507][T20127] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 703.711960][T20127] RIP: 0033:0x7f0c08781929 [ 703.716509][T20127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 703.736682][T20127] RSP: 002b:00007f0c06dea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 703.745591][T20127] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c08781929 [ 703.753756][T20127] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 703.762146][T20127] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 703.770889][T20127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.779367][T20127] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 703.787483][T20127] [ 703.855876][T20133] device syzkaller0 entered promiscuous mode [ 704.204529][T20152] device syzkaller0 entered promiscuous mode [ 704.402334][T20163] device veth1_macvtap left promiscuous mode [ 704.434777][T20163] device macsec0 left promiscuous mode [ 704.450333][T20163] device veth1_macvtap entered promiscuous mode [ 704.466234][T20163] device macsec0 entered promiscuous mode [ 704.867941][T20178] FAULT_INJECTION: forcing a failure. [ 704.867941][T20178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 704.956577][T20178] CPU: 1 PID: 20178 Comm: syz.3.5921 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 704.968741][T20178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 704.979744][T20178] Call Trace: [ 704.983315][T20178] [ 704.986397][T20178] __dump_stack+0x21/0x30 [ 704.991317][T20178] dump_stack_lvl+0xee/0x150 [ 704.996429][T20178] ? show_regs_print_info+0x20/0x20 [ 705.001755][T20178] dump_stack+0x15/0x20 [ 705.006050][T20178] should_fail+0x3c1/0x510 [ 705.010687][T20178] should_fail_usercopy+0x1a/0x20 [ 705.015879][T20178] _copy_to_user+0x20/0x90 [ 705.020982][T20178] simple_read_from_buffer+0xe9/0x160 [ 705.026666][T20178] proc_fail_nth_read+0x19a/0x210 [ 705.031911][T20178] ? proc_fault_inject_write+0x2f0/0x2f0 [ 705.037678][T20178] ? security_file_permission+0x83/0xa0 [ 705.043256][T20178] ? proc_fault_inject_write+0x2f0/0x2f0 [ 705.049250][T20178] vfs_read+0x282/0xbe0 [ 705.053605][T20178] ? kernel_read+0x1f0/0x1f0 [ 705.058972][T20178] ? __kasan_check_write+0x14/0x20 [ 705.064483][T20178] ? mutex_lock+0x95/0x1a0 [ 705.069136][T20178] ? wait_for_completion_killable_timeout+0x10/0x10 [ 705.076307][T20178] ? __fget_files+0x2c4/0x320 [ 705.081325][T20178] ? __fdget_pos+0x2d2/0x380 [ 705.087020][T20178] ? ksys_read+0x71/0x240 [ 705.091736][T20178] ksys_read+0x140/0x240 [ 705.096391][T20178] ? vfs_write+0xf70/0xf70 [ 705.101303][T20178] ? debug_smp_processor_id+0x17/0x20 [ 705.107320][T20178] __x64_sys_read+0x7b/0x90 [ 705.112511][T20178] x64_sys_call+0x96d/0x9a0 [ 705.117139][T20178] do_syscall_64+0x4c/0xa0 [ 705.122544][T20178] ? clear_bhb_loop+0x50/0xa0 [ 705.127974][T20178] ? clear_bhb_loop+0x50/0xa0 [ 705.132954][T20178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 705.139566][T20178] RIP: 0033:0x7f0c0878033c [ 705.145265][T20178] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 705.167180][T20178] RSP: 002b:00007f0c06dea030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 705.176167][T20178] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c0878033c [ 705.185290][T20178] RDX: 000000000000000f RSI: 00007f0c06dea0a0 RDI: 0000000000000004 [ 705.193822][T20178] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 705.203739][T20178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.212688][T20178] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 705.222153][T20178] [ 705.701821][T20198] device syzkaller0 entered promiscuous mode [ 707.636935][T20267] device syzkaller0 entered promiscuous mode [ 708.068144][T20281] syz.4.5953[20281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.068229][T20281] syz.4.5953[20281] is installing a program with bpf_probe_write_user helper that may corrupt user memory!ÿ: renamed from bond_slave_0 [ 708.549658][T20305] device syzkaller0 entered promiscuous mode [ 708.593808][T20315] device syzkaller0 entered promiscuous mode [ 708.606487][T20309] FAULT_INJECTION: forcing a failure. [ 708.606487][T20309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.635501][T20309] CPU: 1 PID: 20309 Comm: syz.4.5962 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 708.648135][T20309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 708.661168][T20309] Call Trace: [ 708.664751][T20309] [ 708.668245][T20309] __dump_stack+0x21/0x30 [ 708.673304][T20309] dump_stack_lvl+0xee/0x150 [ 708.678494][T20309] ? show_regs_print_info+0x20/0x20 [ 708.684794][T20309] ? __kmalloc_track_caller+0x13c/0x2c0 [ 708.691402][T20309] ? alloc_skb_with_frags+0xa8/0x620 [ 708.698179][T20309] ? tun_chr_write_iter+0x1eb/0x2e0 [ 708.704164][T20309] ? vfs_write+0x802/0xf70 [ 708.709239][T20309] dump_stack+0x15/0x20 [ 708.714299][T20309] should_fail+0x3c1/0x510 [ 708.719115][T20309] should_fail_alloc_page+0x55/0x80 [ 708.724959][T20309] prepare_alloc_pages+0x156/0x600 [ 708.731178][T20309] ? __alloc_pages_bulk+0xab0/0xab0 [ 708.738364][T20309] __alloc_pages+0x10a/0x440 [ 708.743720][T20309] ? prep_new_page+0x110/0x110 [ 708.748951][T20309] ? __alloc_skb+0x463/0x740 [ 708.753587][T20309] alloc_skb_with_frags+0x20c/0x620 [ 708.759323][T20309] sock_alloc_send_pskb+0x853/0x980 [ 708.766254][T20309] ? __kernel_text_address+0xa0/0x100 [ 708.771958][T20309] ? sock_kzfree_s+0x60/0x60 [ 708.776636][T20309] ? iov_iter_advance+0x1f9/0x360 [ 708.781908][T20309] tun_get_user+0x4e6/0x33c0 [ 708.787439][T20309] ? ____kasan_slab_free+0x125/0x160 [ 708.793152][T20309] ? __kasan_poison_object_data+0x30/0x30 [ 708.800489][T20309] ? tun_do_read+0x1c40/0x1c40 [ 708.806776][T20309] ? kstrtouint_from_user+0x1a0/0x200 [ 708.813444][T20309] ? kstrtol_from_user+0x260/0x260 [ 708.819502][T20309] ? trace_call_bpf+0x361/0x3c0 [ 708.824934][T20309] ? avc_policy_seqno+0x1b/0x70 [ 708.830542][T20309] ? selinux_file_permission+0x2aa/0x510 [ 708.837791][T20309] tun_chr_write_iter+0x1eb/0x2e0 [ 708.843490][T20309] vfs_write+0x802/0xf70 [ 708.847868][T20309] ? file_end_write+0x1b0/0x1b0 [ 708.853552][T20309] ? __fget_files+0x2c4/0x320 [ 708.861857][T20309] ? __fdget_pos+0x1f7/0x380 [ 708.867662][T20309] ? ksys_write+0x71/0x240 [ 708.872297][T20309] ksys_write+0x140/0x240 [ 708.877755][T20309] ? __ia32_sys_read+0x90/0x90 [ 708.882915][T20309] ? debug_smp_processor_id+0x17/0x20 [ 708.889054][T20309] __x64_sys_write+0x7b/0x90 [ 708.894014][T20309] x64_sys_call+0x8ef/0x9a0 [ 708.899145][T20309] do_syscall_64+0x4c/0xa0 [ 708.904749][T20309] ? clear_bhb_loop+0x50/0xa0 [ 708.913033][T20309] ? clear_bhb_loop+0x50/0xa0 [ 708.918457][T20309] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 708.926209][T20309] RIP: 0033:0x7f582a646929 [ 708.931907][T20309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.953364][T20309] RSP: 002b:00007f5828caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 708.962767][T20309] RAX: ffffffffffffffda RBX: 00007f582a86dfa0 RCX: 00007f582a646929 [ 708.971554][T20309] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 708.979637][T20309] RBP: 00007f5828caf090 R08: 0000000000000000 R09: 0000000000000000 [ 708.988620][T20309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.997747][T20309] R13: 0000000000000000 R14: 00007f582a86dfa0 R15: 00007fff6b3bdfe8 [ 709.007153][T20309] [ 709.480297][T20322] FAULT_INJECTION: forcing a failure. [ 709.480297][T20322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 709.495189][T20325] device syzkaller0 entered promiscuous mode [ 709.600676][T20322] CPU: 1 PID: 20322 Comm: syz.4.5964 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 709.612813][T20322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 709.623321][T20322] Call Trace: [ 709.627030][T20322] [ 709.629976][T20322] __dump_stack+0x21/0x30 [ 709.634639][T20322] dump_stack_lvl+0xee/0x150 [ 709.639626][T20322] ? show_regs_print_info+0x20/0x20 [ 709.644940][T20322] dump_stack+0x15/0x20 [ 709.650188][T20322] should_fail+0x3c1/0x510 [ 709.654843][T20322] should_fail_usercopy+0x1a/0x20 [ 709.659990][T20322] _copy_from_user+0x20/0xd0 [ 709.664789][T20322] sock_do_ioctl+0x175/0x300 [ 709.669941][T20322] ? sock_show_fdinfo+0xa0/0xa0 [ 709.675709][T20322] ? selinux_file_ioctl+0x377/0x480 [ 709.681565][T20322] sock_ioctl+0x4bc/0x6b0 [ 709.686504][T20322] ? sock_poll+0x3d0/0x3d0 [ 709.691228][T20322] ? __fget_files+0x2c4/0x320 [ 709.696250][T20322] ? security_file_ioctl+0x84/0xa0 [ 709.701748][T20322] ? sock_poll+0x3d0/0x3d0 [ 709.706272][T20322] __se_sys_ioctl+0x121/0x1a0 [ 709.711188][T20322] __x64_sys_ioctl+0x7b/0x90 [ 709.715994][T20322] x64_sys_call+0x2f/0x9a0 [ 709.720840][T20322] do_syscall_64+0x4c/0xa0 [ 709.726002][T20322] ? clear_bhb_loop+0x50/0xa0 [ 709.730802][T20322] ? clear_bhb_loop+0x50/0xa0 [ 709.736017][T20322] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 709.742522][T20322] RIP: 0033:0x7f582a646929 [ 709.747045][T20322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.768185][T20322] RSP: 002b:00007f5828caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 709.777140][T20322] RAX: ffffffffffffffda RBX: 00007f582a86dfa0 RCX: 00007f582a646929 [ 709.786373][T20322] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 000000000000000c [ 709.794947][T20322] RBP: 00007f5828caf090 R08: 0000000000000000 R09: 0000000000000000 [ 709.803430][T20322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 709.812885][T20322] R13: 0000000000000000 R14: 00007f582a86dfa0 R15: 00007fff6b3bdfe8 [ 709.821858][T20322] [ 709.868482][T20331] Ÿë: port 1(veth0_to_team) entered blocking state [ 709.875583][T20331] Ÿë: port 1(veth0_to_team) entered disabled state [ 709.893404][T20331] device veth0_to_team entered promiscuous mode [ 709.924024][T20332] Ÿë: port 2(ip6gretap0) entered blocking state [ 709.951620][T20332] Ÿë: port 2(ip6gretap0) entered disabled state [ 709.981321][T20332] device ip6gretap0 entered promiscuous mode [ 710.000940][T20337] device sit0 left promiscuous mode [ 710.086856][T20337] device sit0 entered promiscuous mode [ 710.258422][T20358] device syzkaller0 entered promiscuous mode [ 710.286990][T20358] FAULT_INJECTION: forcing a failure. [ 710.286990][T20358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.351257][T20358] CPU: 1 PID: 20358 Comm: syz.0.5975 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 710.366853][T20358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 710.378221][T20358] Call Trace: [ 710.381822][T20358] [ 710.385186][T20358] __dump_stack+0x21/0x30 [ 710.390454][T20358] dump_stack_lvl+0xee/0x150 [ 710.396132][T20358] ? show_regs_print_info+0x20/0x20 [ 710.402936][T20358] ? __kmalloc_track_caller+0x13c/0x2c0 [ 710.409605][T20358] ? alloc_skb_with_frags+0xa8/0x620 [ 710.415812][T20358] ? tun_chr_write_iter+0x1eb/0x2e0 [ 710.421304][T20358] ? vfs_write+0x802/0xf70 [ 710.426210][T20358] dump_stack+0x15/0x20 [ 710.431258][T20358] should_fail+0x3c1/0x510 [ 710.436244][T20358] should_fail_alloc_page+0x55/0x80 [ 710.441847][T20358] prepare_alloc_pages+0x156/0x600 [ 710.447314][T20358] ? __alloc_pages_bulk+0xab0/0xab0 [ 710.453362][T20358] __alloc_pages+0x10a/0x440 [ 710.458431][T20358] ? prep_new_page+0x110/0x110 [ 710.463443][T20358] ? __alloc_skb+0x463/0x740 [ 710.468461][T20358] alloc_skb_with_frags+0x20c/0x620 [ 710.474149][T20358] sock_alloc_send_pskb+0x853/0x980 [ 710.479604][T20358] ? __kernel_text_address+0xa0/0x100 [ 710.485658][T20358] ? sock_kzfree_s+0x60/0x60 [ 710.490390][T20358] ? iov_iter_advance+0x1f9/0x360 [ 710.495544][T20358] tun_get_user+0x4e6/0x33c0 [ 710.500809][T20358] ? ____kasan_slab_free+0x125/0x160 [ 710.506816][T20358] ? __kasan_poison_object_data+0x30/0x30 [ 710.513300][T20358] ? slab_free_freelist_hook+0xc2/0x190 [ 710.519797][T20358] ? kmem_cache_free+0x100/0x320 [ 710.525035][T20358] ? __x64_sys_openat+0x136/0x160 [ 710.531357][T20358] ? x64_sys_call+0x219/0x9a0 [ 710.536616][T20358] ? tun_do_read+0x1c40/0x1c40 [ 710.542160][T20358] ? kstrtouint_from_user+0x1a0/0x200 [ 710.548865][T20358] ? kstrtol_from_user+0x260/0x260 [ 710.554828][T20358] ? perf_trace_mm_migrate_pages+0x398/0x400 [ 710.562606][T20358] ? avc_policy_seqno+0x1b/0x70 [ 710.568103][T20358] ? selinux_file_permission+0x2aa/0x510 [ 710.574982][T20358] tun_chr_write_iter+0x1eb/0x2e0 [ 710.582066][T20358] vfs_write+0x802/0xf70 [ 710.586806][T20358] ? file_end_write+0x1b0/0x1b0 [ 710.591958][T20358] ? __fget_files+0x2c4/0x320 [ 710.597290][T20358] ? __fdget_pos+0x1f7/0x380 [ 710.603092][T20358] ? ksys_write+0x71/0x240 [ 710.608656][T20358] ksys_write+0x140/0x240 [ 710.613439][T20358] ? __ia32_sys_read+0x90/0x90 [ 710.619110][T20358] ? debug_smp_processor_id+0x17/0x20 [ 710.625149][T20358] __x64_sys_write+0x7b/0x90 [ 710.630209][T20358] x64_sys_call+0x8ef/0x9a0 [ 710.635213][T20358] do_syscall_64+0x4c/0xa0 [ 710.640157][T20358] ? clear_bhb_loop+0x50/0xa0 [ 710.644889][T20358] ? clear_bhb_loop+0x50/0xa0 [ 710.649785][T20358] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 710.656207][T20358] RIP: 0033:0x7f5017917929 [ 710.661469][T20358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.682644][T20358] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 710.691839][T20358] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 710.701826][T20358] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 710.710316][T20358] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 710.719429][T20358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 710.728038][T20358] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 710.739250][T20358] [ 710.761056][T20360] device syzkaller0 entered promiscuous mode [ 711.067055][T20370] FAULT_INJECTION: forcing a failure. [ 711.067055][T20370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 711.111950][T20370] CPU: 0 PID: 20370 Comm: syz.4.5979 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 711.124159][T20370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 711.135094][T20370] Call Trace: [ 711.138461][T20370] [ 711.141513][T20370] __dump_stack+0x21/0x30 [ 711.146164][T20370] dump_stack_lvl+0xee/0x150 [ 711.151462][T20370] ? show_regs_print_info+0x20/0x20 [ 711.157233][T20370] ? irqentry_exit+0x37/0x40 [ 711.162120][T20370] dump_stack+0x15/0x20 [ 711.166478][T20370] should_fail+0x3c1/0x510 [ 711.171354][T20370] should_fail_usercopy+0x1a/0x20 [ 711.176706][T20370] _copy_to_user+0x20/0x90 [ 711.181622][T20370] simple_read_from_buffer+0xe9/0x160 [ 711.187655][T20370] proc_fail_nth_read+0x19a/0x210 [ 711.193892][T20370] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 711.201314][T20370] ? proc_fault_inject_write+0x2f0/0x2f0 [ 711.207621][T20370] ? vfs_read+0x26c/0xbe0 [ 711.212388][T20370] ? proc_fault_inject_write+0x2f0/0x2f0 [ 711.219040][T20370] vfs_read+0x282/0xbe0 [ 711.224032][T20370] ? kernel_read+0x1f0/0x1f0 [ 711.230242][T20370] ? __kasan_check_write+0x14/0x20 [ 711.235702][T20370] ? mutex_lock+0x95/0x1a0 [ 711.240527][T20370] ? wait_for_completion_killable_timeout+0x10/0x10 [ 711.247809][T20370] ? __fget_files+0x2c4/0x320 [ 711.253171][T20370] ? __fdget_pos+0x2d2/0x380 [ 711.258043][T20370] ? ksys_read+0x71/0x240 [ 711.264410][T20370] ksys_read+0x140/0x240 [ 711.269611][T20370] ? vfs_write+0xf70/0xf70 [ 711.274579][T20370] __x64_sys_read+0x7b/0x90 [ 711.280053][T20370] x64_sys_call+0x96d/0x9a0 [ 711.285603][T20370] do_syscall_64+0x4c/0xa0 [ 711.290432][T20370] ? clear_bhb_loop+0x50/0xa0 [ 711.295993][T20370] ? clear_bhb_loop+0x50/0xa0 [ 711.301332][T20370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 711.308523][T20370] RIP: 0033:0x7f582a64533c [ 711.312961][T20370] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 711.334528][T20370] RSP: 002b:00007f5828caf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 711.343776][T20370] RAX: ffffffffffffffda RBX: 00007f582a86dfa0 RCX: 00007f582a64533c [ 711.352659][T20370] RDX: 000000000000000f RSI: 00007f5828caf0a0 RDI: 000000000000000d [ 711.361007][T20370] RBP: 00007f5828caf090 R08: 0000000000000000 R09: 0000000000000000 [ 711.370431][T20370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 711.379016][T20370] R13: 0000000000000000 R14: 00007f582a86dfa0 R15: 00007fff6b3bdfe8 [ 711.387655][T20370] [ 714.274399][T20406] device pim6reg1 entered promiscuous mode [ 715.297378][T20426] device syzkaller0 entered promiscuous mode [ 715.380365][T20429] device syzkaller0 entered promiscuous mode [ 715.441269][T20426] FAULT_INJECTION: forcing a failure. [ 715.441269][T20426] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.459026][T20426] CPU: 1 PID: 20426 Comm: syz.0.5995 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 715.470700][T20426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 715.481067][T20426] Call Trace: [ 715.484481][T20426] [ 715.487820][T20426] __dump_stack+0x21/0x30 [ 715.492193][T20426] dump_stack_lvl+0xee/0x150 [ 715.496812][T20426] ? show_regs_print_info+0x20/0x20 [ 715.502043][T20426] ? __kmalloc_track_caller+0x13c/0x2c0 [ 715.507862][T20426] ? alloc_skb_with_frags+0xa8/0x620 [ 715.513217][T20426] ? tun_chr_write_iter+0x1eb/0x2e0 [ 715.518534][T20426] ? vfs_write+0x802/0xf70 [ 715.523080][T20426] dump_stack+0x15/0x20 [ 715.527267][T20426] should_fail+0x3c1/0x510 [ 715.531890][T20426] should_fail_alloc_page+0x55/0x80 [ 715.537206][T20426] prepare_alloc_pages+0x156/0x600 [ 715.542534][T20426] ? __alloc_pages_bulk+0xab0/0xab0 [ 715.548324][T20426] __alloc_pages+0x10a/0x440 [ 715.552954][T20426] ? prep_new_page+0x110/0x110 [ 715.558617][T20426] ? __alloc_skb+0x463/0x740 [ 715.563334][T20426] alloc_skb_with_frags+0x20c/0x620 [ 715.568954][T20426] sock_alloc_send_pskb+0x853/0x980 [ 715.574450][T20426] ? __kernel_text_address+0xa0/0x100 [ 715.580863][T20426] ? sock_kzfree_s+0x60/0x60 [ 715.585972][T20426] ? iov_iter_advance+0x1f9/0x360 [ 715.591091][T20426] tun_get_user+0x4e6/0x33c0 [ 715.595870][T20426] ? ____kasan_slab_free+0x125/0x160 [ 715.601725][T20426] ? __kasan_poison_object_data+0x30/0x30 [ 715.608998][T20426] ? slab_free_freelist_hook+0xc2/0x190 [ 715.614805][T20426] ? kmem_cache_free+0x100/0x320 [ 715.620228][T20426] ? __x64_sys_openat+0x136/0x160 [ 715.625655][T20426] ? x64_sys_call+0x219/0x9a0 [ 715.630823][T20426] ? tun_do_read+0x1c40/0x1c40 [ 715.635934][T20426] ? kstrtouint_from_user+0x1a0/0x200 [ 715.641868][T20426] ? kstrtol_from_user+0x260/0x260 [ 715.647384][T20426] ? avc_policy_seqno+0x1b/0x70 [ 715.653245][T20426] ? selinux_file_permission+0x2aa/0x510 [ 715.659370][T20426] tun_chr_write_iter+0x1eb/0x2e0 [ 715.664854][T20426] vfs_write+0x802/0xf70 [ 715.669299][T20426] ? file_end_write+0x1b0/0x1b0 [ 715.674553][T20426] ? __fget_files+0x2c4/0x320 [ 715.679565][T20426] ? __fdget_pos+0x1f7/0x380 [ 715.684571][T20426] ? ksys_write+0x71/0x240 [ 715.689207][T20426] ksys_write+0x140/0x240 [ 715.694592][T20426] ? __ia32_sys_read+0x90/0x90 [ 715.699398][T20426] ? __bpf_trace_sys_enter+0x62/0x70 [ 715.704985][T20426] __x64_sys_write+0x7b/0x90 [ 715.709882][T20426] x64_sys_call+0x8ef/0x9a0 [ 715.714552][T20426] do_syscall_64+0x4c/0xa0 [ 715.719197][T20426] ? clear_bhb_loop+0x50/0xa0 [ 715.724086][T20426] ? clear_bhb_loop+0x50/0xa0 [ 715.728908][T20426] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 715.735202][T20426] RIP: 0033:0x7f5017917929 [ 715.739853][T20426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 715.760917][T20426] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 715.769997][T20426] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 715.778348][T20426] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 715.786878][T20426] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 715.795686][T20426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.804981][T20426] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 715.814271][T20426] [ 716.147635][T20436] device syzkaller0 entered promiscuous mode [ 716.327583][T20449] device sit0 left promiscuous mode [ 716.452775][T20449] device sit0 entered promiscuous mode [ 717.635102][T20475] device syzkaller0 entered promiscuous mode [ 717.644971][T20475] FAULT_INJECTION: forcing a failure. [ 717.644971][T20475] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.660014][T20475] CPU: 1 PID: 20475 Comm: syz.3.6009 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 717.671891][T20475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 717.682147][T20475] Call Trace: [ 717.686070][T20475] [ 717.689293][T20475] __dump_stack+0x21/0x30 [ 717.693882][T20475] dump_stack_lvl+0xee/0x150 [ 717.698881][T20475] ? show_regs_print_info+0x20/0x20 [ 717.704123][T20475] ? __kmalloc_track_caller+0x13c/0x2c0 [ 717.710185][T20475] ? alloc_skb_with_frags+0xa8/0x620 [ 717.715519][T20475] ? tun_chr_write_iter+0x1eb/0x2e0 [ 717.721366][T20475] ? vfs_write+0x802/0xf70 [ 717.725827][T20475] dump_stack+0x15/0x20 [ 717.730104][T20475] should_fail+0x3c1/0x510 [ 717.734851][T20475] should_fail_alloc_page+0x55/0x80 [ 717.740352][T20475] prepare_alloc_pages+0x156/0x600 [ 717.745879][T20475] ? __alloc_pages_bulk+0xab0/0xab0 [ 717.751276][T20475] __alloc_pages+0x10a/0x440 [ 717.755993][T20475] ? prep_new_page+0x110/0x110 [ 717.760801][T20475] ? __alloc_skb+0x463/0x740 [ 717.765849][T20475] alloc_skb_with_frags+0x20c/0x620 [ 717.771441][T20475] sock_alloc_send_pskb+0x853/0x980 [ 717.776952][T20475] ? __kernel_text_address+0xa0/0x100 [ 717.782373][T20475] ? sock_kzfree_s+0x60/0x60 [ 717.787221][T20475] ? iov_iter_advance+0x1f9/0x360 [ 717.792817][T20475] tun_get_user+0x4e6/0x33c0 [ 717.797995][T20475] ? ____kasan_slab_free+0x125/0x160 [ 717.803609][T20475] ? __kasan_poison_object_data+0x30/0x30 [ 717.810167][T20475] ? slab_free_freelist_hook+0xc2/0x190 [ 717.816292][T20475] ? kmem_cache_free+0x100/0x320 [ 717.821725][T20475] ? __x64_sys_openat+0x136/0x160 [ 717.827169][T20475] ? x64_sys_call+0x219/0x9a0 [ 717.832737][T20475] ? tun_do_read+0x1c40/0x1c40 [ 717.838230][T20475] ? kstrtouint_from_user+0x1a0/0x200 [ 717.843925][T20475] ? kstrtol_from_user+0x260/0x260 [ 717.849439][T20475] ? avc_policy_seqno+0x1b/0x70 [ 717.854502][T20475] ? selinux_file_permission+0x2aa/0x510 [ 717.861080][T20475] tun_chr_write_iter+0x1eb/0x2e0 [ 717.866156][T20475] vfs_write+0x802/0xf70 [ 717.870793][T20475] ? file_end_write+0x1b0/0x1b0 [ 717.876004][T20475] ? __fget_files+0x2c4/0x320 [ 717.880881][T20475] ? __fdget_pos+0x1f7/0x380 [ 717.885622][T20475] ? ksys_write+0x71/0x240 [ 717.890620][T20475] ksys_write+0x140/0x240 [ 717.895157][T20475] ? __ia32_sys_read+0x90/0x90 [ 717.900552][T20475] ? debug_smp_processor_id+0x17/0x20 [ 717.906229][T20475] __x64_sys_write+0x7b/0x90 [ 717.911368][T20475] x64_sys_call+0x8ef/0x9a0 [ 717.916087][T20475] do_syscall_64+0x4c/0xa0 [ 717.920531][T20475] ? clear_bhb_loop+0x50/0xa0 [ 717.925876][T20475] ? clear_bhb_loop+0x50/0xa0 [ 717.931214][T20475] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 717.937323][T20475] RIP: 0033:0x7f0c08781929 [ 717.941987][T20475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 717.962343][T20475] RSP: 002b:00007f0c06dea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 717.971703][T20475] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c08781929 [ 717.980067][T20475] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 717.988654][T20475] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 717.997084][T20475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.006674][T20475] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 718.015135][T20475] [ 718.056545][T20477] device syzkaller0 entered promiscuous mode [ 719.732206][T20530] device syzkaller0 entered promiscuous mode [ 720.997038][T20536] device syzkaller0 entered promiscuous mode [ 721.041032][T20537] FAULT_INJECTION: forcing a failure. [ 721.041032][T20537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 721.115266][T20537] CPU: 1 PID: 20537 Comm: syz.5.6026 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 721.128179][T20537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 721.138658][T20537] Call Trace: [ 721.142193][T20537] [ 721.145246][T20537] __dump_stack+0x21/0x30 [ 721.150105][T20537] dump_stack_lvl+0xee/0x150 [ 721.155085][T20537] ? show_regs_print_info+0x20/0x20 [ 721.161227][T20537] ? __kmalloc_track_caller+0x13c/0x2c0 [ 721.168054][T20537] ? alloc_skb_with_frags+0xa8/0x620 [ 721.173919][T20537] ? tun_chr_write_iter+0x1eb/0x2e0 [ 721.179853][T20537] ? vfs_write+0x802/0xf70 [ 721.184887][T20537] dump_stack+0x15/0x20 [ 721.189537][T20537] should_fail+0x3c1/0x510 [ 721.194197][T20537] should_fail_alloc_page+0x55/0x80 [ 721.200364][T20537] prepare_alloc_pages+0x156/0x600 [ 721.207466][T20537] ? __alloc_pages_bulk+0xab0/0xab0 [ 721.213409][T20537] __alloc_pages+0x10a/0x440 [ 721.218694][T20537] ? prep_new_page+0x110/0x110 [ 721.224417][T20537] ? __alloc_skb+0x463/0x740 [ 721.229915][T20537] alloc_skb_with_frags+0x20c/0x620 [ 721.236123][T20537] sock_alloc_send_pskb+0x853/0x980 [ 721.241835][T20537] ? __kernel_text_address+0xa0/0x100 [ 721.248464][T20537] ? sock_kzfree_s+0x60/0x60 [ 721.253533][T20537] ? iov_iter_advance+0x1f9/0x360 [ 721.259245][T20537] tun_get_user+0x4e6/0x33c0 [ 721.264525][T20537] ? ____kasan_slab_free+0x125/0x160 [ 721.271459][T20537] ? __kasan_poison_object_data+0x30/0x30 [ 721.278001][T20537] ? slab_free_freelist_hook+0xc2/0x190 [ 721.284471][T20537] ? kmem_cache_free+0x100/0x320 [ 721.290267][T20537] ? __x64_sys_openat+0x136/0x160 [ 721.295637][T20537] ? x64_sys_call+0x219/0x9a0 [ 721.300711][T20537] ? tun_do_read+0x1c40/0x1c40 [ 721.306208][T20537] ? kstrtouint_from_user+0x1a0/0x200 [ 721.312176][T20537] ? kstrtol_from_user+0x260/0x260 [ 721.317714][T20537] ? avc_policy_seqno+0x1b/0x70 [ 721.322920][T20537] ? selinux_file_permission+0x2aa/0x510 [ 721.328967][T20537] tun_chr_write_iter+0x1eb/0x2e0 [ 721.334312][T20537] vfs_write+0x802/0xf70 [ 721.339196][T20537] ? file_end_write+0x1b0/0x1b0 [ 721.344977][T20537] ? __fget_files+0x2c4/0x320 [ 721.350079][T20537] ? __fdget_pos+0x1f7/0x380 [ 721.356575][T20537] ? ksys_write+0x71/0x240 [ 721.361324][T20537] ksys_write+0x140/0x240 [ 721.366474][T20537] ? __ia32_sys_read+0x90/0x90 [ 721.371287][T20537] ? debug_smp_processor_id+0x17/0x20 [ 721.377241][T20537] __x64_sys_write+0x7b/0x90 [ 721.382374][T20537] x64_sys_call+0x8ef/0x9a0 [ 721.387220][T20537] do_syscall_64+0x4c/0xa0 [ 721.392261][T20537] ? clear_bhb_loop+0x50/0xa0 [ 721.397383][T20537] ? clear_bhb_loop+0x50/0xa0 [ 721.402371][T20537] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 721.409192][T20537] RIP: 0033:0x7f30ee0f6929 [ 721.414021][T20537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 721.436495][T20537] RSP: 002b:00007f30ec73e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 721.448167][T20537] RAX: ffffffffffffffda RBX: 00007f30ee31e080 RCX: 00007f30ee0f6929 [ 721.457839][T20537] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 721.467736][T20537] RBP: 00007f30ec73e090 R08: 0000000000000000 R09: 0000000000000000 [ 721.477552][T20537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.487422][T20537] R13: 0000000000000000 R14: 00007f30ee31e080 R15: 00007ffe3a6e9828 [ 721.496304][T20537] [ 721.689905][T20545] device sit0 left promiscuous mode [ 721.831283][T20549] device sit0 entered promiscuous mode [ 722.399900][T20569] device syzkaller0 entered promiscuous mode [ 722.648139][T20580] device syzkaller0 entered promiscuous mode [ 722.686638][T20580] FAULT_INJECTION: forcing a failure. [ 722.686638][T20580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.737521][T20580] CPU: 1 PID: 20580 Comm: syz.0.6041 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 722.750622][T20580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 722.762520][T20580] Call Trace: [ 722.766291][T20580] [ 722.770434][T20580] __dump_stack+0x21/0x30 [ 722.774892][T20580] dump_stack_lvl+0xee/0x150 [ 722.780155][T20580] ? show_regs_print_info+0x20/0x20 [ 722.785973][T20580] ? __kmalloc_track_caller+0x13c/0x2c0 [ 722.792042][T20580] ? alloc_skb_with_frags+0xa8/0x620 [ 722.797556][T20580] ? tun_chr_write_iter+0x1eb/0x2e0 [ 722.803181][T20580] ? vfs_write+0x802/0xf70 [ 722.808863][T20580] dump_stack+0x15/0x20 [ 722.814706][T20580] should_fail+0x3c1/0x510 [ 722.819616][T20580] should_fail_alloc_page+0x55/0x80 [ 722.825890][T20580] prepare_alloc_pages+0x156/0x600 [ 722.831631][T20580] ? __alloc_pages_bulk+0xab0/0xab0 [ 722.837764][T20580] __alloc_pages+0x10a/0x440 [ 722.842570][T20580] ? prep_new_page+0x110/0x110 [ 722.848579][T20580] ? __alloc_skb+0x463/0x740 [ 722.853466][T20580] alloc_skb_with_frags+0x20c/0x620 [ 722.859172][T20580] sock_alloc_send_pskb+0x853/0x980 [ 722.865604][T20580] ? __kernel_text_address+0xa0/0x100 [ 722.871562][T20580] ? sock_kzfree_s+0x60/0x60 [ 722.877552][T20580] ? iov_iter_advance+0x1f9/0x360 [ 722.883418][T20580] tun_get_user+0x4e6/0x33c0 [ 722.888423][T20580] ? ____kasan_slab_free+0x125/0x160 [ 722.894295][T20580] ? __kasan_poison_object_data+0x30/0x30 [ 722.900514][T20580] ? slab_free_freelist_hook+0xc2/0x190 [ 722.907230][T20580] ? kmem_cache_free+0x100/0x320 [ 722.912650][T20580] ? __x64_sys_openat+0x136/0x160 [ 722.918940][T20580] ? x64_sys_call+0x219/0x9a0 [ 722.923914][T20580] ? tun_do_read+0x1c40/0x1c40 [ 722.929295][T20580] ? kstrtouint_from_user+0x1a0/0x200 [ 722.936070][T20580] ? kstrtol_from_user+0x260/0x260 [ 722.941957][T20580] ? avc_policy_seqno+0x1b/0x70 [ 722.947690][T20580] ? selinux_file_permission+0x2aa/0x510 [ 722.953718][T20580] tun_chr_write_iter+0x1eb/0x2e0 [ 722.959257][T20580] vfs_write+0x802/0xf70 [ 722.963824][T20580] ? file_end_write+0x1b0/0x1b0 [ 722.969439][T20580] ? __fget_files+0x2c4/0x320 [ 722.974444][T20580] ? __fdget_pos+0x1f7/0x380 [ 722.979584][T20580] ? ksys_write+0x71/0x240 [ 722.984390][T20580] ksys_write+0x140/0x240 [ 722.989077][T20580] ? __ia32_sys_read+0x90/0x90 [ 722.994250][T20580] ? debug_smp_processor_id+0x17/0x20 [ 723.000502][T20580] __x64_sys_write+0x7b/0x90 [ 723.005671][T20580] x64_sys_call+0x8ef/0x9a0 [ 723.010688][T20580] do_syscall_64+0x4c/0xa0 [ 723.015927][T20580] ? clear_bhb_loop+0x50/0xa0 [ 723.021367][T20580] ? clear_bhb_loop+0x50/0xa0 [ 723.026301][T20580] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 723.032825][T20580] RIP: 0033:0x7f5017917929 [ 723.037728][T20580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 723.058872][T20580] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 723.067931][T20580] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 723.077297][T20580] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 723.086351][T20580] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 723.095159][T20580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 723.104162][T20580] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 723.113112][T20580] [ 723.531119][T20615] device syzkaller0 entered promiscuous mode [ 723.785950][T20629] device pim6reg1 entered promiscuous mode [ 724.735287][T20666] device syzkaller0 entered promiscuous mode [ 724.906472][T20668] device pimreg0 entered promiscuous mode [ 725.417230][T20685] device sit0 left promiscuous mode [ 727.033584][T20716] device syzkaller0 entered promiscuous mode [ 727.599236][T20746] device sit0 left promiscuous mode [ 727.810198][T20752] device sit0 entered promiscuous mode [ 728.071785][T20766] device syzkaller0 entered promiscuous mode [ 728.547713][T20739] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.562002][T20739] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.579439][T20739] device bridge_slave_0 entered promiscuous mode [ 728.696955][T20739] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.707512][T20739] bridge0: port 2(bridge_slave_1) entered disabled state [ 728.726409][T20739] device bridge_slave_1 entered promiscuous mode [ 728.941728][T20808] device veth1_macvtap left promiscuous mode [ 729.028781][T20811] device syzkaller0 entered promiscuous mode [ 729.042320][T20739] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.050140][T20739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.058907][T20739] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.066422][T20739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.230223][ T457] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.248635][ T457] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.547475][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.565603][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.696597][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 729.730196][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.809670][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.816990][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.847931][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 729.867924][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 729.876361][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.883648][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.925922][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 729.946455][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 729.967330][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 729.987283][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 730.082352][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 730.095704][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 730.176138][T20739] device veth0_vlan entered promiscuous mode [ 730.184355][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 730.193640][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 730.262042][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 730.308676][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 730.354692][T20739] device veth1_macvtap entered promiscuous mode [ 730.401962][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 730.422183][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 730.435520][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 730.524988][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 730.571105][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 730.608286][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 730.698275][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 730.867003][T20834] device syzkaller0 entered promiscuous mode [ 731.471896][T20866] device syzkaller0 entered promiscuous mode [ 732.265682][T20896] device veth0_vlan left promiscuous mode [ 732.278548][T20896] device veth0_vlan entered promiscuous mode [ 732.657679][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.669826][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.678406][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.811359][T20900] device veth0_vlan left promiscuous mode [ 732.818329][T20900] device veth0_vlan entered promiscuous mode [ 732.828761][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.837661][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.845746][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 733.058843][ T45] GPL: port 1(erspan0) entered disabled state [ 733.066448][ T45] device erspan0 left promiscuous mode [ 733.073030][ T45] GPL: port 1(erspan0) entered disabled state [ 733.361568][ T45] device veth1_macvtap left promiscuous mode [ 735.170027][T20918] device syzkaller0 entered promiscuous mode [ 735.328119][T20932] ref_ctr_offset mismatch. inode: 0x17 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 735.553444][T20934] device sit0 entered promiscuous mode [ 735.859718][T20936] device pim6reg1 entered promiscuous mode [ 735.877342][T20958] device veth1_macvtap left promiscuous mode [ 735.884523][T20958] device macsec0 left promiscuous mode [ 735.960162][T20968] device syzkaller0 entered promiscuous mode [ 736.559806][T20983] device syzkaller0 entered promiscuous mode [ 736.725376][T20994] device pim6reg1 entered promiscuous mode [ 736.871338][T21000] syzkaller0: tun_chr_ioctl cmd 21731 [ 738.548418][T21007] device sit0 left promiscuous mode [ 738.661246][T21012] device pim6reg1 entered promiscuous mode [ 738.728264][T21019] device syzkaller0 entered promiscuous mode [ 738.744627][T21019] FAULT_INJECTION: forcing a failure. [ 738.744627][T21019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 738.781625][T21019] CPU: 0 PID: 21019 Comm: syz.4.6164 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 738.795892][T21019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 738.807710][T21019] Call Trace: [ 738.811194][T21019] [ 738.814338][T21019] __dump_stack+0x21/0x30 [ 738.819334][T21019] dump_stack_lvl+0xee/0x150 [ 738.824483][T21019] ? show_regs_print_info+0x20/0x20 [ 738.830331][T21019] ? __kmalloc_track_caller+0x13c/0x2c0 [ 738.837024][T21019] ? alloc_skb_with_frags+0xa8/0x620 [ 738.843115][T21019] ? tun_chr_write_iter+0x1eb/0x2e0 [ 738.848701][T21019] ? vfs_write+0x802/0xf70 [ 738.853566][T21019] dump_stack+0x15/0x20 [ 738.858743][T21019] should_fail+0x3c1/0x510 [ 738.863459][T21019] should_fail_alloc_page+0x55/0x80 [ 738.869592][T21019] prepare_alloc_pages+0x156/0x600 [ 738.874937][T21019] ? __alloc_pages_bulk+0xab0/0xab0 [ 738.880880][T21019] __alloc_pages+0x10a/0x440 [ 738.885999][T21019] ? prep_new_page+0x110/0x110 [ 738.891736][T21019] ? __alloc_skb+0x463/0x740 [ 738.896903][T21019] alloc_skb_with_frags+0x20c/0x620 [ 738.903230][T21019] sock_alloc_send_pskb+0x853/0x980 [ 738.908905][T21019] ? __kernel_text_address+0xa0/0x100 [ 738.914574][T21019] ? sock_kzfree_s+0x60/0x60 [ 738.919658][T21019] ? iov_iter_advance+0x1f9/0x360 [ 738.925084][T21019] tun_get_user+0x4e6/0x33c0 [ 738.930505][T21019] ? ____kasan_slab_free+0x125/0x160 [ 738.936966][T21019] ? __kasan_poison_object_data+0x30/0x30 [ 738.943830][T21019] ? tun_do_read+0x1c40/0x1c40 [ 738.949502][T21019] ? kstrtouint_from_user+0x1a0/0x200 [ 738.955704][T21019] ? kstrtol_from_user+0x260/0x260 [ 738.962996][T21019] ? __kasan_check_write+0x14/0x20 [ 738.969647][T21019] ? avc_policy_seqno+0x1b/0x70 [ 738.975365][T21019] ? selinux_file_permission+0x2aa/0x510 [ 738.981664][T21019] tun_chr_write_iter+0x1eb/0x2e0 [ 738.987177][T21019] vfs_write+0x802/0xf70 [ 738.991963][T21019] ? file_end_write+0x1b0/0x1b0 [ 738.997541][T21019] ? __fget_files+0x2c4/0x320 [ 739.002650][T21019] ? __fdget_pos+0x1f7/0x380 [ 739.007442][T21019] ? ksys_write+0x71/0x240 [ 739.012067][T21019] ksys_write+0x140/0x240 [ 739.018023][T21019] ? __ia32_sys_read+0x90/0x90 [ 739.023967][T21019] ? debug_smp_processor_id+0x17/0x20 [ 739.029826][T21019] __x64_sys_write+0x7b/0x90 [ 739.034804][T21019] x64_sys_call+0x8ef/0x9a0 [ 739.039653][T21019] do_syscall_64+0x4c/0xa0 [ 739.044781][T21019] ? clear_bhb_loop+0x50/0xa0 [ 739.050100][T21019] ? clear_bhb_loop+0x50/0xa0 [ 739.054912][T21019] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 739.061665][T21019] RIP: 0033:0x7f582a646929 [ 739.066314][T21019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 739.087802][T21019] RSP: 002b:00007f5828caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 739.098711][T21019] RAX: ffffffffffffffda RBX: 00007f582a86dfa0 RCX: 00007f582a646929 [ 739.107342][T21019] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 739.116535][T21019] RBP: 00007f5828caf090 R08: 0000000000000000 R09: 0000000000000000 [ 739.125951][T21019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.134667][T21019] R13: 0000000000000000 R14: 00007f582a86dfa0 R15: 00007fff6b3bdfe8 [ 739.143544][T21019] [ 739.278847][T21028] device sit0 entered promiscuous mode [ 739.583337][T21040] device syzkaller0 entered promiscuous mode [ 739.628155][T21041] device sit0 left promiscuous mode [ 739.910875][T21064] device syzkaller0 entered promiscuous mode [ 739.944458][T21064] FAULT_INJECTION: forcing a failure. [ 739.944458][T21064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.961434][T21064] CPU: 0 PID: 21064 Comm: syz.6.6179 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 739.974424][T21064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 739.986971][T21064] Call Trace: [ 739.990731][T21064] [ 739.993785][T21064] __dump_stack+0x21/0x30 [ 739.999108][T21064] dump_stack_lvl+0xee/0x150 [ 740.005086][T21064] ? show_regs_print_info+0x20/0x20 [ 740.011560][T21064] ? __kmalloc_track_caller+0x13c/0x2c0 [ 740.018335][T21064] ? alloc_skb_with_frags+0xa8/0x620 [ 740.025523][T21064] ? tun_chr_write_iter+0x1eb/0x2e0 [ 740.031192][T21064] ? vfs_write+0x802/0xf70 [ 740.037528][T21064] dump_stack+0x15/0x20 [ 740.042914][T21064] should_fail+0x3c1/0x510 [ 740.047927][T21064] should_fail_alloc_page+0x55/0x80 [ 740.053301][T21064] prepare_alloc_pages+0x156/0x600 [ 740.059366][T21064] ? __alloc_pages_bulk+0xab0/0xab0 [ 740.064984][T21064] __alloc_pages+0x10a/0x440 [ 740.070374][T21064] ? prep_new_page+0x110/0x110 [ 740.076018][T21064] ? __alloc_skb+0x463/0x740 [ 740.081052][T21064] alloc_skb_with_frags+0x20c/0x620 [ 740.087568][T21064] sock_alloc_send_pskb+0x853/0x980 [ 740.093680][T21064] ? __kernel_text_address+0xa0/0x100 [ 740.100226][T21064] ? sock_kzfree_s+0x60/0x60 [ 740.105330][T21064] ? iov_iter_advance+0x1f9/0x360 [ 740.110684][T21064] tun_get_user+0x4e6/0x33c0 [ 740.115714][T21064] ? ____kasan_slab_free+0x125/0x160 [ 740.122515][T21064] ? __kasan_poison_object_data+0x30/0x30 [ 740.129443][T21064] ? memcpy+0x56/0x70 [ 740.134210][T21064] ? tun_do_read+0x1c40/0x1c40 [ 740.140729][T21064] ? kstrtouint_from_user+0x1a0/0x200 [ 740.147422][T21064] ? kstrtol_from_user+0x260/0x260 [ 740.153883][T21064] ? putname+0x111/0x160 [ 740.158616][T21064] ? avc_policy_seqno+0x1b/0x70 [ 740.164414][T21064] ? selinux_file_permission+0x2aa/0x510 [ 740.170747][T21064] tun_chr_write_iter+0x1eb/0x2e0 [ 740.176669][T21064] vfs_write+0x802/0xf70 [ 740.181162][T21064] ? file_end_write+0x1b0/0x1b0 [ 740.186417][T21064] ? __fget_files+0x2c4/0x320 [ 740.191427][T21064] ? __fdget_pos+0x1f7/0x380 [ 740.196439][T21064] ? ksys_write+0x71/0x240 [ 740.202998][T21064] ksys_write+0x140/0x240 [ 740.209908][T21064] ? __ia32_sys_read+0x90/0x90 [ 740.216475][T21064] ? debug_smp_processor_id+0x17/0x20 [ 740.224202][T21064] __x64_sys_write+0x7b/0x90 [ 740.229294][T21064] x64_sys_call+0x8ef/0x9a0 [ 740.234679][T21064] do_syscall_64+0x4c/0xa0 [ 740.239218][T21064] ? clear_bhb_loop+0x50/0xa0 [ 740.244037][T21064] ? clear_bhb_loop+0x50/0xa0 [ 740.249189][T21064] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 740.255324][T21064] RIP: 0033:0x7f4190ec9929 [ 740.260754][T21064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 740.285294][T21064] RSP: 002b:00007f418f532038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 740.294989][T21064] RAX: ffffffffffffffda RBX: 00007f41910f0fa0 RCX: 00007f4190ec9929 [ 740.304420][T21064] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 740.313356][T21064] RBP: 00007f418f532090 R08: 0000000000000000 R09: 0000000000000000 [ 740.323316][T21064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.332742][T21064] R13: 0000000000000000 R14: 00007f41910f0fa0 R15: 00007fffd5562c28 [ 740.344174][T21064] [ 741.150067][T21093] device syzkaller0 entered promiscuous mode [ 741.924958][T21128] device syzkaller0 entered promiscuous mode [ 741.948739][T21128] FAULT_INJECTION: forcing a failure. [ 741.948739][T21128] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 741.977542][T21128] CPU: 0 PID: 21128 Comm: syz.6.6197 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 741.989703][T21128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 742.000702][T21128] Call Trace: [ 742.004092][T21128] [ 742.007328][T21128] __dump_stack+0x21/0x30 [ 742.012132][T21128] dump_stack_lvl+0xee/0x150 [ 742.016744][T21128] ? show_regs_print_info+0x20/0x20 [ 742.022077][T21128] dump_stack+0x15/0x20 [ 742.026743][T21128] should_fail+0x3c1/0x510 [ 742.031464][T21128] should_fail_usercopy+0x1a/0x20 [ 742.036675][T21128] _copy_from_iter+0x21a/0x1050 [ 742.041724][T21128] ? __kasan_check_write+0x14/0x20 [ 742.047402][T21128] ? skb_set_owner_w+0x24d/0x370 [ 742.052387][T21128] ? copy_mc_pipe_to_iter+0x770/0x770 [ 742.058147][T21128] ? __kernel_text_address+0xa0/0x100 [ 742.063546][T21128] ? check_stack_object+0x81/0x140 [ 742.068769][T21128] ? __check_object_size+0x2f4/0x3c0 [ 742.074156][T21128] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 742.080182][T21128] ? iov_iter_advance+0x1f9/0x360 [ 742.085589][T21128] ? skb_put+0x10e/0x1f0 [ 742.090197][T21128] tun_get_user+0xc3c/0x33c0 [ 742.095095][T21128] ? ____kasan_slab_free+0x125/0x160 [ 742.100595][T21128] ? __kasan_poison_object_data+0x30/0x30 [ 742.106343][T21128] ? memcpy+0x56/0x70 [ 742.110613][T21128] ? tun_do_read+0x1c40/0x1c40 [ 742.115838][T21128] ? kstrtouint_from_user+0x1a0/0x200 [ 742.121675][T21128] ? kstrtol_from_user+0x260/0x260 [ 742.127058][T21128] ? putname+0x111/0x160 [ 742.131517][T21128] ? avc_policy_seqno+0x1b/0x70 [ 742.136507][T21128] ? selinux_file_permission+0x2aa/0x510 [ 742.142459][T21128] tun_chr_write_iter+0x1eb/0x2e0 [ 742.147899][T21128] vfs_write+0x802/0xf70 [ 742.152178][T21128] ? file_end_write+0x1b0/0x1b0 [ 742.157159][T21128] ? __fget_files+0x2c4/0x320 [ 742.162208][T21128] ? __fdget_pos+0x1f7/0x380 [ 742.166918][T21128] ? ksys_write+0x71/0x240 [ 742.172061][T21128] ksys_write+0x140/0x240 [ 742.176676][T21128] ? __ia32_sys_read+0x90/0x90 [ 742.181900][T21128] ? debug_smp_processor_id+0x17/0x20 [ 742.187371][T21128] __x64_sys_write+0x7b/0x90 [ 742.192153][T21128] x64_sys_call+0x8ef/0x9a0 [ 742.197238][T21128] do_syscall_64+0x4c/0xa0 [ 742.201875][T21128] ? clear_bhb_loop+0x50/0xa0 [ 742.206586][T21128] ? clear_bhb_loop+0x50/0xa0 [ 742.211404][T21128] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 742.217325][T21128] RIP: 0033:0x7f4190ec9929 [ 742.222094][T21128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 742.243240][T21128] RSP: 002b:00007f418f532038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 742.252291][T21128] RAX: ffffffffffffffda RBX: 00007f41910f0fa0 RCX: 00007f4190ec9929 [ 742.260474][T21128] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 742.268656][T21128] RBP: 00007f418f532090 R08: 0000000000000000 R09: 0000000000000000 [ 742.276929][T21128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 742.285408][T21128] R13: 0000000000000000 R14: 00007f41910f0fa0 R15: 00007fffd5562c28 [ 742.294025][T21128] [ 742.363400][T21140] device syzkaller0 entered promiscuous mode [ 742.795111][T21159] device sit0 entered promiscuous mode [ 743.049186][T21173] device syzkaller0 entered promiscuous mode [ 744.050472][T21191] device syzkaller0 entered promiscuous mode [ 744.057935][T21196] device macsec0 entered promiscuous mode [ 744.082254][T21191] FAULT_INJECTION: forcing a failure. [ 744.082254][T21191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 744.167601][T21191] CPU: 0 PID: 21191 Comm: syz.4.6216 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 744.181110][T21191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 744.191842][T21191] Call Trace: [ 744.195977][T21191] [ 744.199394][T21191] __dump_stack+0x21/0x30 [ 744.204377][T21191] dump_stack_lvl+0xee/0x150 [ 744.210356][T21191] ? show_regs_print_info+0x20/0x20 [ 744.215950][T21191] ? _copy_from_iter+0x2e2/0x1050 [ 744.222298][T21191] ? __kasan_check_write+0x14/0x20 [ 744.227817][T21191] dump_stack+0x15/0x20 [ 744.232465][T21191] should_fail+0x3c1/0x510 [ 744.238500][T21191] should_fail_usercopy+0x1a/0x20 [ 744.244961][T21191] copy_page_from_iter+0x2f6/0x680 [ 744.251020][T21191] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 744.257427][T21191] tun_get_user+0xc3c/0x33c0 [ 744.262373][T21191] ? ____kasan_slab_free+0x125/0x160 [ 744.270328][T21191] ? __kasan_poison_object_data+0x30/0x30 [ 744.278193][T21191] ? slab_free_freelist_hook+0xc2/0x190 [ 744.284094][T21191] ? kmem_cache_free+0x100/0x320 [ 744.289238][T21191] ? __x64_sys_openat+0x136/0x160 [ 744.295054][T21191] ? x64_sys_call+0x219/0x9a0 [ 744.300559][T21191] ? tun_do_read+0x1c40/0x1c40 [ 744.305788][T21191] ? kstrtouint_from_user+0x1a0/0x200 [ 744.311787][T21191] ? kstrtol_from_user+0x260/0x260 [ 744.317922][T21191] ? avc_policy_seqno+0x1b/0x70 [ 744.323155][T21191] ? selinux_file_permission+0x2aa/0x510 [ 744.331809][T21191] tun_chr_write_iter+0x1eb/0x2e0 [ 744.338260][T21191] vfs_write+0x802/0xf70 [ 744.342726][T21191] ? file_end_write+0x1b0/0x1b0 [ 744.348314][T21191] ? __fget_files+0x2c4/0x320 [ 744.353831][T21191] ? __fdget_pos+0x1f7/0x380 [ 744.359481][T21191] ? ksys_write+0x71/0x240 [ 744.365035][T21191] ksys_write+0x140/0x240 [ 744.370114][T21191] ? __ia32_sys_read+0x90/0x90 [ 744.375573][T21191] ? debug_smp_processor_id+0x17/0x20 [ 744.381078][T21191] __x64_sys_write+0x7b/0x90 [ 744.386583][T21191] x64_sys_call+0x8ef/0x9a0 [ 744.392122][T21191] do_syscall_64+0x4c/0xa0 [ 744.397385][T21191] ? clear_bhb_loop+0x50/0xa0 [ 744.403060][T21191] ? clear_bhb_loop+0x50/0xa0 [ 744.408395][T21191] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 744.415027][T21191] RIP: 0033:0x7f582a646929 [ 744.420263][T21191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 744.442807][T21191] RSP: 002b:00007f5828caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 744.453066][T21191] RAX: ffffffffffffffda RBX: 00007f582a86dfa0 RCX: 00007f582a646929 [ 744.462079][T21191] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 744.471142][T21191] RBP: 00007f5828caf090 R08: 0000000000000000 R09: 0000000000000000 [ 744.480560][T21191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 744.490334][T21191] R13: 0000000000000000 R14: 00007f582a86dfa0 R15: 00007fff6b3bdfe8 [ 744.498679][T21191] [ 744.623470][T21218] device macsec0 left promiscuous mode [ 744.709077][T21218] device veth1_macvtap entered promiscuous mode [ 744.715805][T21218] device macsec0 entered promiscuous mode [ 744.763870][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 744.806081][T21224] device veth1_macvtap entered promiscuous mode [ 744.828958][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 744.858419][T21234] device syzkaller0 entered promiscuous mode [ 744.867868][T21238] device wg2 left promiscuous mode [ 744.883829][T21242] device wg2 entered promiscuous mode [ 745.162589][T21261] device syzkaller0 entered promiscuous mode [ 745.187180][T21261] FAULT_INJECTION: forcing a failure. [ 745.187180][T21261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.225017][T21261] CPU: 1 PID: 21261 Comm: syz.3.6239 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 745.239179][T21261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 745.250879][T21261] Call Trace: [ 745.254480][T21261] [ 745.257950][T21261] __dump_stack+0x21/0x30 [ 745.262681][T21261] dump_stack_lvl+0xee/0x150 [ 745.268391][T21261] ? show_regs_print_info+0x20/0x20 [ 745.274419][T21261] ? _copy_from_iter+0x2e2/0x1050 [ 745.281805][T21261] ? __kasan_check_write+0x14/0x20 [ 745.287524][T21261] dump_stack+0x15/0x20 [ 745.292080][T21261] should_fail+0x3c1/0x510 [ 745.297899][T21261] should_fail_usercopy+0x1a/0x20 [ 745.303840][T21261] copy_page_from_iter+0x2f6/0x680 [ 745.309625][T21261] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 745.316324][T21261] tun_get_user+0xc3c/0x33c0 [ 745.321050][T21261] ? exc_page_fault+0x5e/0xb0 [ 745.326773][T21261] ? asm_exc_page_fault+0x27/0x30 [ 745.332447][T21261] ? tun_do_read+0x1c40/0x1c40 [ 745.337441][T21261] ? kstrtouint_from_user+0x1a0/0x200 [ 745.344384][T21261] ? kstrtol_from_user+0x260/0x260 [ 745.350838][T21261] ? avc_policy_seqno+0x1b/0x70 [ 745.356117][T21261] ? selinux_file_permission+0x2aa/0x510 [ 745.362877][T21261] tun_chr_write_iter+0x1eb/0x2e0 [ 745.369287][T21261] vfs_write+0x802/0xf70 [ 745.374218][T21261] ? file_end_write+0x1b0/0x1b0 [ 745.380087][T21261] ? __fget_files+0x2c4/0x320 [ 745.385091][T21261] ? __fdget_pos+0x1f7/0x380 [ 745.390014][T21261] ? ksys_write+0x71/0x240 [ 745.394839][T21261] ksys_write+0x140/0x240 [ 745.400078][T21261] ? __ia32_sys_read+0x90/0x90 [ 745.406262][T21261] ? debug_smp_processor_id+0x17/0x20 [ 745.412126][T21261] __x64_sys_write+0x7b/0x90 [ 745.419174][T21261] x64_sys_call+0x8ef/0x9a0 [ 745.424312][T21261] do_syscall_64+0x4c/0xa0 [ 745.429047][T21261] ? clear_bhb_loop+0x50/0xa0 [ 745.434286][T21261] ? clear_bhb_loop+0x50/0xa0 [ 745.439515][T21261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 745.445805][T21261] RIP: 0033:0x7f0c08781929 [ 745.450495][T21261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 745.471556][T21261] RSP: 002b:00007f0c06dea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 745.480431][T21261] RAX: ffffffffffffffda RBX: 00007f0c089a8fa0 RCX: 00007f0c08781929 [ 745.488535][T21261] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 745.497093][T21261] RBP: 00007f0c06dea090 R08: 0000000000000000 R09: 0000000000000000 [ 745.505431][T21261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 745.514678][T21261] R13: 0000000000000000 R14: 00007f0c089a8fa0 R15: 00007ffdd3830218 [ 745.523327][T21261] [ 746.248576][T21311] device syzkaller0 entered promiscuous mode [ 746.317985][T21313] device sit0 left promiscuous mode [ 746.546745][T21317] device sit0 entered promiscuous mode [ 746.765961][T21330] device syzkaller0 entered promiscuous mode [ 746.810824][T21330] FAULT_INJECTION: forcing a failure. [ 746.810824][T21330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 746.842521][T21327] device macsec0 entered promiscuous mode [ 746.859100][T21330] CPU: 0 PID: 21330 Comm: syz.5.6258 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 746.871342][T21330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 746.882218][T21330] Call Trace: [ 746.886334][T21330] [ 746.889288][T21330] __dump_stack+0x21/0x30 [ 746.894233][T21330] dump_stack_lvl+0xee/0x150 [ 746.899337][T21330] ? show_regs_print_info+0x20/0x20 [ 746.905283][T21330] ? _copy_from_iter+0x2e2/0x1050 [ 746.910924][T21330] ? __kasan_check_write+0x14/0x20 [ 746.916065][T21330] dump_stack+0x15/0x20 [ 746.920723][T21330] should_fail+0x3c1/0x510 [ 746.925158][T21330] should_fail_usercopy+0x1a/0x20 [ 746.930451][T21330] copy_page_from_iter+0x2f6/0x680 [ 746.935860][T21330] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 746.942283][T21330] tun_get_user+0xc3c/0x33c0 [ 746.947196][T21330] ? ____kasan_slab_free+0x125/0x160 [ 746.952681][T21330] ? __kasan_poison_object_data+0x30/0x30 [ 746.959161][T21330] ? slab_free_freelist_hook+0xc2/0x190 [ 746.965140][T21330] ? kmem_cache_free+0x100/0x320 [ 746.971224][T21330] ? __x64_sys_openat+0x136/0x160 [ 746.976720][T21330] ? x64_sys_call+0x219/0x9a0 [ 746.982473][T21330] ? tun_do_read+0x1c40/0x1c40 [ 746.987569][T21330] ? kstrtouint_from_user+0x1a0/0x200 [ 746.993668][T21330] ? kstrtol_from_user+0x260/0x260 [ 746.999231][T21330] ? avc_policy_seqno+0x1b/0x70 [ 747.004543][T21330] ? selinux_file_permission+0x2aa/0x510 [ 747.011369][T21330] tun_chr_write_iter+0x1eb/0x2e0 [ 747.017757][T21330] vfs_write+0x802/0xf70 [ 747.022673][T21330] ? file_end_write+0x1b0/0x1b0 [ 747.028332][T21330] ? __fget_files+0x2c4/0x320 [ 747.033626][T21330] ? __fdget_pos+0x1f7/0x380 [ 747.038815][T21330] ? ksys_write+0x71/0x240 [ 747.044711][T21330] ksys_write+0x140/0x240 [ 747.049436][T21330] ? __ia32_sys_read+0x90/0x90 [ 747.054483][T21330] ? debug_smp_processor_id+0x17/0x20 [ 747.060189][T21330] __x64_sys_write+0x7b/0x90 [ 747.064974][T21330] x64_sys_call+0x8ef/0x9a0 [ 747.069499][T21330] do_syscall_64+0x4c/0xa0 [ 747.074056][T21330] ? clear_bhb_loop+0x50/0xa0 [ 747.078783][T21330] ? clear_bhb_loop+0x50/0xa0 [ 747.083562][T21330] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 747.089960][T21330] RIP: 0033:0x7f30ee0f6929 [ 747.094388][T21330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 747.114344][T21330] RSP: 002b:00007f30ec75f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 747.122946][T21330] RAX: ffffffffffffffda RBX: 00007f30ee31dfa0 RCX: 00007f30ee0f6929 [ 747.131580][T21330] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 747.140392][T21330] RBP: 00007f30ec75f090 R08: 0000000000000000 R09: 0000000000000000 [ 747.148912][T21330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 747.157356][T21330] R13: 0000000000000000 R14: 00007f30ee31dfa0 R15: 00007ffe3a6e9828 [ 747.166384][T21330] [ 747.509458][T21359] device syzkaller0 entered promiscuous mode [ 747.715251][T21373] device syzkaller0 entered promiscuous mode [ 748.317256][T21393] device syzkaller0 entered promiscuous mode [ 748.350119][T21393] FAULT_INJECTION: forcing a failure. [ 748.350119][T21393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 748.387729][T21393] CPU: 1 PID: 21393 Comm: syz.0.6276 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 748.400095][T21393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 748.410877][T21393] Call Trace: [ 748.414276][T21393] [ 748.417414][T21393] __dump_stack+0x21/0x30 [ 748.422356][T21393] dump_stack_lvl+0xee/0x150 [ 748.427155][T21393] ? show_regs_print_info+0x20/0x20 [ 748.432390][T21393] ? asm_exc_page_fault+0x27/0x30 [ 748.437834][T21393] dump_stack+0x15/0x20 [ 748.442215][T21393] should_fail+0x3c1/0x510 [ 748.446844][T21393] should_fail_usercopy+0x1a/0x20 [ 748.452084][T21393] copy_page_from_iter+0x2f6/0x680 [ 748.458117][T21393] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 748.464112][T21393] tun_get_user+0xc3c/0x33c0 [ 748.469241][T21393] ? ____kasan_slab_free+0x125/0x160 [ 748.475138][T21393] ? __kasan_poison_object_data+0x30/0x30 [ 748.481104][T21393] ? slab_free_freelist_hook+0xc2/0x190 [ 748.487959][T21393] ? kmem_cache_free+0x100/0x320 [ 748.492946][T21393] ? __x64_sys_openat+0x136/0x160 [ 748.498073][T21393] ? x64_sys_call+0x219/0x9a0 [ 748.502786][T21393] ? tun_do_read+0x1c40/0x1c40 [ 748.507557][T21393] ? kstrtouint_from_user+0x1a0/0x200 [ 748.513174][T21393] ? kstrtol_from_user+0x260/0x260 [ 748.518583][T21393] ? avc_policy_seqno+0x1b/0x70 [ 748.523863][T21393] ? selinux_file_permission+0x2aa/0x510 [ 748.530388][T21393] tun_chr_write_iter+0x1eb/0x2e0 [ 748.536213][T21393] vfs_write+0x802/0xf70 [ 748.540919][T21393] ? file_end_write+0x1b0/0x1b0 [ 748.545972][T21393] ? __fget_files+0x2c4/0x320 [ 748.550946][T21393] ? __fdget_pos+0x1f7/0x380 [ 748.555850][T21393] ? ksys_write+0x71/0x240 [ 748.560944][T21393] ksys_write+0x140/0x240 [ 748.565846][T21393] ? __ia32_sys_read+0x90/0x90 [ 748.570901][T21393] ? debug_smp_processor_id+0x17/0x20 [ 748.577415][T21393] __x64_sys_write+0x7b/0x90 [ 748.582929][T21393] x64_sys_call+0x8ef/0x9a0 [ 748.588021][T21393] do_syscall_64+0x4c/0xa0 [ 748.592667][T21393] ? clear_bhb_loop+0x50/0xa0 [ 748.598622][T21393] ? clear_bhb_loop+0x50/0xa0 [ 748.603635][T21393] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 748.610672][T21393] RIP: 0033:0x7f5017917929 [ 748.617084][T21393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 748.639329][T21393] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 748.650836][T21393] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 748.660859][T21393] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 748.669067][T21393] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 748.678119][T21393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.687834][T21393] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 748.696742][T21393] [ 748.763051][T21400] device veth0_vlan left promiscuous mode [ 748.795930][T21400] device veth0_vlan entered promiscuous mode [ 748.874687][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 748.887201][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 748.895943][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 748.957720][T21425] device syzkaller0 entered promiscuous mode [ 748.997594][T21428] device sit0 left promiscuous mode [ 749.061165][T21428] device sit0 entered promiscuous mode [ 749.317750][T21435] device syzkaller0 entered promiscuous mode [ 749.368140][T21442] device veth1_macvtap entered promiscuous mode [ 749.385733][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 749.416138][T21443] bond_slave_1: mtu less than device minimum [ 749.816027][T21465] device syzkaller0 entered promiscuous mode [ 749.855153][T21465] FAULT_INJECTION: forcing a failure. [ 749.855153][T21465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.893677][T21465] CPU: 1 PID: 21465 Comm: syz.6.6296 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 749.908444][T21465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 749.920134][T21465] Call Trace: [ 749.924421][T21465] [ 749.927635][T21465] __dump_stack+0x21/0x30 [ 749.933240][T21465] dump_stack_lvl+0xee/0x150 [ 749.942935][T21465] ? show_regs_print_info+0x20/0x20 [ 749.950831][T21465] ? asm_exc_page_fault+0x27/0x30 [ 749.958484][T21465] dump_stack+0x15/0x20 [ 749.963726][T21465] should_fail+0x3c1/0x510 [ 749.968604][T21465] should_fail_usercopy+0x1a/0x20 [ 749.978681][T21465] copy_page_from_iter+0x2f6/0x680 [ 749.984651][T21465] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 749.991706][T21465] tun_get_user+0xc3c/0x33c0 [ 749.996668][T21465] ? ____kasan_slab_free+0x125/0x160 [ 750.009158][T21465] ? __kasan_poison_object_data+0x30/0x30 [ 750.015982][T21465] ? slab_free_freelist_hook+0xc2/0x190 [ 750.023361][T21465] ? kmem_cache_free+0x100/0x320 [ 750.028972][T21465] ? __x64_sys_openat+0x136/0x160 [ 750.035791][T21465] ? x64_sys_call+0x219/0x9a0 [ 750.040868][T21465] ? tun_do_read+0x1c40/0x1c40 [ 750.046291][T21465] ? kstrtouint_from_user+0x1a0/0x200 [ 750.053347][T21465] ? kstrtol_from_user+0x260/0x260 [ 750.059566][T21465] ? avc_policy_seqno+0x1b/0x70 [ 750.066334][T21465] ? selinux_file_permission+0x2aa/0x510 [ 750.072963][T21465] tun_chr_write_iter+0x1eb/0x2e0 [ 750.079404][T21465] vfs_write+0x802/0xf70 [ 750.085673][T21465] ? file_end_write+0x1b0/0x1b0 [ 750.091035][T21465] ? __fget_files+0x2c4/0x320 [ 750.098130][T21465] ? __fdget_pos+0x1f7/0x380 [ 750.104910][T21465] ? ksys_write+0x71/0x240 [ 750.110124][T21465] ksys_write+0x140/0x240 [ 750.115445][T21465] ? __ia32_sys_read+0x90/0x90 [ 750.120445][T21465] ? debug_smp_processor_id+0x17/0x20 [ 750.126539][T21465] __x64_sys_write+0x7b/0x90 [ 750.132379][T21465] x64_sys_call+0x8ef/0x9a0 [ 750.138541][T21465] do_syscall_64+0x4c/0xa0 [ 750.144751][T21465] ? clear_bhb_loop+0x50/0xa0 [ 750.150027][T21465] ? clear_bhb_loop+0x50/0xa0 [ 750.155436][T21465] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 750.164409][T21465] RIP: 0033:0x7f4190ec9929 [ 750.169908][T21465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 750.199583][T21465] RSP: 002b:00007f418f532038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 750.211095][T21465] RAX: ffffffffffffffda RBX: 00007f41910f0fa0 RCX: 00007f4190ec9929 [ 750.222063][T21465] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 750.233705][T21465] RBP: 00007f418f532090 R08: 0000000000000000 R09: 0000000000000000 [ 750.243455][T21465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 750.253177][T21465] R13: 0000000000000000 R14: 00007f41910f0fa0 R15: 00007fffd5562c28 [ 750.266043][T21465] [ 750.339523][T21477] device syzkaller0 entered promiscuous mode [ 750.348063][T21481] bond_slave_1: mtu less than device minimum [ 750.752236][T21521] device syzkaller0 entered promiscuous mode [ 750.776647][T21521] FAULT_INJECTION: forcing a failure. [ 750.776647][T21521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 750.821387][T21521] CPU: 0 PID: 21521 Comm: syz.0.6312 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 750.834472][T21521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 750.846414][T21521] Call Trace: [ 750.850088][T21521] [ 750.853273][T21521] __dump_stack+0x21/0x30 [ 750.858717][T21521] dump_stack_lvl+0xee/0x150 [ 750.863865][T21521] ? show_regs_print_info+0x20/0x20 [ 750.869690][T21521] ? asm_exc_page_fault+0x27/0x30 [ 750.875078][T21521] dump_stack+0x15/0x20 [ 750.879702][T21521] should_fail+0x3c1/0x510 [ 750.884801][T21521] should_fail_usercopy+0x1a/0x20 [ 750.891115][T21521] copy_page_from_iter+0x2f6/0x680 [ 750.896977][T21521] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 750.903747][T21521] tun_get_user+0xc3c/0x33c0 [ 750.909912][T21521] ? ____kasan_slab_free+0x125/0x160 [ 750.917674][T21521] ? __kasan_poison_object_data+0x30/0x30 [ 750.924044][T21521] ? slab_free_freelist_hook+0xc2/0x190 [ 750.930270][T21521] ? kmem_cache_free+0x100/0x320 [ 750.937073][T21521] ? __x64_sys_openat+0x136/0x160 [ 750.945080][T21521] ? x64_sys_call+0x219/0x9a0 [ 750.950134][T21521] ? tun_do_read+0x1c40/0x1c40 [ 750.955385][T21521] ? kstrtouint_from_user+0x1a0/0x200 [ 750.961621][T21521] ? kstrtol_from_user+0x260/0x260 [ 750.967057][T21521] ? avc_policy_seqno+0x1b/0x70 [ 750.972404][T21521] ? selinux_file_permission+0x2aa/0x510 [ 750.979889][T21521] tun_chr_write_iter+0x1eb/0x2e0 [ 750.986343][T21521] vfs_write+0x802/0xf70 [ 750.991025][T21521] ? file_end_write+0x1b0/0x1b0 [ 750.996852][T21521] ? __fget_files+0x2c4/0x320 [ 751.002425][T21521] ? __fdget_pos+0x1f7/0x380 [ 751.007708][T21521] ? ksys_write+0x71/0x240 [ 751.012622][T21521] ksys_write+0x140/0x240 [ 751.017258][T21521] ? __ia32_sys_read+0x90/0x90 [ 751.023027][T21521] ? debug_smp_processor_id+0x17/0x20 [ 751.030122][T21521] __x64_sys_write+0x7b/0x90 [ 751.035451][T21521] x64_sys_call+0x8ef/0x9a0 [ 751.040342][T21521] do_syscall_64+0x4c/0xa0 [ 751.045172][T21521] ? clear_bhb_loop+0x50/0xa0 [ 751.050538][T21521] ? clear_bhb_loop+0x50/0xa0 [ 751.055851][T21521] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 751.062295][T21521] RIP: 0033:0x7f5017917929 [ 751.067101][T21521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 751.088937][T21521] RSP: 002b:00007f5015f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 751.098157][T21521] RAX: ffffffffffffffda RBX: 00007f5017b3efa0 RCX: 00007f5017917929 [ 751.106944][T21521] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000006 [ 751.115644][T21521] RBP: 00007f5015f80090 R08: 0000000000000000 R09: 0000000000000000 [ 751.124181][T21521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 751.132535][T21521] R13: 0000000000000000 R14: 00007f5017b3efa0 R15: 00007ffd35aa9fa8 [ 751.140966][T21521] [ 751.149763][T21524] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 752.269486][T21568] device syzkaller0 entered promiscuous mode [ 752.339190][T21587] device syzkaller0 entered promiscuous mode [ 752.392839][T21606] device syzkaller0 entered promiscuous mode [ 752.793503][T21620] device veth0_vlan left promiscuous mode [ 752.825900][T21620] device veth0_vlan entered promiscuous mode [ 753.021814][T21620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.045594][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.054407][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 753.073711][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 753.102490][T21633] device pim6reg1 entered promiscuous mode [ 753.600666][T21654] device pim6reg1 entered promiscuous mode [ 753.684304][T21652] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.692754][T21652] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.704506][T21664] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.712161][T21664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.722723][T21664] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.730961][T21664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.748522][T21664] device bridge0 entered promiscuous mode [ 758.359472][T21778] device syzkaller0 entered promiscuous mode [ 758.690978][T21786] device pim6reg1 entered promiscuous mode [ 759.266902][T21813] device pim6reg1 entered promiscuous mode [ 759.461914][T21812] device pim6reg1 entered promiscuous mode [ 759.644584][T21826] device sit0 left promiscuous mode [ 759.781577][T21827] device sit0 entered promiscuous mode [ 761.422169][T21912] bond_slave_1: mtu less than device minimum [ 761.813933][T21933] device wg2 entered promiscuous mode [ 761.860365][T21941] device dummy0 entered promiscuous mode [ 761.946213][T21953] device pim6reg1 entered promiscuous mode [ 762.019843][T21958] device veth1_macvtap left promiscuous mode [ 762.026181][T21958] device macsec0 left promiscuous mode [ 762.160848][T21960] device veth1_macvtap entered promiscuous mode [ 762.172473][T21960] device macsec0 entered promiscuous mode [ 765.537912][T22010] device veth0_vlan left promiscuous mode [ 765.554765][T22010] device veth0_vlan entered promiscuous mode [ 765.610035][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.622191][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 765.638781][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 767.267434][T22060] device sit0 left promiscuous mode [ 767.469799][T22066] device sit0 entered promiscuous mode [ 768.125753][T22076] device sit0 entered promiscuous mode [ 768.412271][T22096] device veth1_macvtap left promiscuous mode [ 768.422354][T22096] device macsec0 left promiscuous mode [ 769.174343][T22131] device sit0 left promiscuous mode [ 769.863830][T22140] device veth0_vlan left promiscuous mode [ 769.873351][T22140] device veth0_vlan entered promiscuous mode [ 769.881321][T22140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.891381][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.952447][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 769.987672][ T457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 772.357444][T22212] device sit0 left promiscuous mode [ 772.485348][T22226] syz.5.6514[22226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.485431][T22226] syz.5.6514[22226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.524499][T22219] device pim6reg1 entered promiscuous mode [ 773.137834][T22245] device wg2 left promiscuous mode [ 773.398339][T22249] device veth1_macvtap left promiscuous mode [ 773.406490][T22249] device macsec0 left promiscuous mode [ 773.452880][T22254] device sit0 left promiscuous mode [ 773.612784][T22257] device veth1_macvtap entered promiscuous mode [ 773.620686][T22257] device macsec0 entered promiscuous mode [ 773.646896][T22258] device sit0 entered promiscuous mode [ 773.828777][T22270] device sit0 left promiscuous mode [ 773.904844][T22270] device sit0 entered promiscuous mode [ 774.194560][T22298] device pim6reg1 entered promiscuous mode [ 774.287472][T22300] device veth1_macvtap left promiscuous mode [ 774.327624][T22300] device macsec0 left promiscuous mode [ 774.792243][T22311] device syzkaller0 entered promiscuous mode [ 775.501239][T22360] device wg2 entered promiscuous mode [ 775.637194][T22371] device syzkaller0 entered promiscuous mode [ 776.398465][T22394] device syzkaller0 entered promiscuous mode [ 780.946182][ T30] audit: type=1400 audit(1749961703.307:173): avc: denied { create } for pid=22460 comm="syz.6.6581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 781.101026][T22469] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.117862][T22469] device bridge0 left promiscuous mode [ 781.135175][T22486] device sit0 left promiscuous mode [ 781.170645][T22469] device bridge_slave_1 left promiscuous mode [ 781.177254][T22469] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.186474][T22469] device bridge_slave_0 left promiscuous mode [ 781.193451][T22469] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.251376][T22471] bond_slave_1: mtu greater than device maximum [ 781.443965][T22508] bond_slave_1: mtu less than device minimum [ 781.864830][T22542] bond_slave_1: mtu less than device minimum [ 783.389097][ T30] audit: type=1400 audit(1749961705.757:174): avc: denied { create } for pid=22602 comm="syz.4.6622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 784.090109][T22626] device syzkaller0 entered promiscuous mode [ 784.464069][T22636] device veth0_vlan left promiscuous mode [ 784.490832][T22636] device veth0_vlan entered promiscuous mode [ 784.524153][T22636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.538718][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.547056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 784.654602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 784.876924][T22650] device veth1_macvtap left promiscuous mode [ 784.955706][T22650] device macsec0 left promiscuous mode [ 785.070999][T22655] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.078290][T22655] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.265496][T22758] device pim6reg1 entered promiscuous mode [ 787.799415][T22771] device syzkaller0 entered promiscuous mode [ 788.650329][T22794] device pim6reg1 entered promiscuous mode [ 788.828948][T22805] device syzkaller0 entered promiscuous mode [ 789.289494][T22829] device sit0 left promiscuous mode [ 789.354545][T22828] device sit0 entered promiscuous mode [ 792.166223][T22948] syz.3.6721[22948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.166337][T22948] syz.3.6721[22948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.858502][T22990] device macsec0 entered promiscuous mode [ 793.388294][T23013] device veth0_vlan left promiscuous mode [ 793.444651][T23013] device veth0_vlan entered promiscuous mode [ 793.494727][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 793.512073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 793.549184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 794.268785][T23030] device syzkaller0 entered promiscuous mode [ 796.679330][T23103] device veth1_macvtap entered promiscuous mode [ 796.687614][T23103] device macsec0 entered promiscuous mode [ 796.733647][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 796.855841][T23110] device pim6reg1 entered promiscuous mode [ 797.696343][T23129] device veth0_vlan left promiscuous mode [ 797.721275][T23129] device veth0_vlan entered promiscuous mode [ 797.800897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 797.825274][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 797.841299][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 798.777519][T23156] device pim6reg1 entered promiscuous mode [ 798.895497][T23163] device veth1_macvtap entered promiscuous mode [ 798.915130][T23163] device macsec0 entered promiscuous mode [ 798.950779][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 799.038051][T23167] device pim6reg1 entered promiscuous mode [ 799.653364][T23184] device veth0_vlan left promiscuous mode [ 799.726504][T23184] device veth0_vlan entered promiscuous mode [ 799.794037][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 799.811114][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 799.867814][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 800.667609][T23210] device bridge_slave_1 left promiscuous mode [ 800.674160][T23210] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.718368][T23210] device bridge_slave_0 left promiscuous mode [ 800.725201][T23210] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.544556][T23217] device syzkaller0 entered promiscuous mode [ 801.994007][T23237] device sit0 entered promiscuous mode [ 803.196837][T23265] device syzkaller0 entered promiscuous mode [ 803.403701][T23271] device syzkaller0 entered promiscuous mode [ 804.169274][T23283] device pim6reg1 entered promiscuous mode [ 805.995008][T23347] device syzkaller0 entered promiscuous mode [ 807.759823][T23389] device syzkaller0 entered promiscuous mode [ 809.167965][T23436] ref_ctr_offset mismatch. inode: 0xa38 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 809.581911][T23441] device sit0 entered promiscuous mode [ 810.508287][T23464] device syzkaller0 entered promiscuous mode [ 810.757404][T23474] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.764732][T23474] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.978832][T23480] device sit0 entered promiscuous mode [ 812.463326][T23504] bond_slave_1: mtu less than device minimum [ 812.816012][T23512] device pim6reg1 entered promiscuous mode [ 813.419032][T23528] ref_ctr_offset mismatch. inode: 0x746 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 813.809280][T23553] device syzkaller0 entered promiscuous mode [ 814.325254][T23572] device pim6reg1 entered promiscuous mode [ 815.089172][T23581] ref_ctr_offset mismatch. inode: 0x611 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 815.680374][T23622] device sit0 left promiscuous mode [ 815.810900][T23626] device sit0 entered promiscuous mode [ 816.573511][T23647] device syzkaller0 entered promiscuous mode [ 818.607100][T23680] device sit0 entered promiscuous mode [ 819.273828][T23690] device sit0 left promiscuous mode [ 821.079904][T23759] bond_slave_1: mtu less than device minimum [ 823.128162][T23815] device pim6reg1 entered promiscuous mode [ 827.409317][T23935] ref_ctr_offset mismatch. inode: 0x887 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 831.593832][T23955] device sit0 left promiscuous mode [ 831.636469][T23972] device pim6reg1 entered promiscuous mode [ 831.655311][T23973] device pim6reg1 entered promiscuous mode [ 833.695647][T24050] device sit0 left promiscuous mode [ 834.592399][T24088] device pim6reg1 entered promiscuous mode [ 835.067176][T24099] ref_ctr_offset mismatch. inode: 0xad5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 835.264536][T24107] device pim6reg1 entered promiscuous mode [ 835.510257][T24125] device syzkaller0 entered promiscuous mode [ 836.207740][T24173] ref_ctr_offset mismatch. inode: 0x70d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 836.273778][T24168] Ÿë: port 1(veth0_to_team) entered blocking state [ 836.300832][T24168] Ÿë: port 1(veth0_to_team) entered disabled state [ 836.351727][T24168] device veth0_to_team entered promiscuous mode [ 836.865713][T24197] device wg2 left promiscuous mode [ 836.880764][T24199] device wg2 entered promiscuous mode [ 838.970745][T24226] device veth1_macvtap left promiscuous mode [ 838.997696][T24226] device macsec0 left promiscuous mode [ 839.332783][T24221] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.357810][T24221] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.402939][T24221] device bridge_slave_0 entered promiscuous mode [ 839.527761][T24221] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.534848][T24221] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.622819][T24221] device bridge_slave_1 entered promiscuous mode [ 839.895114][T24239] device veth0_vlan left promiscuous mode [ 839.942803][T24239] device veth0_vlan entered promiscuous mode [ 839.989044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 840.005820][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 840.026554][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 840.283395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 840.302021][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 840.353256][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 840.418083][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 840.484775][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.492056][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.579053][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 840.633618][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 840.668500][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.675608][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.770027][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 840.797053][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 840.926808][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 840.936604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 841.014537][T24221] device veth0_vlan entered promiscuous mode [ 841.129253][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 841.158367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 841.176472][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 841.193382][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 841.210523][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 841.268168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 841.308941][T24221] device veth1_macvtap entered promiscuous mode [ 841.406321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 841.414651][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 841.424551][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 841.432874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 841.442115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 841.454293][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 841.463090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 843.616077][T24310] device sit0 entered promiscuous mode [ 843.872102][T24322] device pim6reg1 entered promiscuous mode [ 848.851517][T24393] device sit0 entered promiscuous mode [ 849.193688][T24412] device wg2 entered promiscuous mode [ 850.149211][T24442] device wg2 left promiscuous mode [ 850.459166][T24442] device wg2 entered promiscuous mode [ 856.213618][T24480] tap0: tun_chr_ioctl cmd 1074025692 [ 856.760147][T24490] device pim6reg1 entered promiscuous mode [ 857.841471][T24522] device veth1_macvtap left promiscuous mode [ 858.479482][ T30] audit: type=1400 audit(1749961780.847:175): avc: denied { ioctl } for pid=24533 comm="syz.5.7174" path="" dev="cgroup2" ino=689 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 858.490809][T24536] device pim6reg1 entered promiscuous mode [ 858.631736][T24554] syz.3.7177[24554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 858.631804][T24554] syz.3.7177[24554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 859.453390][T24567] device sit0 entered promiscuous mode [ 859.678568][T24580] device sit0 entered promiscuous mode [ 861.654375][T24611] device sit0 left promiscuous mode [ 862.013752][T24613] device sit0 entered promiscuous mode [ 862.381130][T24623] device sit0 left promiscuous mode [ 862.577796][T24633] device veth0_vlan left promiscuous mode [ 862.596077][T24633] device veth0_vlan entered promiscuous mode [ 862.626029][T24635] device veth1_macvtap left promiscuous mode [ 862.784564][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 862.828928][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 862.850658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 864.699098][T24693] device sit0 left promiscuous mode [ 867.185603][T24755] ref_ctr_offset mismatch. inode: 0x9cc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 867.449880][T24771] device sit0 entered promiscuous mode [ 867.916851][T24782] device syzkaller0 entered promiscuous mode [ 869.316939][T24834] GPL: port 1(erspan0) entered blocking state [ 869.365843][T24833] ref_ctr_offset mismatch. inode: 0x8c8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 869.427597][T24834] GPL: port 1(erspan0) entered disabled state [ 869.490601][T24834] device erspan0 entered promiscuous mode [ 869.569124][T24832] GPL: port 1(erspan0) entered blocking state [ 869.576036][T24832] GPL: port 1(erspan0) entered forwarding state [ 873.982793][T24918] ref_ctr_offset mismatch. inode: 0xdb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 875.157186][T24956] ref_ctr_offset mismatch. inode: 0x7fc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 875.817435][T24990] device pim6reg1 entered promiscuous mode [ 923.589311][T25019] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.596483][T25019] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.604115][T25019] device bridge_slave_0 entered promiscuous mode [ 923.636944][T25019] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.644522][T25019] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.652817][T25019] device bridge_slave_1 entered promiscuous mode [ 923.681228][T25014] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.688349][T25014] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.695940][T25014] device bridge_slave_0 entered promiscuous mode [ 923.703175][T25011] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.710787][T25011] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.718574][T25011] device bridge_slave_0 entered promiscuous mode [ 923.725510][T25018] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.733253][T25018] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.741020][T25018] device bridge_slave_0 entered promiscuous mode [ 923.763491][T25014] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.770697][T25014] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.778502][T25014] device bridge_slave_1 entered promiscuous mode [ 923.785279][T25011] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.792857][T25011] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.800639][T25011] device bridge_slave_1 entered promiscuous mode [ 923.811538][T25018] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.819088][T25018] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.826675][T25018] device bridge_slave_1 entered promiscuous mode [ 923.867436][T25020] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.874514][T25020] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.882964][T25020] device bridge_slave_0 entered promiscuous mode [ 923.936870][T25020] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.944115][T25020] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.952520][T25020] device bridge_slave_1 entered promiscuous mode [ 924.169633][ T457] device ip6gretap0 left promiscuous mode [ 924.175410][ T457] Ÿë: port 2(ip6gretap0) entered disabled state [ 924.219600][T25019] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.226713][T25019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.234039][T25019] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.241442][T25019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.266203][T25011] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.273300][T25011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.280640][T25011] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.287694][T25011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.342970][T25018] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.350081][T25018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.357483][T25018] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.364545][T25018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.443829][T23956] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.451576][T23956] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.459524][T23956] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.466992][T23956] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.475764][T23956] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.483530][T23956] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.552210][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.560558][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.568564][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 924.577113][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 924.586043][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.593165][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.601366][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 924.609906][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 924.618577][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.625650][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.698291][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 924.706474][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 924.715817][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 924.724479][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.732733][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.740525][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 924.749279][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 924.757865][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.764930][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.772694][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 924.781327][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 924.789902][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.796954][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.804656][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 924.812959][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.820823][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.828817][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 924.836950][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 924.846108][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 924.854923][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.862018][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.870009][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 924.878574][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 924.886904][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.893997][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.901788][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.909784][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.926625][T25019] device veth0_vlan entered promiscuous mode [ 924.951996][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 924.960795][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 924.970161][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 924.980362][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 924.989395][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 924.997653][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 925.005890][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 925.013989][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 925.022469][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 925.030639][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 925.038423][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 925.046063][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 925.055494][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 925.064444][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.071537][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 925.087987][T25018] device veth0_vlan entered promiscuous mode [ 925.098098][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 925.107186][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 925.118786][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 925.127253][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 925.135775][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.142885][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 925.152439][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 925.161030][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 925.169352][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.176406][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 925.184570][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 925.202986][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 925.215045][T25019] device veth1_macvtap entered promiscuous mode [ 925.285027][T25014] device veth0_vlan entered promiscuous mode [ 925.292810][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 925.301648][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 925.309733][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 925.322122][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 925.330557][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 925.339575][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 925.349688][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 925.358208][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 925.366597][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 925.375307][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 925.383647][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 925.392290][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 925.400982][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.408065][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 925.420255][T25018] device veth1_macvtap entered promiscuous mode [ 925.488167][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 925.496527][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 925.505524][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 925.567028][T25011] device veth0_vlan entered promiscuous mode [ 925.575661][T25014] device veth1_macvtap entered promiscuous mode [ 925.602686][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 925.611329][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 925.628012][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 925.642526][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 925.651181][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 925.660044][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 925.669222][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 925.678292][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 925.686350][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 925.695027][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 925.703732][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 925.712421][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 925.721066][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 925.732450][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 925.740612][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 925.751469][T25020] device veth0_vlan entered promiscuous mode [ 925.791405][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 925.799730][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 925.823589][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 925.832092][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 925.840718][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 925.852251][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 925.861095][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 925.870325][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 925.879442][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 925.888389][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 925.898389][ T457] GPL: port 1(erspan0) entered disabled state [ 925.909601][ T457] GPL: port 1(erspan0) entered disabled state [ 925.916930][ T457] GPL: port 1(erspan0) entered disabled state [ 925.948875][ T457] device erspan0 left promiscuous mode [ 925.954489][ T457] GPL: port 1(erspan0) entered disabled state [ 935.652546][ T457] device erspan0 left promiscuous mode [ 935.659329][ T457] GPL: port 1(erspan0) entered disabled state [ 935.668926][ T457] device erspan0 left promiscuous mode [ 935.674521][ T457] GPL: port 1(erspan0) entered disabled state [ 935.684280][T25020] device veth1_macvtap entered promiscuous mode [ 935.693061][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 935.720312][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 935.742123][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 935.781012][T25054] @ÿ: renamed from bond_slave_0 [ 935.790465][T25011] device veth1_macvtap entered promiscuous mode [ 935.814794][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 935.828998][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 935.858026][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 935.902708][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 935.921367][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 935.985113][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 936.121953][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 936.132441][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 936.141137][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 936.390899][T25069] device syzkaller0 entered promiscuous mode [ 936.411754][T25062] device sit0 entered promiscuous mode [ 936.666566][ T457] device veth0_to_team left promiscuous mode [ 936.697682][ T457] Ÿë: port 1(veth0_to_team) entered disabled state [ 936.774842][ T457] device bridge_slave_1 left promiscuous mode [ 936.827645][ T457] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.896547][ T457] device bridge_slave_0 left promiscuous mode [ 936.902883][ T457] bridge0: port 1(bridge_slave_0) entered disabled state [ 936.911710][ T457] device bridge_slave_1 left promiscuous mode [ 936.918227][ T457] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.926016][ T457] device bridge_slave_0 left promiscuous mode [ 936.968098][ T457] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.029920][ T457] device veth0_to_team left promiscuous mode [ 937.060840][ T457] Ÿë: port 1(veth0_to_team) entered disabled state [ 937.117173][ T457] device bridge_slave_1 left promiscuous mode [ 937.153606][ T457] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.193384][ T457] device bridge_slave_0 left promiscuous mode [ 937.227499][ T457] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.281979][ T457] device veth1_macvtap left promiscuous mode [ 937.319513][ T457] device veth0_vlan left promiscuous mode [ 937.353515][ T457] device veth0_vlan left promiscuous mode [ 937.390367][ T457] device veth1_macvtap left promiscuous mode [ 937.426710][ T457] device veth0_vlan left promiscuous mode [ 938.654455][T25123] device syzkaller0 entered promiscuous mode [ 939.169673][T25136] device pim6reg1 entered promiscuous mode [ 939.707186][T25148] device sit0 entered promiscuous mode [ 941.147065][T25184] device syzkaller0 entered promiscuous mode [ 941.312943][T25194] device syzkaller0 entered promiscuous mode [ 941.832034][T25207] device sit0 entered promiscuous mode [ 942.464476][T25230] device sit0 entered promiscuous mode [ 943.229034][T25243] device syzkaller0 entered promiscuous mode [ 944.445637][T25320] device pim6reg1 entered promiscuous mode [ 945.715243][T25359] device sit0 entered promiscuous mode [ 948.235869][T25381] cgroup: fork rejected by pids controller in /syz1 [ 949.191296][T25494] bridge0: port 1(bridge_slave_0) entered blocking state [ 949.217361][T25494] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.297954][T25494] device bridge_slave_0 entered promiscuous mode [ 949.309705][T25494] bridge0: port 2(bridge_slave_1) entered blocking state [ 949.327379][T25494] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.334998][T25494] device bridge_slave_1 entered promiscuous mode [ 949.342380][ T457] device bridge_slave_1 left promiscuous mode [ 949.358655][ T457] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.399025][ T457] device bridge_slave_0 left promiscuous mode [ 949.437635][ T457] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.446234][ T457] device veth0_vlan left promiscuous mode [ 949.584450][T25513] device sit0 left promiscuous mode [ 949.951518][T25511] device sit0 entered promiscuous mode [ 950.300311][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 950.316801][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 950.363933][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 950.393172][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 950.401809][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.408904][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.417140][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 950.425917][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 950.434711][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.442078][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.451996][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 950.460556][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 950.471288][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 950.498631][T25530] device sit0 left promiscuous mode [ 950.698844][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 950.713298][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 950.792018][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 950.823617][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 950.882885][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 950.935843][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 950.954298][T25494] device veth0_vlan entered promiscuous mode [ 951.034146][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 951.051564][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 951.088038][T25568] device pim6reg1 entered promiscuous mode [ 951.216122][T25562] device syzkaller0 entered promiscuous mode [ 951.272285][T25494] device veth1_macvtap entered promiscuous mode [ 951.287547][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 951.308442][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 951.316706][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 951.336126][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 951.344880][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 951.360488][T25579] device pim6reg1 entered promiscuous mode [ 951.390613][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 951.400033][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 951.740572][T25601] device sit0 left promiscuous mode [ 953.522488][T25675] device syzkaller0 entered promiscuous mode [ 955.799951][T25700] device syzkaller0 entered promiscuous mode [ 958.832455][T25825] device syzkaller0 entered promiscuous mode [ 961.625466][T25863] bond_slave_1: mtu less than device minimum [ 963.996492][T25927] device wg2 entered promiscuous mode [ 964.679592][T25946] syz.1.7534[25946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.679704][T25946] syz.1.7534[25946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 968.186129][T25994] device syzkaller0 entered promiscuous mode [ 969.668282][T26031] device syzkaller0 entered promiscuous mode [ 969.926240][T26034] device syzkaller0 entered promiscuous mode [ 970.585195][T26051] device sit0 left promiscuous mode [ 970.599984][T26050] device bond_slave_1 entered promiscuous mode [ 970.667918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 970.676778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 970.816943][T26052] device syzkaller0 entered promiscuous mode [ 972.186546][T26061] device syzkaller0 entered promiscuous mode [ 972.742369][T26074] device pim6reg1 entered promiscuous mode [ 972.996104][T26079] device veth0_vlan left promiscuous mode [ 973.027031][T26079] device veth0_vlan entered promiscuous mode [ 973.502272][T26099] syz.1.7576[26099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 973.502368][T26099] syz.1.7576[26099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 973.753171][T26102] device syzkaller0 entered promiscuous mode [ 976.658925][T26219] device pim6reg1 entered promiscuous mode [ 977.321881][T26239] device veth1_macvtap left promiscuous mode [ 977.563079][T26239] device veth1_macvtap entered promiscuous mode [ 977.584284][T26239] device macsec0 entered promiscuous mode [ 977.767270][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 978.252567][T26256] device syzkaller0 entered promiscuous mode [ 978.345033][T26281] device sit0 entered promiscuous mode [ 978.587643][T26285] device pim6reg1 entered promiscuous mode [ 979.618505][T26304] device veth0_vlan left promiscuous mode [ 979.624894][T26304] device veth0_vlan entered promiscuous mode [ 979.714144][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 979.723193][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 979.774835][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 979.937441][T26318] device sit0 left promiscuous mode [ 980.258829][T26320] device sit0 entered promiscuous mode [ 981.093652][T26364] device veth0_vlan left promiscuous mode [ 981.132430][T26364] device veth0_vlan entered promiscuous mode [ 981.196168][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 981.223763][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 981.274719][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 982.808569][T26417] device wg2 entered promiscuous mode [ 983.296650][T26431] device sit0 entered promiscuous mode [ 983.666593][T26453] device sit0 left promiscuous mode [ 983.702288][T26453] device sit0 entered promiscuous mode [ 984.367791][T26498] ref_ctr_offset mismatch. inode: 0x106 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 985.894576][T26539] device syzkaller0 entered promiscuous mode [ 985.954753][T26537] device syzkaller0 entered promiscuous mode [ 987.815255][T26584] device sit0 left promiscuous mode [ 988.136742][T26584] device sit0 entered promiscuous mode [ 988.702497][T26606] device pim6reg1 entered promiscuous mode [ 989.985826][T26652] device syzkaller0 entered promiscuous mode [ 990.503117][T26685] device sit0 left promiscuous mode [ 990.619319][T26686] device sit0 entered promiscuous mode [ 995.178495][T26749] device sit0 left promiscuous mode [ 995.786986][T26771] GPL: port 1(erspan0) entered blocking state [ 995.793567][T26771] GPL: port 1(erspan0) entered disabled state [ 995.876006][T26771] device erspan0 entered promiscuous mode [ 995.926088][T26772] GPL: port 1(erspan0) entered blocking state [ 995.932354][T26772] GPL: port 1(erspan0) entered forwarding state [ 996.000913][T26779] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.008156][T26779] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.037684][T26780] device bridge_slave_1 left promiscuous mode [ 996.043893][T26780] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.178887][T26780] device bridge_slave_0 left promiscuous mode [ 996.198221][T26780] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.278785][T26801] device pim6reg1 entered promiscuous mode [ 997.060108][T26851] device pim6reg1 entered promiscuous mode [ 997.598587][T26863] syz.1.7785[26863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 997.598704][T26863] syz.1.7785[26863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1000.124210][T26904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.142918][T26904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.309998][T26900] device bridge_slave_1 left promiscuous mode [ 1000.319572][T26900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.329403][T26900] device bridge_slave_0 left promiscuous mode [ 1000.335600][T26900] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.613125][T26903] device syzkaller0 entered promiscuous mode [ 1002.003853][T26956] device syzkaller0 entered promiscuous mode [ 1002.368837][T26965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.376120][T26965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.395917][T26965] device bridge_slave_1 left promiscuous mode [ 1002.405990][T26965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.419038][T26965] device bridge_slave_0 left promiscuous mode [ 1002.425291][T26965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.438551][T26968] syz.8.7813[26968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.438626][T26968] syz.8.7813[26968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.875665][T26972] device syzkaller0 entered promiscuous mode [ 1004.161242][T27005] device syzkaller0 entered promiscuous mode [ 1004.690862][T27016] device veth0_vlan left promiscuous mode [ 1004.704106][T27016] device veth0_vlan entered promiscuous mode [ 1005.100148][T27030] device syzkaller0 entered promiscuous mode [ 1005.891329][T27045] device sit0 entered promiscuous mode [ 1007.042975][T27050] device sit0 entered promiscuous mode [ 1007.398699][T27070] device pim6reg1 entered promiscuous mode [ 1007.797452][T27076] device veth0_vlan left promiscuous mode [ 1007.833482][T27076] device veth0_vlan entered promiscuous mode [ 1008.231440][T27085] device syzkaller0 entered promiscuous mode [ 1008.684893][T27110] device sit0 left promiscuous mode [ 1008.794824][T27114] device sit0 entered promiscuous mode [ 1009.188884][T27137] device veth0_vlan left promiscuous mode [ 1009.195674][T27137] device veth0_vlan entered promiscuous mode [ 1009.309040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1009.329918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1009.379702][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1009.744375][T27151] device bridge_slave_0 entered promiscuous mode [ 1010.277833][T27172] device sit0 left promiscuous mode [ 1010.435713][T27173] bond_slave_1: mtu less than device minimum [ 1010.455410][T27174] device sit0 entered promiscuous mode [ 1010.900931][T27197] device veth0_vlan left promiscuous mode [ 1010.909178][T27197] device veth0_vlan entered promiscuous mode [ 1010.941759][T27198] device sit0 left promiscuous mode [ 1011.069678][T27198] device sit0 entered promiscuous mode [ 1011.364551][T27211] device syzkaller0 entered promiscuous mode [ 1012.460204][T27243] device veth0_vlan left promiscuous mode [ 1012.495975][T27243] device veth0_vlan entered promiscuous mode [ 1012.665196][T27269] device syzkaller0 entered promiscuous mode [ 1013.066496][T27266] device syzkaller0 entered promiscuous mode [ 1013.254708][T27294] device sit0 entered promiscuous mode [ 1013.450839][T27316] tap0: tun_chr_ioctl cmd 1074025677 [ 1013.456244][T27316] tap0: linktype set to 769 [ 1013.461293][T27316] tap0: tun_chr_ioctl cmd 1074025698 [ 1013.887819][T27322] device sit0 left promiscuous mode [ 1014.177668][T27329] device sit0 entered promiscuous mode [ 1014.695756][T27344] device syzkaller0 entered promiscuous mode [ 1015.704089][T27357] device syzkaller0 entered promiscuous mode [ 1016.156374][T27381] device sit0 left promiscuous mode [ 1016.320854][T27392] device sit0 entered promiscuous mode [ 1017.273941][T27416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.281250][T27416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.390175][T27416] device bridge_slave_1 left promiscuous mode [ 1017.396733][T27416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.405664][T27416] device bridge_slave_0 left promiscuous mode [ 1017.412317][T27416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.477518][T27430] device pim6reg1 entered promiscuous mode [ 1017.690268][T27444] cgroup: fork rejected by pids controller in /syz6 [ 1017.772091][T27435] device pim6reg1 entered promiscuous mode [ 1017.997514][T27442] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1018.993952][T27588] device pim6reg1 entered promiscuous mode [ 1019.144298][T27590] device veth1_macvtap left promiscuous mode [ 1019.150882][T27590] device macsec0 entered promiscuous mode [ 1019.208836][T27585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.215932][T27585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.268162][T27585] device bridge_slave_0 entered promiscuous mode [ 1019.439743][T27585] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.447239][T27585] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.557260][T27585] device bridge_slave_1 entered promiscuous mode [ 1020.189578][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1020.200949][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1020.240900][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1020.249554][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1020.258113][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.265174][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.315407][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1020.337181][ T457] device veth1_macvtap left promiscuous mode [ 1020.371690][ T457] device veth0_vlan left promiscuous mode [ 1020.483791][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1020.519099][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1020.543175][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.550563][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.563703][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1020.574530][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1020.599132][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1020.623588][T27585] device veth0_vlan entered promiscuous mode [ 1020.636745][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1020.647965][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1020.655837][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1020.686908][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1020.702827][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1020.714451][T27585] device veth1_macvtap entered promiscuous mode [ 1020.784063][T27636] device pim6reg1 entered promiscuous mode [ 1020.807638][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1020.815606][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1020.824906][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1020.867575][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1020.883088][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1022.172142][T27686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.179558][T27686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.250736][T27686] device bridge_slave_1 left promiscuous mode [ 1022.256922][T27686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.357913][T27686] device bridge_slave_0 left promiscuous mode [ 1022.364123][T27686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.396167][T27712] device sit0 left promiscuous mode [ 1029.578626][T27715] device sit0 entered promiscuous mode [ 1030.592261][T27742] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 1030.611528][T27742] pim6reg0: linktype set to 6 [ 1030.625217][T27743] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 1030.633329][T27743] pim6reg0: linktype set to 6 [ 1031.252537][T27768] device veth0_vlan left promiscuous mode [ 1031.322605][T27768] device veth0_vlan entered promiscuous mode [ 1031.353108][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.369338][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.387148][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1033.380679][T27850] device veth0_vlan left promiscuous mode [ 1033.404547][T27850] device veth0_vlan entered promiscuous mode [ 1033.447364][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1033.462548][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1033.479895][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1034.709191][T27901] device veth0_vlan left promiscuous mode [ 1034.735383][T27901] device veth0_vlan entered promiscuous mode [ 1037.054700][T28009] device veth1_macvtap left promiscuous mode [ 1037.801056][T28011] device syzkaller0 entered promiscuous mode [ 1039.392641][T28074] syz.8.8085[28074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1039.392729][T28074] syz.8.8085[28074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1040.936095][T28091] bridge0: port 2(bridge_slave_1) entered disabled state [ 1040.956496][T28091] bridge0: port 1(bridge_slave_0) entered disabled state [ 1044.793922][T28248] device veth0_vlan left promiscuous mode [ 1044.800788][T28248] device veth0_vlan entered promiscuous mode [ 1045.900033][T28296] device syzkaller0 entered promiscuous mode [ 1046.402396][T28318] device veth0_vlan left promiscuous mode [ 1046.412955][T28318] device veth0_vlan entered promiscuous mode [ 1046.782461][T28324] device syzkaller0 entered promiscuous mode [ 1047.615430][T28352] device sit0 left promiscuous mode [ 1049.517506][T28443] device sit0 entered promiscuous mode [ 1050.017240][T28452] device veth1_macvtap left promiscuous mode [ 1051.449184][T28486] device veth0_vlan left promiscuous mode [ 1051.462881][T28486] device veth0_vlan entered promiscuous mode [ 1051.565268][T28498] device veth1_macvtap left promiscuous mode [ 1051.580489][T28498] device macsec0 entered promiscuous mode [ 1051.951282][T28513] device sit0 left promiscuous mode [ 1052.083481][T28514] device sit0 entered promiscuous mode [ 1053.785882][T28558] device sit0 left promiscuous mode [ 1053.859406][T28558] device sit0 entered promiscuous mode [ 1054.510717][T28568] device sit0 left promiscuous mode [ 1054.598687][T28569] device sit0 entered promiscuous mode [ 1058.946871][T28719] device sit0 entered promiscuous mode [ 1059.457977][T28741] device veth0_vlan left promiscuous mode [ 1059.463842][T28741] device veth0_vlan entered promiscuous mode [ 1059.471448][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1059.481980][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1059.489862][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1067.126256][T28967] device veth0_vlan left promiscuous mode [ 1067.139873][T28967] device veth0_vlan entered promiscuous mode [ 1067.201730][T25012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1067.220242][T25012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1067.265046][T25012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1070.909873][T29156] device veth0_vlan left promiscuous mode [ 1071.009190][T29156] device veth0_vlan entered promiscuous mode [ 1073.512932][T29215] device sit0 left promiscuous mode [ 1074.777956][T29259] device veth0_vlan left promiscuous mode [ 1074.787234][T29259] device veth0_vlan entered promiscuous mode [ 1075.886965][T29285] syz.1.8451[29285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.887079][T29285] syz.1.8451[29285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1076.044641][T29297] device sit0 entered promiscuous mode [ 1076.405359][T29304] device macsec0 left promiscuous mode [ 1076.411070][T29309] device veth1_macvtap entered promiscuous mode [ 1076.423428][T29309] device macsec0 entered promiscuous mode [ 1076.446780][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1077.347368][T29375] device pim6reg1 entered promiscuous mode [ 1077.794599][T29388] syz.1.8482[29388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1077.794684][T29388] syz.1.8482[29388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1079.491140][T29458] FAULT_INJECTION: forcing a failure. [ 1079.491140][T29458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1079.567344][T29458] CPU: 1 PID: 29458 Comm: syz.8.8505 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1079.578782][T29458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1079.588869][T29458] Call Trace: [ 1079.592171][T29458] [ 1079.595123][T29458] __dump_stack+0x21/0x30 [ 1079.599478][T29458] dump_stack_lvl+0xee/0x150 [ 1079.604095][T29458] ? show_regs_print_info+0x20/0x20 [ 1079.609315][T29458] ? vfs_write+0xc17/0xf70 [ 1079.613763][T29458] dump_stack+0x15/0x20 [ 1079.617940][T29458] should_fail+0x3c1/0x510 [ 1079.622399][T29458] should_fail_usercopy+0x1a/0x20 [ 1079.627452][T29458] _copy_from_user+0x20/0xd0 [ 1079.632068][T29458] __sys_bpf+0x233/0x730 [ 1079.636330][T29458] ? bpf_link_show_fdinfo+0x310/0x310 [ 1079.641728][T29458] ? debug_smp_processor_id+0x17/0x20 [ 1079.647127][T29458] __x64_sys_bpf+0x7c/0x90 [ 1079.651567][T29458] x64_sys_call+0x4b9/0x9a0 [ 1079.656101][T29458] do_syscall_64+0x4c/0xa0 [ 1079.660543][T29458] ? clear_bhb_loop+0x50/0xa0 [ 1079.665244][T29458] ? clear_bhb_loop+0x50/0xa0 [ 1079.669949][T29458] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1079.675871][T29458] RIP: 0033:0x7f6f9de27929 [ 1079.680308][T29458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1079.699945][T29458] RSP: 002b:00007f6f9c490038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1079.708393][T29458] RAX: ffffffffffffffda RBX: 00007f6f9e04efa0 RCX: 00007f6f9de27929 [ 1079.716392][T29458] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 1079.724396][T29458] RBP: 00007f6f9c490090 R08: 0000000000000000 R09: 0000000000000000 [ 1079.732569][T29458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1079.740565][T29458] R13: 0000000000000000 R14: 00007f6f9e04efa0 R15: 00007fff43dec948 [ 1079.748659][T29458] [ 1079.900499][T29470] device veth0_vlan left promiscuous mode [ 1079.927312][T29470] device veth0_vlan entered promiscuous mode [ 1080.272623][T29498] device veth0_to_team entered promiscuous mode [ 1080.364707][T29507] FAULT_INJECTION: forcing a failure. [ 1080.364707][T29507] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.438344][T29507] CPU: 0 PID: 29507 Comm: syz.6.8518 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1080.449862][T29507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1080.459944][T29507] Call Trace: [ 1080.463248][T29507] [ 1080.466198][T29507] __dump_stack+0x21/0x30 [ 1080.470557][T29507] dump_stack_lvl+0xee/0x150 [ 1080.475359][T29507] ? show_regs_print_info+0x20/0x20 [ 1080.480593][T29507] ? kstrtouint_from_user+0x1a0/0x200 [ 1080.486085][T29507] dump_stack+0x15/0x20 [ 1080.490276][T29507] should_fail+0x3c1/0x510 [ 1080.494732][T29507] __should_failslab+0xa4/0xe0 [ 1080.499531][T29507] should_failslab+0x9/0x20 [ 1080.504064][T29507] slab_pre_alloc_hook+0x3b/0xe0 [ 1080.509032][T29507] __kmalloc+0x6d/0x2c0 [ 1080.513213][T29507] ? kvmalloc_node+0x242/0x330 [ 1080.518004][T29507] kvmalloc_node+0x242/0x330 [ 1080.522721][T29507] ? vm_mmap+0xb0/0xb0 [ 1080.526818][T29507] ? __fdget+0x1a1/0x230 [ 1080.531203][T29507] map_update_elem+0x2b7/0x740 [ 1080.536002][T29507] __sys_bpf+0x40c/0x730 [ 1080.540278][T29507] ? bpf_link_show_fdinfo+0x310/0x310 [ 1080.545689][T29507] ? debug_smp_processor_id+0x17/0x20 [ 1080.551089][T29507] __x64_sys_bpf+0x7c/0x90 [ 1080.555530][T29507] x64_sys_call+0x4b9/0x9a0 [ 1080.560059][T29507] do_syscall_64+0x4c/0xa0 [ 1080.564503][T29507] ? clear_bhb_loop+0x50/0xa0 [ 1080.569214][T29507] ? clear_bhb_loop+0x50/0xa0 [ 1080.573936][T29507] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1080.579883][T29507] RIP: 0033:0x7fb852220929 [ 1080.584326][T29507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1080.603961][T29507] RSP: 002b:00007fb850889038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1080.612408][T29507] RAX: ffffffffffffffda RBX: 00007fb852447fa0 RCX: 00007fb852220929 [ 1080.620595][T29507] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 1080.628605][T29507] RBP: 00007fb850889090 R08: 0000000000000000 R09: 0000000000000000 [ 1080.636602][T29507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.644604][T29507] R13: 0000000000000000 R14: 00007fb852447fa0 R15: 00007fffd48d0738 [ 1080.652613][T29507] [ 1081.461032][T29548] ÿÿÿÿÿÿ: renamed from vlan1 [ 1081.621765][T29556] device pim6reg1 entered promiscuous mode [ 1082.343294][T29581] device veth0_vlan left promiscuous mode [ 1082.380013][T29581] device veth0_vlan entered promiscuous mode [ 1082.486157][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1082.502971][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1082.599326][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1083.021863][T29603] FAULT_INJECTION: forcing a failure. [ 1083.021863][T29603] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.120524][T29603] CPU: 0 PID: 29603 Comm: syz.1.8546 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1083.131960][T29603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1083.142039][T29603] Call Trace: [ 1083.145338][T29603] [ 1083.148282][T29603] __dump_stack+0x21/0x30 [ 1083.152638][T29603] dump_stack_lvl+0xee/0x150 [ 1083.157255][T29603] ? show_regs_print_info+0x20/0x20 [ 1083.162480][T29603] dump_stack+0x15/0x20 [ 1083.166654][T29603] should_fail+0x3c1/0x510 [ 1083.171087][T29603] __should_failslab+0xa4/0xe0 [ 1083.175874][T29603] should_failslab+0x9/0x20 [ 1083.180397][T29603] slab_pre_alloc_hook+0x3b/0xe0 [ 1083.185359][T29603] __kmalloc+0x6d/0x2c0 [ 1083.189531][T29603] ? kvmalloc_node+0x242/0x330 [ 1083.194316][T29603] kvmalloc_node+0x242/0x330 [ 1083.198913][T29603] ? vm_mmap+0xb0/0xb0 [ 1083.202984][T29603] ? check_stack_object+0x81/0x140 [ 1083.208133][T29603] ? __kasan_check_write+0x14/0x20 [ 1083.213266][T29603] ? _copy_from_user+0x95/0xd0 [ 1083.218036][T29603] map_update_elem+0x4df/0x740 [ 1083.222806][T29603] __sys_bpf+0x40c/0x730 [ 1083.227066][T29603] ? bpf_link_show_fdinfo+0x310/0x310 [ 1083.232461][T29603] ? debug_smp_processor_id+0x17/0x20 [ 1083.237846][T29603] __x64_sys_bpf+0x7c/0x90 [ 1083.242283][T29603] x64_sys_call+0x4b9/0x9a0 [ 1083.246812][T29603] do_syscall_64+0x4c/0xa0 [ 1083.251229][T29603] ? clear_bhb_loop+0x50/0xa0 [ 1083.255921][T29603] ? clear_bhb_loop+0x50/0xa0 [ 1083.260625][T29603] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1083.266523][T29603] RIP: 0033:0x7ffbc516b929 [ 1083.270943][T29603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1083.290574][T29603] RSP: 002b:00007ffbc37d4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1083.298996][T29603] RAX: ffffffffffffffda RBX: 00007ffbc5392fa0 RCX: 00007ffbc516b929 [ 1083.306968][T29603] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 1083.314960][T29603] RBP: 00007ffbc37d4090 R08: 0000000000000000 R09: 0000000000000000 [ 1083.322931][T29603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1083.330903][T29603] R13: 0000000000000000 R14: 00007ffbc5392fa0 R15: 00007ffcc211edd8 [ 1083.338913][T29603] [ 1083.979397][T29629] device syzkaller0 entered promiscuous mode [ 1084.804428][T29657] FAULT_INJECTION: forcing a failure. [ 1084.804428][T29657] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1084.894187][T29657] CPU: 1 PID: 29657 Comm: syz.6.8563 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1084.905614][T29657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1084.915695][T29657] Call Trace: [ 1084.918993][T29657] [ 1084.921948][T29657] __dump_stack+0x21/0x30 [ 1084.926301][T29657] dump_stack_lvl+0xee/0x150 [ 1084.930921][T29657] ? show_regs_print_info+0x20/0x20 [ 1084.936147][T29657] ? __kmalloc+0x13d/0x2c0 [ 1084.940592][T29657] ? kvmalloc_node+0x242/0x330 [ 1084.945381][T29657] dump_stack+0x15/0x20 [ 1084.949561][T29657] should_fail+0x3c1/0x510 [ 1084.954009][T29657] should_fail_usercopy+0x1a/0x20 [ 1084.959064][T29657] _copy_from_user+0x20/0xd0 [ 1084.963689][T29657] map_update_elem+0x552/0x740 [ 1084.968592][T29657] __sys_bpf+0x40c/0x730 [ 1084.972855][T29657] ? bpf_link_show_fdinfo+0x310/0x310 [ 1084.978252][T29657] ? debug_smp_processor_id+0x17/0x20 [ 1084.983650][T29657] __x64_sys_bpf+0x7c/0x90 [ 1084.988087][T29657] x64_sys_call+0x4b9/0x9a0 [ 1084.992621][T29657] do_syscall_64+0x4c/0xa0 [ 1084.997062][T29657] ? clear_bhb_loop+0x50/0xa0 [ 1085.001768][T29657] ? clear_bhb_loop+0x50/0xa0 [ 1085.006470][T29657] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1085.012392][T29657] RIP: 0033:0x7fb852220929 [ 1085.016830][T29657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1085.036541][T29657] RSP: 002b:00007fb850889038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1085.044988][T29657] RAX: ffffffffffffffda RBX: 00007fb852447fa0 RCX: 00007fb852220929 [ 1085.052995][T29657] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 1085.060999][T29657] RBP: 00007fb850889090 R08: 0000000000000000 R09: 0000000000000000 [ 1085.068998][T29657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1085.077003][T29657] R13: 0000000000000000 R14: 00007fb852447fa0 R15: 00007fffd48d0738 [ 1085.085040][T29657] [ 1089.063747][T29749] device pim6reg1 entered promiscuous mode [ 1089.378921][T29766] bond_slave_1: mtu less than device minimum [ 1090.094651][T29804] ref_ctr_offset mismatch. inode: 0x511 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1090.341632][T29817] syz.2.8616[29817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1090.341737][T29817] syz.2.8616[29817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.913644][T29901] device pim6reg1 entered promiscuous mode [ 1093.883321][T29912] device wg2 left promiscuous mode [ 1094.407823][T29925] FAULT_INJECTION: forcing a failure. [ 1094.407823][T29925] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.429227][T29918] device lo entered promiscuous mode [ 1094.487361][T29925] CPU: 0 PID: 29925 Comm: syz.9.8649 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1094.498791][T29925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1094.508853][T29925] Call Trace: [ 1094.512137][T29925] [ 1094.515078][T29925] __dump_stack+0x21/0x30 [ 1094.519503][T29925] dump_stack_lvl+0xee/0x150 [ 1094.524116][T29925] ? show_regs_print_info+0x20/0x20 [ 1094.529327][T29925] ? vfs_write+0xc17/0xf70 [ 1094.533746][T29925] dump_stack+0x15/0x20 [ 1094.537899][T29925] should_fail+0x3c1/0x510 [ 1094.542328][T29925] should_fail_usercopy+0x1a/0x20 [ 1094.547354][T29925] _copy_from_user+0x20/0xd0 [ 1094.551957][T29925] __sys_bpf+0x233/0x730 [ 1094.556201][T29925] ? bpf_link_show_fdinfo+0x310/0x310 [ 1094.561583][T29925] ? debug_smp_processor_id+0x17/0x20 [ 1094.566967][T29925] __x64_sys_bpf+0x7c/0x90 [ 1094.571388][T29925] x64_sys_call+0x4b9/0x9a0 [ 1094.575903][T29925] do_syscall_64+0x4c/0xa0 [ 1094.580330][T29925] ? clear_bhb_loop+0x50/0xa0 [ 1094.585024][T29925] ? clear_bhb_loop+0x50/0xa0 [ 1094.589709][T29925] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1094.595629][T29925] RIP: 0033:0x7f9197c0c929 [ 1094.600046][T29925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1094.619659][T29925] RSP: 002b:00007f9196275038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1094.628084][T29925] RAX: ffffffffffffffda RBX: 00007f9197e33fa0 RCX: 00007f9197c0c929 [ 1094.636159][T29925] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000002 [ 1094.644137][T29925] RBP: 00007f9196275090 R08: 0000000000000000 R09: 0000000000000000 [ 1094.652112][T29925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1094.660085][T29925] R13: 0000000000000000 R14: 00007f9197e33fa0 R15: 00007ffc3e236258 [ 1094.668072][T29925] [ 1095.360345][T29947] device syz_tun entered promiscuous mode [ 1095.966076][T29974] FAULT_INJECTION: forcing a failure. [ 1095.966076][T29974] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.047541][T29974] CPU: 1 PID: 29974 Comm: syz.6.8664 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1096.058973][T29974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1096.069055][T29974] Call Trace: [ 1096.072362][T29974] [ 1096.075315][T29974] __dump_stack+0x21/0x30 [ 1096.079670][T29974] dump_stack_lvl+0xee/0x150 [ 1096.084292][T29974] ? show_regs_print_info+0x20/0x20 [ 1096.089518][T29974] ? kstrtouint_from_user+0x1a0/0x200 [ 1096.094923][T29974] dump_stack+0x15/0x20 [ 1096.099107][T29974] should_fail+0x3c1/0x510 [ 1096.103553][T29974] __should_failslab+0xa4/0xe0 [ 1096.108555][T29974] should_failslab+0x9/0x20 [ 1096.113094][T29974] slab_pre_alloc_hook+0x3b/0xe0 [ 1096.118081][T29974] __kmalloc+0x6d/0x2c0 [ 1096.122272][T29974] ? kvmalloc_node+0x242/0x330 [ 1096.127090][T29974] kvmalloc_node+0x242/0x330 [ 1096.131741][T29974] ? vm_mmap+0xb0/0xb0 [ 1096.135852][T29974] ? __fdget+0x1a1/0x230 [ 1096.140139][T29974] map_update_elem+0x2b7/0x740 [ 1096.144941][T29974] __sys_bpf+0x40c/0x730 [ 1096.149220][T29974] ? bpf_link_show_fdinfo+0x310/0x310 [ 1096.154630][T29974] ? debug_smp_processor_id+0x17/0x20 [ 1096.160036][T29974] __x64_sys_bpf+0x7c/0x90 [ 1096.164521][T29974] x64_sys_call+0x4b9/0x9a0 [ 1096.169063][T29974] do_syscall_64+0x4c/0xa0 [ 1096.173507][T29974] ? clear_bhb_loop+0x50/0xa0 [ 1096.178232][T29974] ? clear_bhb_loop+0x50/0xa0 [ 1096.182946][T29974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1096.188871][T29974] RIP: 0033:0x7fb852220929 [ 1096.193310][T29974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1096.212958][T29974] RSP: 002b:00007fb850889038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1096.221403][T29974] RAX: ffffffffffffffda RBX: 00007fb852447fa0 RCX: 00007fb852220929 [ 1096.229403][T29974] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000002 [ 1096.237406][T29974] RBP: 00007fb850889090 R08: 0000000000000000 R09: 0000000000000000 [ 1096.245413][T29974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1096.253438][T29974] R13: 0000000000000000 R14: 00007fb852447fa0 R15: 00007fffd48d0738 [ 1096.261449][T29974] [ 1097.339914][T30019] device veth0_vlan left promiscuous mode [ 1097.361265][T30019] device veth0_vlan entered promiscuous mode [ 1097.438521][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1097.448099][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1097.477784][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1098.957308][T30093] device wg2 entered promiscuous mode [ 1098.968434][T30076] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.975640][T30076] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.983732][T30076] device bridge_slave_0 entered promiscuous mode [ 1098.997129][T25012] device bridge_slave_1 left promiscuous mode [ 1099.004011][T25012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.012170][T25012] device bridge_slave_0 left promiscuous mode [ 1099.018528][T25012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.282033][T30076] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.293582][T30076] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.327068][T30076] device bridge_slave_1 entered promiscuous mode [ 1100.324176][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1100.333434][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1100.343260][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1100.351909][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1100.365798][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.372907][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.380921][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1100.400280][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1100.408808][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1100.417140][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.424231][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.445982][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1100.454495][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1100.472736][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1100.486399][T30076] device veth0_vlan entered promiscuous mode [ 1100.495521][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1100.524480][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1100.561826][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1100.612589][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1100.662940][T30076] device veth1_macvtap entered promiscuous mode [ 1100.708352][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1100.750977][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1101.199686][T30145] device pim6reg1 entered promiscuous mode [ 1101.365938][T30157] device sit0 left promiscuous mode [ 1101.720237][T30155] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.742575][T30155] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.770651][T30155] device bridge_slave_0 entered promiscuous mode [ 1103.159138][T30155] bridge0: port 2(bridge_slave_1) entered blocking state [ 1103.166218][T30155] bridge0: port 2(bridge_slave_1) entered disabled state [ 1103.176447][T30155] device bridge_slave_1 entered promiscuous mode [ 1104.711707][T30183] device sit0 left promiscuous mode [ 1104.769453][T30175] device sit0 entered promiscuous mode [ 1105.084641][T30212] device pim6reg1 entered promiscuous mode [ 1105.329101][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1105.357884][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1105.407886][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1105.447861][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1105.490478][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.497739][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1105.578162][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1105.623292][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1105.707769][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1105.766807][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.773929][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1105.884604][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1105.923520][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1105.996010][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1106.035063][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1106.109383][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1106.128330][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1106.159368][T25012] device bridge_slave_1 left promiscuous mode [ 1106.165640][T25012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.183400][T25012] device bridge_slave_0 left promiscuous mode [ 1106.189655][T25012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.200778][T25012] device veth1_macvtap left promiscuous mode [ 1106.206950][T25012] device veth0_vlan left promiscuous mode [ 1106.365071][T30155] device veth0_vlan entered promiscuous mode [ 1106.387691][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1106.417832][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1106.437101][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1106.444749][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1106.473515][T30155] device veth1_macvtap entered promiscuous mode [ 1106.480496][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1106.490366][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1106.498840][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1106.527497][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1106.535985][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1106.587701][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1106.617715][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready Connection to 10.128.10.6 closed by remote host. [ 1107.868035][T25012] device bridge_slave_1 left promiscuous mode [ 1107.874171][T25012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.881818][T25012] device bridge_slave_0 left promiscuous mode [ 1107.888060][T25012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.896166][T25012] device veth1_macvtap left promiscuous mode [ 1107.902330][T25012] device veth0_vlan left promiscuous mode [ 1109.069443][T25012] GPL: port 1(erspan0) entered disabled state [ 1109.078585][T25012] device erspan0 left promiscuous mode [ 1109.084063][T25012] GPL: port 1(erspan0) entered disabled state [ 1109.340893][T25012] device veth1_macvtap left promiscuous mode [ 1109.346915][T25012] device veth0_vlan left promiscuous mode [ 1109.352889][T25012] device veth0_vlan left promiscuous mode [ 1109.358780][T25012] device veth0_vlan left promiscuous mode