last executing test programs: 1m37.926783887s ago: executing program 1 (id=4330): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000bc2bc29d6c3f9394f71739f73329d05b7cc5374d83595577bac8d5bfa9a6b0d85ff4075a1f3e56a9cea0fc663560e61b043761059236f2876272733c81f5742930ee281366c4343dd54615fab900205a14", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x40000000) (async) close(r4) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x5d}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r9) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) (async) r11 = getpid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x1000000000000000}, r11, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x94) 1m37.725294697s ago: executing program 1 (id=4331): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000007b3a6d7b850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000007b3a6d7b850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r4}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@decl_tag={0x4, 0x0, 0x0, 0x11, 0x1, 0x6}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000300)=""/117, 0x39, 0x75, 0x0, 0x1}, 0x28) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@decl_tag={0x4, 0x0, 0x0, 0x11, 0x1, 0x6}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000300)=""/117, 0x39, 0x75, 0x0, 0x1}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x7c, 0x1, 0xa880, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @value=r7}, 0x50) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x19, 0x4c}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x27}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x49, 0x10, &(0x7f0000000000), 0x3}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r8}, 0x8) 1m37.592849179s ago: executing program 1 (id=4335): r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000080), &(0x7f0000000180)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="260a0000000000006111480000000000180000000000000000000000000000809500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x5, 0x7c, 0x8, 0x99, 0x0, 0x8000000000000000, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x4, @perf_bp={&(0x7f00000002c0), 0x2}, 0x9012, 0x40, 0x881, 0x1, 0x0, 0x7, 0x1, 0x0, 0x5, 0x0, 0x123}, r10, 0xf, 0xffffffffffffffff, 0x3) write$cgroup_pid(r9, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x21, 0x347f9535b7a5462f, 0x7, &(0x7f0000000000)) 1m37.426684445s ago: executing program 1 (id=4340): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1200000002000000040047cf9f8d0000006ef190fb67790778b0f840d0eb784fac00000066998f719adece91fa97d15a7d01012719217522e6", @ANYRES32, @ANYBLOB='\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000a000001001000a203000000003166a3373e8ef400eeffffff0e6bfa32e352a2f4bc68570f00000000000051d8", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000008c000000851000000600000018100000", @ANYRESHEX=r3, @ANYRESDEC=0x0, @ANYBLOB="b422288cb5f0ca53627f96062d38a386", @ANYBLOB="0000000000d41e824c03000000000000850000000c000000b7000000000000008520000005000000a778fcff1000000018650000060000000000000008000000bf91000000000000b7020000020000008500000001000000b7000000000000009500000000000000e042a8980ef706beab"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe1, 0x0, &(0x7f00000005c0)="63eced8646dc3f0ac033c9ffb186f9704c89e676267a4bbb5aafdc241304f18584f661488dcb72704a3ca63186e26714d7673d313e4c03d286b297c6f7bad6310ae2112ffca0363f010bb7488aa1008836e5f8fafebf36ed11e97aafc6178deb32cd0ad1cfc3f613b52dd5330d7f163252dae30a1c3cb137f7b57a616bd90653a63cb585731e1e1abbfccf348e0500b26791e4f8586a2e308d1b71b8d27332002a55eac6d52cb7b23776a5e37413fbf51940790fcee9a239b99ad467fcd64b9d71ac5f18e36b8546b60e422f240781e283e7767ebe6b107e9a9a9da1880034f736", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) 1m35.922506179s ago: executing program 1 (id=4354): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="375f29c4ba75", @ANYRES32], 0x48) mkdirat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x1ff) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x1008e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x8, 0x7}, 0x0, 0x81d, 0x0, 0x0, 0xfffffefffff7bbfe, 0xffffffff, 0x0, 0x0, 0x5ff, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000804000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_ext={0x1c, 0x24, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb7af, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@map_fd={0x18, 0xb, 0x1, 0x0, r7}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @ldst={0x2, 0x3, 0x1, 0x6, 0x2, 0xfffffffffffffffe, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0xb9, 0xff, &(0x7f0000000840)=""/255, 0x41100, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x8, 0x6}, 0x10, 0x2552f, r6, 0x7, &(0x7f00000003c0)=[r7, r7, r7, r7, r7, r7], &(0x7f00000006c0)=[{0x1, 0x5, 0xb, 0xa}, {0x0, 0x3, 0x6, 0x6}, {0x2, 0x1, 0x1, 0x3}, {0x4, 0x5, 0x7, 0x5}, {0x4, 0x4, 0xb, 0x9}, {0x5, 0x4, 0x5, 0x2}, {0x0, 0x3, 0xf, 0x4}], 0x10, 0x2}, 0x94) 1m35.91582371s ago: executing program 1 (id=4360): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae350000", @ANYRES32=0x0, @ANYBLOB='\x00'/10], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x67}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000400)='./file0\x00', 0x29) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="5ca2dcb15fe64bc6edc004d889ff878567f228848544f800", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x7, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, r7}, 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="9fe142eb010018200000000000000c0000000ce1fcdceea107b13aa93700000000000000000400000000000000000000000073202c50c019d99ef891c52856853fb64978b61b6f658201f541949ea5ba33b7e0f51e51e0e649b1e2b4c19b7ef751b611c653fd84d38beafca8c45b4583e5481a82b8c073d9346e53ae2acb04a8ca5f6698b6868f1a0fd01c44512e8f7f5b9d0dd528e9e492ea7a27ec8ea957c963a371dfcda369822dab93c4bf5a4ce9c1eac5939fba08253cdd7bf3ad"], 0x0, 0x26}, 0x20) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000780)={0x4, &(0x7f0000000240)=[{0x42, 0x7, 0x0, 0x8}, {0x80, 0xc, 0x54, 0x3}, {0x89, 0x5, 0x1}, {0x0, 0x7, 0xfc, 0x6}]}) 1m21.125547196s ago: executing program 32 (id=4360): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae350000", @ANYRES32=0x0, @ANYBLOB='\x00'/10], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x67}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000400)='./file0\x00', 0x29) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="5ca2dcb15fe64bc6edc004d889ff878567f228848544f800", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x7, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, r7}, 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="9fe142eb010018200000000000000c0000000ce1fcdceea107b13aa93700000000000000000400000000000000000000000073202c50c019d99ef891c52856853fb64978b61b6f658201f541949ea5ba33b7e0f51e51e0e649b1e2b4c19b7ef751b611c653fd84d38beafca8c45b4583e5481a82b8c073d9346e53ae2acb04a8ca5f6698b6868f1a0fd01c44512e8f7f5b9d0dd528e9e492ea7a27ec8ea957c963a371dfcda369822dab93c4bf5a4ce9c1eac5939fba08253cdd7bf3ad"], 0x0, 0x26}, 0x20) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000780)={0x4, &(0x7f0000000240)=[{0x42, 0x7, 0x0, 0x8}, {0x80, 0xc, 0x54, 0x3}, {0x89, 0x5, 0x1}, {0x0, 0x7, 0xfc, 0x6}]}) 25.730460467s ago: executing program 4 (id=5213): perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r3}, 0x38) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bond_slave_0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x0, &(0x7f0000001080)="0000000000000000fee8c33757d7", 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x72, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@ptr={0x2, 0x0, 0x0, 0x2, 0x4}, @typedef={0xf, 0x0, 0x0, 0x8, 0x3}, @float={0x7, 0x0, 0x0, 0x10, 0x2}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x68}, {0x9, 0x4}, {0x5}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000980)=""/229, 0x64, 0xe5, 0x0, 0x7}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b40)=@o_path={&(0x7f0000000b00)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x2, &(0x7f00000003c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x3}], &(0x7f0000000400)='syzkaller\x00', 0x60, 0x1, &(0x7f0000000440)=""/1, 0x41100, 0x41, '\x00', r5, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x5, 0xc}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000b80)=[r7, r8, r0], &(0x7f0000000bc0)=[{0x5, 0x3, 0xd, 0x55d5e627404decb7}, {0x0, 0x1, 0xd, 0x9}, {0x1, 0x1, 0x7, 0x4}, {0x0, 0x2, 0x5, 0x3}, {0x0, 0x1, 0x4, 0xb}, {0x2, 0x5, 0xa, 0x2}], 0x10, 0x1}, 0x94) close(0xffffffffffffffff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f0000000380), 0x2, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x800, 0x0) ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x36}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 25.430402576s ago: executing program 3 (id=5220): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000060000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 25.291142419s ago: executing program 0 (id=5223): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000200000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7", @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=0x3, 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) syz_clone(0x4040280, &(0x7f0000000400)="0d10028d1617bb7d0a9342cc1d01bf53bd26", 0x12, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="c07d0d15f672bf70fce667fb548a2962b83844e7f23cdf3ccab927c77659e7d3446d0302da12beb7301b66ab96528e2b7de8f7a74ab6c44df834b9dafa53a853") bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'xfrm0\x00', 0x2000}) 25.266091702s ago: executing program 3 (id=5224): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000e"], 0x50) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000008000000020000000400000005"], 0x48) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async, rerun: 32) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x0, 0x0}, 0x30) (async) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 32) close(r8) (rerun: 32) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) close(r9) (async, rerun: 64) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r10) 25.059493202s ago: executing program 3 (id=5227): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000dfff0000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) gettid() r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000006c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x35, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x630}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @alu={0x7, 0x1, 0xb, 0x3, 0x5, 0x80, 0xfffffffffffffffc}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @ldst={0x2, 0x2, 0x2, 0xb, 0x1, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x1000000, 0x18, &(0x7f0000000300)=""/24, 0x41100, 0x12, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000340)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000400)=[r5, 0xffffffffffffffff, r5], &(0x7f00000004c0)=[{0x2, 0x4, 0xe, 0x2}, {0x3, 0x5, 0x6, 0xc}, {0x2, 0x1, 0x2, 0x7}, {0x5, 0x2, 0xe, 0x6}], 0x10, 0x3}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$SIOCSIFHWADDR(r3, 0x89f2, &(0x7f0000000040)={'ip6gre0\x00', @random="0600002000"}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='mark_victim\x00', r10, 0x0, 0x51e}, 0x18) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r11}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f0000000500), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50, 0xfffffc00}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x43}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 25.058361942s ago: executing program 4 (id=5228): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x200000000000010d, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) close(r0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b0000000000000000000000010063f2d1413e5c0000000000000000000c000000", @ANYRES32=0x1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000100"/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000140)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=0x0, @ANYRES64=r3, @ANYRESDEC=r1, @ANYRES32=0x0, @ANYRES64=r3, @ANYRES64=r4, @ANYRES32=r2, @ANYRESHEX=r0, @ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003480)={0x0, 0x8, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003540)={0xffffffffffffffff, 0x58, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000003580), 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000035c0)=@bloom_filter={0x1e, 0x9c, 0x271, 0x6, 0x2000, r5, 0x1, '\x00', r6, r7, 0x5, 0x2, 0x5, 0x7}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x4, [@union={0x10, 0x4, 0x0, 0x5, 0x1, 0xe, [{0xf, 0x1, 0x5}, {0x7, 0x0, 0x5}, {0x7, 0x0, 0xbb59}, {0x9, 0x1, 0x2}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x72, 0x0, 0x30, 0x1}, @union={0x1, 0x1, 0x0, 0x5, 0x0, 0x101, [{0xe, 0x5, 0xd902}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x800000}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000600)=""/197, 0x8c, 0xc5, 0x1, 0x0, 0x10000}, 0x28) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000fdffffff0c000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="0000000000000400000000000600"/28], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r6, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x307, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x7, 0x80000000, 0x8, 0x8, 0x10044, 0x1, 0x9fc7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @ldst={0x0, 0x3, 0x3, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @ldst={0x3, 0x2, 0x0, 0xd, 0x1, 0x30, 0xfffffffffffffffc}]}, &(0x7f0000000500)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x3c, '\x00', r6, @fallback=0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x2, 0x10, 0x81, 0x100}, 0x10, 0x0, r2, 0x0, &(0x7f00000009c0), 0x0, 0x10, 0x3}, 0x94) 25.004983967s ago: executing program 0 (id=5230): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x20000000000000b9, &(0x7f0000000680)=ANY=[@ANYBLOB="18090000000000000000000000000001000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb77d6e533324c3a0b3929c0200000000000000000000000000e19b63b29d0aa4aa2a27f7b89088a638f116170f67b09bb24eb1a7b3e7a8c7d1fb4adb7e3c5964408abba55a6c5e5c2d2d32a0baa629f62b86d233ea4905ba286ccc32001e1707e89c91d3ab1c"], 0x0, 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', r0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="850000002200000007000000000000089500000000000000e26c9bd1a6361b80cdd64bdf00000000000869045aac0000659f55df08f9b90788ff7f00000010000029c21ebbcde61d8ab5920aef6c3e007fe61241638962cf0b89ef506cfd3f1d4163d3cfca3733b30070a7cf53021a9554328a702688f92b6b71569d65e33d46f8d8ae24ba69c657afac04379cb536008c219991704f11c5a01ba62ed8f2c6a503dd1b1d076f03b0f917c766f3a7598bbc00feb3bc8e88f79df517b37b56bcbc290080000000000000e675458a43b8a8935bf9cf0be7d0aeaac41405e341d13d244359718ac3dad595712a4051bb6cf826ab757193fc093b8b3353fbbb278d19000000000000007b61805ed430ef06000000000000001e93f640f159320c8b088f4d64977b2eb312d4967aff9e4c14c66c90000054ed82c7cba4c81f91d6dfed18767bf0df584b4b6c4204df411f921e3aa02a67dd324b8176020e9c024751df38c05727f82c92046bfe64babb6d7ba86526b7886a0c2481c5812812a6fa3fca3758cbd8c32b25c28be225bd1f16297baa065f5bf96330fad0aaa4388c06c0eb2ecdf829af9577fcd868cc269b740000b777d73a63246ce6f0467167626329ab91df7a13d9ec9a64e7f6b56aeab8c38f69a213c96e2d2ad7978c9d721c230f27e7025d576535198742d403ec43572d7d0baf00e882617b260627805ca44200335ea4363066944d0aa6feb9705b09ba40d4642519281151f875cbf13a582f90ad719f0eccf02a473dd508a16138904933689ea6ee02412064730700aeff2b69c2f2bf6f691c3560e068743ae8e8771280dac7fd8fdc3f7a35ea352e35753c59ebc1bd27ab6603e6afb1b3f057fbb7ed3aabe702b3c6301d3f5c295d1d69d1541d0e64631c95d6c0999e27e8d1a58f6a00f19102d2bfaf53f25a45637b1c577ae50c4c56d9abc40c64a20c14ff0b1bf4d23fe07ae90f503ba9c64bf89b26e7d8d70710b04f9ece69023acadbb4582272e5b3a0429a5675e5a9554de54945d9a270180e0545b0c824ad36f7cc8be12b3874d5a19349b0ede845e9ece24d546d3af1bae069b89f6ecf2aabb17eb1840bc8e0ed1dd8b9b7eeaf32a185d8fc9a28c6b8e00250a7f2eeb756eadafe20bbc616bc44b347abc8caf722b2c3b06884c1d1690f23b06fa4541bb2a81073b452764f04bd39008b65ee222cf697ac21b087548e9708dffaff2859e973b1e88668c8022cc6dac8548167e5798ec9c7d288a7fa7749f07513187cd8f060abbbc5e37dd1be3aab927be1b409be733b7408534e5b0951e9ecfd0a1c77e3a29be4c4093330124615056e3ce0ce6ac91b1242d3bb2e787a186dc2ec284d60e9d8a03884a22eeaa1efa497ee88c6cb565b164a260afb5157e392b1ebb1a4d4f992011ecbac4a0a6df5bdc6f7994a422bb2761edd2d8f20f5f879a88f89d48b8314f862585e4b7a9d6a6681f40e8b82cc6555dcdb951d164cc9a70e640ac8974faa2587a6e3af3b9458f7d4b4077b3002536b10ea24d73307a33090c4c270909a5322eac32cb175e68fa83457b21465c08c02c0c714c2862ddbe567755f05a1e671328d160d3752345ca1db6e74c720e42afca982ba6befd96c5575f1e88f87ff6606301c0000000000000000000000000000000000000004d0d54b4caf78018766cdb971e8b168d4763c21181f00000003d4e1d842caf457797f93db93e4f38a9dbd79f6bf5dc40b55fdbf9b856665061b2e2924f27eb2d2b5a181ccfd9eeb11dec165b6f12433f00bb06124041ffdcdcdc91f3b3b76635a689c9249cf69bcae65e9f2cc9a5129e385b883c56026d83520395b7d511f607cf2f899c7b1c75e2192f775d72247167285857588ace1115fbebfe63c16b84cf7036d41c493a63c09f2ce46c1f5995c2d7fe58c15e64bb4cb7e7f336cc22fa1ea1363bce375bd3d579be1dddb08ed5147b629e4b3f0e65783ee5e20d9270802f2a7500738bf356131ca53e9d7ba8d486fb26252d684b84fa24639089064ca7b93057c041f12d544dab4d24a4f952b4f265a69ba279929959991b7ac63786055b3c029a0e8b6e4c26497c029bb61462623a58556cd62844d4d23cc738ee5b36c71d2c010b089251d5806000b1ade92dd9f441468967c052aecd9de817394eb580240d556d0f0b4b55d06670597991f37ddc4fa19a6369d5bf76c474633a337f676ad255869881da5cadcf49ce9188129cc978977f87b32bd49457536430ffbd3e01e67ff087644f52fcf0a3c732b0586cb87972c43d2616bf4e521dc3126bf1760243d51a197d3ecfd74bd625e9f496175cfeaaa020817d33d513f3e97854ea76e04e96a8639a297871485a8609f8ca842b3321932c4d9e224a0cec5946cec9e359fd3687415cad5fb8c678136f36d9f781fade9f2469477748f4dfa0f56c3b5a620fc84e1c735647895713cbcea57b2277831f8f633f0d29371e645e5544e57010a9b76457f6ad73231a9f31f6bbb1b95248aeda5a9df9dea643a792bb0910e45fce298ab0a0298fc33a423e860d5b308d7849381b294106af25f15fec047d5b844a99f36e342165df728e381b48c20e0900f8d265157467d3494f2b96acf060f74084760d226f50edb115c2e075f3c663a4b4169b900fa0a13cf796e0d7a9dad86953c13ed6241206d68ae194c64c491de6a531e9bd45abe705f07000a82ccd41a2c1b9d5dd8bf6c28653eb84f117e476e052a9db790e0a71dac9d8b343efebdc026860000000000000000000000000000aad579302085dfdf75bea24798c680b3de341e3bd57543bf74fd58bcebdbb883c743ed43ba7f540f2c4e0310c21e7deff9e45b8bd2cf65bb584091b8e80e34b3e59185fe32d1d73dd4f62712a39b1366c71420b339ec1295f79b1516723b6b80a7e99e5aa6536982c02275fc53fa3ef14d9fccb05f9c4e69a3af0fde863af2d9a0f8a94fc571b0ab4ad714f41fa4ee0bf14a8b44e3c41a3125be95e4b23d5f05395852761bfaebe0db979d5f3991d826cc74542b85cfd0dba66bc93cfd79178ab0b79fa3b29ff9c19e0424513c91980187c9d94b8354337a1fc782505db900c47d83bd49276cfe6e242ba8365b1ea4598a21f50f5415a70990b5bb4a1f6bd8acdf2c7da3d648754767089c9b5ceb556fafa3cc5afd2f3e9a62a90262a76ff89a2751b59a744f0d3f36ca503357daa3e29ce6f357dc1e4839277d003e93fdbb955e1a1302a76aea7e73835094fb15464e94e814c77c293121d0433e80d444c4ca17abaf32b521d8686666055da023aef9c8df3e80d2ed640ed10aa19a036dcef172dbd3b3600b69d7b90c6222e167d7c76059f2b5f3b3004e8a20d1f6612efeb629573be97aa949c6016e7e56283e84986aaa4fc8a098708ebe36f377ada63d9b464c39342e0682549862de3ec75e7b031bc49f341a21417fb6375e8701481b59d1722c836961804666801678eb25750b520bf1615a4bbf30aa74d60ec6b657f2dd298b0419da43fc708a60c94a7ff2fd6a2d08005ad73c9e2d6143d2857be8fb3f12bfa6628bccb153e39172d07563d6a1dc75c347c08060304f091230bd74b49ecdd13bf480db3984622a167c8603b8c501280059a7b6123c8f8cd217f64eccc2dffe4f3a1e8c9a96a13d8126f3ea26779fbd0069d729a7764d4ddd7d9d820b0de2530969362b94b974678527f5bac7eb8d6e321b2be0b2f7534634a5ecd1248d7ad7e8e03163e92e9f1d620e28597bd881eea0981e8adfd70b670b0763ce9226f7c3e156b353e22fdea6942b577bbc539aab23cbd46bdd0ea1e67140c759f208c12dc57f3100000000000000e4965fcb6c2749955eac9476687e63b41c6282bbcb0c3d8b0c9493a3a5f6d879d7257b4b68dc7cac3d9d5f5bbe937c501866ee4042b250e516ec074559e1e551167138766eeecb6941e8305d9cde1800c821536f9d25bd14163890842a08135bdb7a90db630b18f099855a7d9de65c80fa71ff90e873361d0e11a7dfebe56ffb2000b711a0b7914d6351ff60593e48af60e1ffecba7cd6f8ab662eb3c8f3164139e994d6a706afb92722595d649a04f1ff64e5634e7cb9106173a96bf47f7085e7eecdfdc1b6507b851c4ba43312726cfec58dedece1355a087c1b60882713a6161914f09267e2ce8aa886b380add5cd92e185d345c9b2933a78a4215133e8e7247fa444aee30bfb6c17ef537fba43aad323f552c01e17514d5db387e4bf9341ccf5931fc75350f8dcef3ed3e74d674865249b879466f0e3cf0dc9e3d8720ea261e6996b844501e374a0e9878c1d02fd3d6e2ae5d7677892d7a5cdf4b7fa8f315b41552d07495f034e1fa0a2c9a34b7f66638e775dacb33e9b5cd3f4193bdebb7e86090dd265ee2b3ca9bd32d19ef229a050e910263d916670d8006067f5c0a1d8219b4a74b6092656f3b96f060000005ca3eca5d6295a1c11be907fad3bf9ccdf9898a084bbcc0a3714691c6c28fc34c44f9a46d6caf3b93d5d9ad8e3a25d34da57b203af917f5359952468fcddbf43d8fd1add972fd5d361c5be3e8b3280bbfa97e9826163537c99ff461123a1d9f93880feb5f953217f1e633bfb221a7822513278c36abcb6a4009e5037b3f56f9172bd70331817862c5e129d830d4f13e9793dad49b6bf286d2a539d089393d481931735a544f4e86b51a91106ce86d278a0712eab917d843ecc7d031e99d230689210e5afbcbb0a6cff33b40e7b637a8171d7b28fcaee54bb0fb7e2dd92c6cf2130f9fa4482512ae356c5907533108113a9a98b0508e4041df8e99b4136a66f58a6e91e2017dc7e095e8e4776d396797e089e9b42fdee33e76c28a636893510ed71166086bb4c1f3363dfd0abf0b2ea8ceba68c7d9a22a8342059862985d987083d80761bd699c3ee77473263a77ea65eac8a4c3b6b87f399575a15a2db143f6aac363644fd45372d6f43baebc7c3547780d1d079e225962733e0c0d3f364cbe9bcec7caaa8d372da63b213d4554e9ced54c2d59a97b814f1d700"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880bd320d98a61a90401e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x6d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) close(r4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r6, 0x0, 0x3}, 0x18) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 24.979942729s ago: executing program 5 (id=5232): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x5, 0x55ecfc4d, 0x7, 0x10000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x2}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%ps \x00'}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x32, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x1, 0x4d8e91f88f3a7235, 0x1, 0x8, 0xb, 0xfffffffffffffffe}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x43df}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000300)='syzkaller\x00', 0x8, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x1, 0x9, 0x5}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000440)=[r1], &(0x7f0000000480)=[{0x4, 0x4, 0x2, 0x5}, {0x5, 0x5, 0xc, 0x1}, {0x4, 0x1, 0xb, 0x3}, {0x5, 0x1, 0x4, 0x4}, {0x2, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x9}, {0x3, 0x4, 0xf, 0x3}, {0x2, 0x3, 0xa, 0xc}, {0x5, 0x4, 0x2, 0x7}], 0x10, 0x5}, 0x94) close(r2) r3 = getpid() syz_open_procfs$namespace(r3, &(0x7f0000000600)='ns/net\x00') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x1d, &(0x7f0000000640)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @map_val={0x18, 0xf, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x34}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x2a}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000740)='GPL\x00', 0x0, 0x54, &(0x7f0000000780)=""/84, 0x41000, 0x29, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000840)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0x1, 0x2, 0xe0b}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000008c0)=[r1, r1], &(0x7f0000000900)=[{0x0, 0x3, 0x10}, {0x0, 0x1, 0x1, 0x2}, {0x1, 0x4, 0x5, 0x1}, {0x5, 0x3, 0x3, 0x2}], 0x10, 0xff}, 0x94) openat$cgroup_freezer_state(r4, &(0x7f0000000a00), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ac0)={r1, 0x58, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000cc0)={{r4, 0xffffffffffffffff}, &(0x7f0000000c40), &(0x7f0000000c80)='%pS \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x3, &(0x7f0000000b40)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}, @generic={0x7, 0x5, 0x6, 0x9, 0x9}], &(0x7f0000000b80)='syzkaller\x00', 0x7, 0x2a, &(0x7f0000000bc0)=""/42, 0x41000, 0x40, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x3, 0xb, 0x6, 0xa}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000d00)=[r4, r0, r0, r4, r8, r0, r0, r1], &(0x7f0000000d40)=[{0x0, 0x5, 0x6, 0x7}, {0x4, 0x3, 0x6, 0xc}, {0x4, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x6, 0x9}], 0x10, 0x692}, 0x94) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000e40)={'team_slave_1\x00', 0x400}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{r4, 0xffffffffffffffff}, &(0x7f0000000e80), &(0x7f0000000ec0)=r2}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000012c0)={r4, 0x20, &(0x7f0000001280)={&(0x7f0000001100)=""/113, 0x71, 0x0, &(0x7f0000001180)=""/220, 0xdc}}, 0x10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x18, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb24, 0x0, 0x0, 0x0, 0x10001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000001340)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0xa, 0xc, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001400)=[r8, r9, r8], &(0x7f0000001440)=[{0x4, 0x2, 0xc, 0x5}, {0x4, 0x2, 0x3, 0x8}], 0x10, 0x4}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x1f, 0x1, &(0x7f0000000f40)=@raw=[@alu={0x7, 0x0, 0x2, 0x8, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000f80)='GPL\x00', 0x9, 0xb7, &(0x7f0000000fc0)=""/183, 0x41100, 0x2, '\x00', 0x0, @fallback=0x1f, r4, 0x8, &(0x7f0000001080)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x3, 0x6, 0xb, 0xfffffff3}, 0x10, r10, r11, 0x1, &(0x7f0000001540)=[r9, r9, r4], &(0x7f0000001580)=[{0x5, 0x3, 0x4, 0x9}], 0x10, 0x4}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001680)={r4, r12, 0x4, r12}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000016c0), 0x430140, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x7) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001700)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0xc, 0x32, &(0x7f0000001740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @ldst={0x3, 0x2, 0x2, 0xa, 0x8, 0xc, 0xffffffffffffffff}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @alu={0x4, 0x0, 0x9, 0x6, 0x5, 0x50, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}]}, &(0x7f0000001900)='syzkaller\x00', 0x8, 0xa5, &(0x7f0000001940)=""/165, 0x41000, 0x5, '\x00', r6, @fallback=0x18, r4, 0x8, &(0x7f0000001a00)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r10, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000001a40)=[{0x1, 0x3, 0xd, 0xb}, {0x0, 0x2, 0x6, 0xa}, {0x3, 0x3, 0x7, 0x3}, {0x2, 0x5, 0xb, 0x1}, {0x6, 0x3, 0xe, 0x7}, {0x1, 0x3, 0x6, 0x8}, {0x3, 0x1, 0x10, 0x8}], 0x10, 0xb5}, 0x94) mkdirat$cgroup(r4, &(0x7f0000001b80)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001cc0)={@cgroup=r7, 0x11, 0x1, 0x4, &(0x7f0000001bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001c00)=[0x0, 0x0, 0x0], &(0x7f0000001c40)=[0x0], &(0x7f0000001c80)=[0x0], 0x0}, 0x40) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d40)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001d00)={@cgroup=r16, r5, 0xd, 0x2007, r5, @value=r4, @void, @void, @void, r15}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003000)={r4, 0x0, 0xee, 0x60, &(0x7f0000001d80)="9ddd6fd95ecfe441cb3b91a24c6df379972abd4e74b76ac9696af5dfb315e0e20e28eb61dbbd04b4bdf2aca280b136c2ba68b0bb2ba6aad8634b1faacf94289affa86cf068a53d7c68e684271a37db2a0c7733f8e2df3a0999adc10c0160572bf4bb78f22ca1d71247f9bbbbb99a0d93e7f7dfd32d15e3aa574d8acc008b49ec0dc0baf771b87f1b780cee1e8621e2161f5869bf32c9bf73ff99aa70cdb067b860fe69080e4281829ea3dabf5764466f6c82bc543d6fb118432f5e809e2d96f80f9ea951c39daa22e9f2936e7e892cbf8c583567437273b54f896ae120d05e64a16fd03592691780da27cf0d5bcf", &(0x7f0000001e80)=""/96, 0x1, 0x0, 0xf7, 0x1000, &(0x7f0000001f00)="beb4a65895ecb6360cbbc8976b773622f6024a0cfb120370f9a43ac9670f4b2178211b19538d8f9ca5f2e65dc4ac680b9bc6dc1bbd4d1e8d64eddd195f6c6886dd49ffa862a6d43169753a9431f26401d8c5dcc067ba035c1f94e79674b2bdb924ad93cef81c5b24212ed2ad6a6c3a9069aa958eff807f0bf0d50f515b1aeca457f037547c7936125068a330fca752f355469b2fb3335340994817feef7b1a05c713ecf9c64045ed6803d320f68efd0f4ac22652ca500550eb91d115c90fa2314a6f44e9a3b3100d1e76da2d96b4417a007711168ae2349bd4d8187224e10f49e2b04cae223b8ef5e2dba531d0fcbaea201eeb68108bec", &(0x7f0000002000)="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", 0x0, 0x0, 0xd492}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)) bpf$TOKEN_CREATE(0x24, &(0x7f00000030c0)={0x0, r14}, 0x8) 24.97023843s ago: executing program 2 (id=5233): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x7, 0x28, 0x1, 0x9, 0x0, 0x1, 0x1000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x4}, 0x100810, 0x4, 0x4, 0x1, 0x7ff, 0xffff4be2, 0xfc43, 0x0, 0x9}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000002c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088be"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(r4) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000740)=ANY=[@ANYRES64=r6, @ANYRES64=0x0, @ANYRESHEX, @ANYRES16=r1, @ANYRES8=r8, @ANYRESOCT=r4, @ANYRESDEC=r0, @ANYRES8=r5, @ANYRES16=0x0], 0xfdef) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r9, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/203, 0xcb, 0x0, &(0x7f0000000600)=""/83, 0x53}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e00)=r10, 0x4) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0), 0xc0400, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r11}, 0x0, &(0x7f0000000040)}, 0x20) getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0x60}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 24.853111871s ago: executing program 5 (id=5234): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r0, 0x58, &(0x7f0000000fc0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x2e}, @call={0x85, 0x0, 0x0, 0xb3}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x18) recvmsg$unix(r1, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e3301000000000000006902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf321f03c11f85620d598577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000001200)="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", 0x118}, {&(0x7f0000001180)="a68cde4d56b170df7710b54f6b4c4eab8117d9a39c4f4c59a3dfc11dc73edd0c8acde45ba8c76c548afacdf91e9755a22752b65bd0034a59c8fbdf018ac40f4fd535f7f3a90da0b97208c07dca6611c5a89df8f9379385fec3df907457802d0000", 0x61}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)}, 0x0) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 24.216245192s ago: executing program 4 (id=5235): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9, '\x00', r2, r3, 0x3, 0x1}, 0x50) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6}]}) 24.179740346s ago: executing program 3 (id=5236): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r0}, 0x18) (async, rerun: 32) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async, rerun: 32) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x541b, 0x0) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) socketpair(0x2b, 0x2, 0x6e07, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) (async, rerun: 32) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x77, 0x7fe2, 0x4, 0x40000, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0xd}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)=r5}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 24.125023231s ago: executing program 0 (id=5237): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'blkio'}, {0x0, 'net_cls'}, {0x2b, 'io'}, {0x6, 'cpu'}, {0x2b, 'devices'}]}, 0x22) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x1ff) r2 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') openat$cgroup_pressure(r1, &(0x7f00000001c0)='memory.pressure\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x40800, 0x0) socketpair(0x25, 0x800, 0x5, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000640)={&(0x7f0000000280)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000002c0)="75198b0d1095c04e2e20e0ccc6c409ce1a49c4c8133eb5bddc8263110d25f0fa76e5f020b91d2d3486c48c6e68628a157183fabe1ac4a92a4a", 0x39}, {&(0x7f0000000300)="6f9ba77c9ddde26bb85cca386ca8862c49036bb5ed6b260817674d1b65557c228a896b6ecf54f03b7a4921d9753072a761951e51790c813aed18a6a207a6e4930da6f4fb0920cdbd5656aed877f39c290fd6b84dc9bc7c8a097a89accb5c6897b70d480e6b6decf8a8dcfca3c3ff78a80cb25b747c8dafe04abcb69c64f77e235e18a0d09a98effd9b5acac59b04a178b02b2faab97d20cbda7ae77978604752912c6ac1ac1d432a5aacd2f2f368e2dc1b30e2c1888ed79b0f71ec4c50d5514b796c2188fd3d866023e472b66fc9", 0xce}, {&(0x7f0000000400)="2e218e1830df8c7c78b4ef11d77be42f8885f44ad6ba34ce5e3a7cd9a20af2df780cbb7c610b3c9577020a0c4eaa8f01190c76e3ad9c914291d128890bf22684c268c694c13976cc336b5ad15d8cbaa1d6da59ebd8e601e7fe27c8c6024061fcf0840059e7bd8d5ecf4d536c0909fee5f9c8036d4978907d62a22146255ade7f30fb53b9337c216f148d4cc8d4c426b295b073d5edcc8284639fc03b81cf2bf13af8bacd7b266ba799ff28a06230588b40eedbd93dd32adcccf36f", 0xbb}, {&(0x7f00000004c0)="fc6dd7a1736174986d85ccbbbeb2a76d8a7017e9e0d0e7396f7bf19b1ab640753ec839f948cadd48a6ef1a8ccd45bcb4592d99151db0a455bcc8a58ca3", 0x3d}, {&(0x7f0000000500)="f5ba4f7cfb100fdf53a6567182649134ea5495da3e2f878a17e24cfdd9122b16d419", 0x22}, {&(0x7f0000000540)="bb5258ccb24c91cdeecc409680c25453794fd69cb246ce7f6b5f7f114a789cdafaf60271a8a26777b067718eb0e6fcdde01fce4a0b8c819a7bb22a527faaa5f5a3b0a0f9409dbc044b2a144e87eceafbe5490776aa8b03d318f9777261700e3a8668079254278decc9f1f3ca7a26ac99319c9f357d394cfaf44f", 0x7a}], 0x6}, 0x0) openat$cgroup_type(r1, &(0x7f0000000680), 0x2, 0x0) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg(r5, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000700)=""/251, 0xfb}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/97, 0x61}, {&(0x7f0000001880)=""/148, 0x94}, {&(0x7f0000001940)=""/239, 0xef}, {&(0x7f0000001a40)=""/164, 0xa4}, {&(0x7f0000001b00)=""/78, 0x4e}], 0x7, &(0x7f0000001c00)=""/41, 0x29}, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000001c80), 0x2, 0x0) sendmsg(r5, &(0x7f0000001fc0)={&(0x7f0000001cc0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d40)="9a00f1800e5b201793000d7aae711b0c870609e416843f94bc4f526591cac5753a597ea701842bd998ff7db278843e8536d0a95bc76383dce250eae60d9f931f54bcaaf97e6c019918815625561a58d641a5312cbcd275140dc0ab4ac2c07b9371f69659db049fefcb5de56f587a1996a7551cf3c693a8665cf1869deead961021c288788c6de7f1e823fa4924254f16f7bb18788de2ed405a6b126b68e9941e58800aa2e303773776c5fddce2129a4507561a9f4a395e01afcb4a156f031bde7f6211ef8ab6acffb15febf623e4a5b52170444b7b9eb58cde1050a104527f6d0875758312129c3aa069cff6a689c5d9", 0xf0}], 0x1, &(0x7f0000001e80)=[{0x10, 0x1, 0x6f7}, {0x110, 0x110, 0x3, "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"}], 0x120}, 0x20000040) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000023c0)={0xffffffffffffffff, 0xe0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f00000021c0)=[{}], 0x8, 0x10, &(0x7f0000002200), &(0x7f0000002240), 0x8, 0xd1, 0x8, 0x8, &(0x7f0000002280)}}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002480)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, r3, 0x1, 0x2, 0x2}, 0x50) r8 = openat$cgroup_ro(r1, &(0x7f0000002500)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7e3}, 0x50) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000025c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000026c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000002640), &(0x7f0000002680)='%-010d \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002780)={0x6, 0xf, &(0x7f0000002000)=@raw=[@exit, @alu={0x7, 0x1, 0x1, 0x4, 0xf, 0x50, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x6, 0x6, 0x9, 0xfffffffffffffff0, 0x1}, @alu={0x8, 0x0, 0x7, 0x4, 0x7, 0xffffffffffffffe0}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}], &(0x7f0000002080)='syzkaller\x00', 0x2, 0x6, &(0x7f00000020c0)=""/6, 0x1f00, 0x0, '\x00', r6, 0x25, r0, 0x8, &(0x7f0000002400)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x0, 0x3, 0x8001, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002740)=[r7, r8, 0xffffffffffffffff, r9, 0x1, r10, r11, r12], 0x0, 0x10, 0x81}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000028c0)={{r7, 0xffffffffffffffff}, &(0x7f0000002840), &(0x7f0000002880)=r13}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002b00)={{r10, 0xffffffffffffffff}, &(0x7f0000002a80), &(0x7f0000002ac0)=r13}, 0x20) r16 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002b80)=@o_path={&(0x7f0000002b40)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002c80)={0x6, 0x11, &(0x7f0000002900)=@raw=[@jmp={0x5, 0x0, 0x3, 0x3, 0x7, 0x0, 0x1}, @alu={0x7, 0x1, 0x2, 0x5, 0x1, 0x1d0, 0xfffffffffffffff0}, @exit, @call={0x85, 0x0, 0x0, 0x22}, @cb_func={0x18, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000029c0)='syzkaller\x00', 0x101, 0x1a, &(0x7f0000002a00)=""/26, 0x41100, 0x24, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002a40)={0x582e, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002bc0)=[r9, r15, r9, r10, r16, 0x1], &(0x7f0000002c00)=[{0x2, 0x3, 0x10}, {0x4, 0x2, 0x4, 0x7}, {0x3, 0x4, 0x4, 0x5}, {0x0, 0x1, 0x6, 0x8}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002d80)={&(0x7f0000002d40)='cachefiles_ref\x00', r8, 0x0, 0x4}, 0x18) write$cgroup_int(r8, &(0x7f0000002dc0)=0xc6, 0x12) 24.116709812s ago: executing program 4 (id=5238): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4f) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x4d53}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x4d53}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0x1, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000003f62ac9b74f80628cec49e99ae3547099a4afda1ec2b6fcf72acc400063fffc5af1ab946508020029bd4af86b46455759849510f6cc83ab4f3d29e40cf155f18d6781c2c916fefc62b13395cb061021e22595fcb475895aebfd089", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18005a0003000000000200000018118000000000", @ANYRESDEC, @ANYRESHEX=r3], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000562300", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000562300", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000000000000000000a9760000ed171200"/36, @ANYRESOCT=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000000000000000000a9760000ed171200"/36, @ANYRESOCT=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r7}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT=r6, @ANYRESDEC=r4, @ANYRES16=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000780)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000800000018310000176341cbbf19020b3db1473575e440ab8006d2fbb6c1b9711fcc8b56aa3247d2ac4bc4cff279", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r5, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r11}, 0x10) close(r3) recvmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x15, 0x0, 0x0, &(0x7f00000004c0), 0x18}, 0x12061) (async) recvmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x15, 0x0, 0x0, &(0x7f00000004c0), 0x18}, 0x12061) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=r7], 0x48) 24.104455193s ago: executing program 3 (id=5239): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000050000000200000000100000", @ANYRES32, @ANYBLOB="f500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0x4e22}, 0x6e, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2829}, 0x7340, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x100}, 0x50) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8a, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0xffffffff, '\x00', r6, r7, 0x5, 0x2, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r8}, 0x10) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000001080)=ANY=[@ANYBLOB="08000000040000000400000022bf0000000000002a", @ANYRES32, @ANYBLOB="ffffffff00"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) 24.064873687s ago: executing program 2 (id=5240): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/203, 0xcb, 0x0, &(0x7f0000000600)=""/83, 0x53}}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114c00000000009500000000001af2"], &(0x7f0000000000)='GPL\x00'}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x400}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000740)='syzkaller\x00', 0x4e2d, 0xba, &(0x7f0000000780)=""/186, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x1, 0x6, 0x7041}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[r5, r1, r5], &(0x7f0000000900)=[{0x5, 0x5, 0x6, 0x1}, {0x5, 0x2, 0x0, 0x8}], 0x10, 0xffffffff}, 0x94) unlink(&(0x7f00000006c0)='./cgroup\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000a00)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x50) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f00000003c0)=0x1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) mkdirat$cgroup(r1, &(0x7f0000001040)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r4, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000ac0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], 0x0, 0x53, &(0x7f0000000bc0)=[{}, {}], 0x10, 0x10, &(0x7f0000000c00), &(0x7f0000000c40), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e00)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x18, 0x2, &(0x7f0000000700)=@raw=[@alu={0x4, 0x0, 0x2, 0x1, 0x3, 0x8, 0x4}, @jmp={0x5, 0x1, 0x8, 0x7, 0x6, 0x20, 0xfffffffffffffffc}], &(0x7f0000000a80)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x10, '\x00', r9, 0x0, r10, 0x8, &(0x7f0000000e40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0xb, 0x80000000, 0xa7}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000ec0)=[r5, r5, r7], &(0x7f0000000f00)=[{0x1, 0x4, 0xa, 0x5}, {0x4, 0x3, 0x10, 0x3}, {0x1, 0x4, 0x10, 0x8}, {0x2, 0x2, 0x4}, {0x0, 0x5, 0xd, 0xa}, {0x1, 0x4, 0x9, 0x7}, {0x1, 0x3, 0xe, 0x4}, {0x3, 0x3, 0x4, 0x7}], 0x10, 0x1}, 0x94) close(r3) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000680)) 24.059657167s ago: executing program 0 (id=5241): openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x4, 0x80, 0xb9, 0x0, 0x0, 0x80, 0x0, 0x4, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xc, 0x5}, 0x410, 0x2000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x144a8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x20000992) 24.058948638s ago: executing program 4 (id=5242): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) (rerun: 32) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async, rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffc6e) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000000000100000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000050000800000000000000000000000000000000000d7"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r5}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x3d) (rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000080)='signal_generate\x00', r7}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r9, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(r3) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 24.000966793s ago: executing program 5 (id=5243): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000009c0)=ANY=[@ANYRES16=r3, @ANYRESHEX=r0, @ANYRES64=r7, @ANYRESOCT=r0, @ANYRES16=r7, @ANYRES8=r5, @ANYRES64, @ANYRESHEX=r3, @ANYRESHEX=r6, @ANYRES16=r2, @ANYRES64=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r10, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0xae, &(0x7f00000001c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xfa, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x23, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3c09}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_fd={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x34}]}, &(0x7f0000000680)='GPL\x00', 0x80000001, 0x2f, &(0x7f0000000780)=""/47, 0x40f00, 0x0, '\x00', r11, @fallback=0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x3, 0x10, 0x7f, 0x7}, 0x10, r12, r10}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x7, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0xc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f00000001c0)='syzkaller\x00', 0x8001, 0x1000, &(0x7f0000000b00)=""/4096, 0x40f00, 0x1, '\x00', r11, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x401, 0x8}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000002c0)=[{0x4, 0x2, 0x0, 0x3}, {0x4, 0x5, 0x4, 0xa}], 0x10, 0x101}, 0x94) socketpair(0x29, 0x80000, 0xda, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 24.000223263s ago: executing program 0 (id=5244): r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x102}, 0x0, 0xafffffffffffffff, r0, 0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x3a, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000100181100", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) syz_clone(0x800900, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r6, @ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230041) close(r1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="180800000000000000000000000000008510000005000000850000008b000000a70000000000000018000000000000000000000000000000950000000000000095000000000000009167691cb3ab69e7fb1a4759ed0d4a8f533866f09da06191b68f"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) 23.976087125s ago: executing program 2 (id=5245): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e0000000400"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r3, &(0x7f0000000040)={[{0x2d, 'pids'}]}, 0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 23.815272921s ago: executing program 5 (id=5246): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 23.520641739s ago: executing program 4 (id=5247): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5ff}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000340)=""/234}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000600), 0x8) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4b, 0x4b, 0x5, [@datasec={0x7, 0x4, 0x0, 0xf, 0x3, [{0x1, 0x7, 0x10001}, {0x5, 0x5, 0x4}, {0x5, 0xee8f, 0xfffffffd}, {0x1, 0xff, 0x8}], "04587a"}, @typedef={0x3, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f00000004c0)=""/105, 0x69, 0x69, 0x0, 0xcfa}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x3, '\x00', r9, r10, 0x0, 0x5, 0x2}, 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x3, '\x00', r9, r10, 0x0, 0x5, 0x2}, 0x50) 23.513827539s ago: executing program 2 (id=5248): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x7}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x1c, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000640)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0x4, 0x1, 0x1, 0xffffffffffffffc0, 0xfffffffffffffffc}], &(0x7f00000006c0)='syzkaller\x00', 0xd, 0xb4, &(0x7f0000000700)=""/180, 0x41100, 0x44, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x5, 0x5, 0x7, 0x3ff}, 0x10, 0xe960, 0xffffffffffffffff, 0x8, &(0x7f0000000800)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000840)=[{0x5, 0x4, 0xa, 0x9}, {0x4, 0x3, 0x0, 0x4}, {0x4, 0x5, 0x6, 0xc}, {0x4, 0x2, 0xe, 0x8}, {0x3, 0x5, 0x1, 0x4}, {0x2, 0x5, 0x9, 0xc}, {0x5, 0x3, 0x0, 0x8}, {0x5, 0x1, 0xa, 0xc}], 0x10, 0x800}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='net_prio.prioidx\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{0x1, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)='%ps \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x1c, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x66e5, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0xffff, 0x49, &(0x7f0000000200)=""/73, 0x40f00, 0x1, '\x00', r2, 0x17, r3, 0x8, &(0x7f00000005c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x2, 0x9, 0x3}, 0x10, 0x1ebeb, r4, 0x5, &(0x7f0000000a80)=[r5, 0xffffffffffffffff, r6], &(0x7f0000000ac0)=[{0x0, 0x1, 0x0, 0x6}, {0x3, 0x5, 0xb, 0x8}, {0x4, 0x1, 0x1, 0x2}, {0x0, 0x2, 0x5, 0x6}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{r5, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000c40)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000dc0)={r1, &(0x7f0000000cc0)="79bc8f7dbf56d31dbea53320ba439234a7883eab9827898f149e478fe3d98c7f292fc8b7a10feafa11fb48d49396555029cf83041d55198adbcdd250b80540817a33e42de1c8690378980fe579c7cd517d6fc31484f27252002552a843075bdc0d5d417294857b", &(0x7f0000000d40)=""/88}, 0x20) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000fc0)={0xffffffffffffffff}, 0xc) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x86d, '\x00', r2, r3, 0x1, 0x0, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x11, 0xf, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x9}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x34ac}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000e80)='GPL\x00', 0x8, 0x61, &(0x7f0000000ec0)=""/97, 0x41100, 0x0, '\x00', r2, 0x0, r5, 0x8, &(0x7f0000000f40)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000f80)={0x2, 0x10, 0x6, 0xffffeb67}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001080)=[r8, r6, r0, r7, r1, r7, r5, r1, r7, r9], &(0x7f00000010c0)=[{0x5, 0x4, 0x3, 0x4}, {0x1, 0x3, 0x1, 0xc}], 0x10, 0x8000}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000023c0)={&(0x7f00000011c0)="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", &(0x7f00000021c0)=""/219, &(0x7f00000022c0)="1974553c2d2f52d7ff9b210bd33ec60720888bb94ca33ddc638500a229033cca9a1bea781896997db8bfd3abf5a04c9f29a0ede3bf6a2b506f7bb3a07706ac008db8cab6ec4741dcbbe33f14f30836ac2786cf0361da82a6d44765d541d1078f26aa95c8c0d8212497afbe3fc5377a147d3695205ccf4b226e14be9d1125cf31f911a4d71f8d3643", &(0x7f0000002380)="490a01518ed053fd0536", 0x3, r8, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000002400)=0x7fff) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002440)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x2, '\x00', r2, r3, 0x1, 0x4, 0x2}, 0x50) perf_event_open$cgroup(&(0x7f00000024c0)={0x1, 0x80, 0x7, 0x4, 0x3, 0xfd, 0x0, 0x7, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0xffffffffffff1885, 0x7}, 0x20, 0x20, 0x2, 0x1, 0x7, 0x5, 0x0, 0x0, 0x1, 0x0, 0xffff}, r1, 0xe, 0xffffffffffffffff, 0x6) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002540)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x2, '\x00', r2, 0xffffffffffffffff, 0xfffffff0, 0x2}, 0x50) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000025c0)={r5}, 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002600)={r11, r4, 0x4, r5}, 0x10) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000002640)={'nr0\x00', 0x400}) openat$cgroup_pressure(r11, &(0x7f0000002680)='memory.pressure\x00', 0x2, 0x0) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000026c0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x800, '\x00', r2, r3, 0x1, 0x4, 0x4}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002840)={@cgroup=r11, 0x1d, 0x0, 0x1, &(0x7f0000002740)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000002780)=[0x0, 0x0, 0x0], &(0x7f00000027c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002800)=[0x0, 0x0]}, 0x40) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002980)={&(0x7f0000002880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x9, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f, 0x0, 0x2e]}}, &(0x7f00000028c0)=""/170, 0x2d, 0xaa, 0x0, 0x5}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@generic={&(0x7f00000029c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000003bc0)={&(0x7f0000002a40)="04d83508776cc8c471d589fbe21f12ab4284", &(0x7f0000002a80)=""/73, &(0x7f0000002b00)="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", &(0x7f0000003b00)="f7d55d8af88d329fb3ed22a23460e94e761066325819b985145c1b9c87d8d50d6d2baf2cf7a47d4b65a22b3f2c43be6b7b7e0d1a23a88c61275c0aadc440a590947a56c407f85b2e007ea34a713debbfc2004a90b443bdd4a2707f61e85af29d64044930f3000f57e0ccad87c7294c6665364e3c9e8782798afab72f93c93af0f04a2724af5f13d0e14dbd4de9760ffd4c88f8af3893cb148b8b6add4eae93bb2131445c61b29fc854cd1cce234e7a1a48e6fb32046e50b0050bfffdb25d", 0x8000, r5}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003c80)={r12, 0x58, &(0x7f0000003c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000003cc0)={0x1b, 0x0, 0x0, 0xffffffff, 0x0, r10, 0x10, '\x00', r14, r13, 0x1, 0x5, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000003d40)=@bloom_filter={0x1e, 0xfffffffe, 0x5, 0x9f6e, 0x40080, r7, 0x7, '\x00', r14, r13, 0x3, 0x4, 0x4, 0x1}, 0x50) 23.244867015s ago: executing program 2 (id=5249): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000023b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000020000000000000003c153098f029c10000e368ab59d76186b790d077624db7737667a2e0acf94bbeb02202ce08c1cccdecd635166993e23983215c117534dd16ace447cb", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async, rerun: 64) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46024, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0xfffffffffffffffb, 0x0, 0x0, 0x80000001, 0x0, 0x39, 0x0, 0x1fd}, 0x0, 0xb, 0xffffffffffffffff, 0x9) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb01001800002800000028000000060000000100000000680984a1e500000d0000000000000e010000000100000008000000000000080100000000002e4161000000000000", @ANYRESOCT], &(0x7f00000005c0)=""/181, 0x46, 0xb5, 0x0, 0xff}, 0x28) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000006c0)='rpc_stats_latency\x00', r4, 0x0, 0xffffffffffff8000}, 0x28) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000}, 0x4210, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007110aa00000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, 0x0, 0x5}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xad30a693ff6479a3) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x20, &(0x7f00000009c0)=ANY=[@ANYBLOB="18130000", @ANYRES32=r3, @ANYBLOB="0000000000000000ee65060001000000185900001100000000000000000000001800000009000000000000000800000007570900ff0100001c820b004eb5bbadb7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="000000000000009c0543f9070000007b8af8ff0008000000a209090000000000000088d316d7b7a1e3548f869f2c390000b76e4f1b4ed053106972762425bde2266533ea0739d916ec3c51813495eda026031d4fcf493601000000c7dd16515bd4"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) (rerun: 64) 23.243276445s ago: executing program 0 (id=5250): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x15, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xfbcb26cf476f522b, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xfe0f183f06ec5d87, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x4, 0xfffffff8, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10048, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@var, @fwd, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x6}]}}, 0x0, 0x4e}, 0x28) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 23.242075085s ago: executing program 5 (id=5251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1a9) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000004cc2f5cc359e9000000e398650b14dc04ffe4f8d60000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@cgroup, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000540), 0x6e, &(0x7f0000000b80)=[{&(0x7f00000005c0)=""/106, 0x6a}, {&(0x7f0000000640)=""/95, 0x5f}, {&(0x7f00000008c0)=""/238, 0xee}, {&(0x7f0000000780)=""/90, 0x5a}, {&(0x7f0000000a00)=""/188, 0xbc}, {&(0x7f0000000ac0)=""/137, 0x89}], 0x6, &(0x7f0000000400)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x3101) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 23.241337645s ago: executing program 2 (id=5252): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYRESHEX], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x418c80, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008001400850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x20000, 0xffffffffffffffda, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, 0x0, 0x40c5) close(r6) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0, 0x0, 0x100}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)) 23.241066725s ago: executing program 5 (id=5253): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x3, 0x200000000000009a, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x4, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2b00dbf6e97158cf474fec87891f6d76745b686158bbcfe8875afdef0001000000002b"], 0x66) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 23.240706376s ago: executing program 3 (id=5254): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000ff840000008600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) (async) r5 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x3, 0x0, 0x7, 0x0, 0x7602, 0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0xfffffffd}, r5, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000040)=r5, 0x12) (async) syz_clone(0x46085300, 0x0, 0xfffffffffffffda0, 0x0, 0x0, 0x0) 2.151255295s ago: executing program 33 (id=5250): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x15, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xfbcb26cf476f522b, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xfe0f183f06ec5d87, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x4, 0xfffffff8, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10048, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@var, @fwd, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x6}]}}, 0x0, 0x4e}, 0x28) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 2.125580797s ago: executing program 34 (id=5253): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x3, 0x200000000000009a, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x4, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2b00dbf6e97158cf474fec87891f6d76745b686158bbcfe8875afdef0001000000002b"], 0x66) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.09447123s ago: executing program 35 (id=5252): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYRESHEX], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x418c80, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008001400850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x20000, 0xffffffffffffffda, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, 0x0, 0x40c5) close(r6) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0, 0x0, 0x100}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)) 2.067317243s ago: executing program 36 (id=5254): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000ff840000008600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) (async) r5 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x3, 0x0, 0x7, 0x0, 0x7602, 0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0xfffffffd}, r5, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000040)=r5, 0x12) (async) syz_clone(0x46085300, 0x0, 0xfffffffffffffda0, 0x0, 0x0, 0x0) 2.044473115s ago: executing program 37 (id=5247): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5ff}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000340)=""/234}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000600), 0x8) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4b, 0x4b, 0x5, [@datasec={0x7, 0x4, 0x0, 0xf, 0x3, [{0x1, 0x7, 0x10001}, {0x5, 0x5, 0x4}, {0x5, 0xee8f, 0xfffffffd}, {0x1, 0xff, 0x8}], "04587a"}, @typedef={0x3, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f00000004c0)=""/105, 0x69, 0x69, 0x0, 0xcfa}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x3, '\x00', r9, r10, 0x0, 0x5, 0x2}, 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x3, '\x00', r9, r10, 0x0, 0x5, 0x2}, 0x50) 0s ago: executing program 6 (id=5255): socketpair(0x25, 0x805, 0x84, &(0x7f0000000000)) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={r0, 0x38, 0xfffffffffffffffe}, 0xe) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0x90) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x23a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xd, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x8}, 0x8340, 0xc8, 0xffffffff, 0x0, 0x0, 0x341, 0x0, 0x0, 0x0, 0x0, 0xb6e}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB="0000180000103100000000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) kernel console output (not intermixed with test programs): cuous mode [ 56.944583][ T2045] device veth0_vlan entered promiscuous mode [ 57.927201][ T2114] syz.1.483[2114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.927260][ T2114] syz.1.483[2114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.195799][ T24] audit: type=1400 audit(1766651244.830:141): avc: denied { create } for pid=2115 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 58.420863][ T24] audit: type=1400 audit(1766651245.060:142): avc: denied { create } for pid=2137 comm="syz.2.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 58.557161][ T24] audit: type=1400 audit(1766651245.190:143): avc: denied { read } for pid=2147 comm="syz.2.495" name="cgroup.subtree_control" dev="cgroup2" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.683302][ T2159] syz.1.496[2159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.683365][ T2159] syz.1.496[2159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.902574][ T2168] tap0: tun_chr_ioctl cmd 1074025673 [ 58.921760][ T2174] tap0: tun_chr_ioctl cmd 1074025680 [ 58.936017][ T2172] tap0: tun_chr_ioctl cmd 1074025680 [ 60.239851][ T2246] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.248299][ T2246] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.920771][ T24] audit: type=1400 audit(1766651247.560:144): avc: denied { create } for pid=2284 comm="syz.3.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 62.331567][ T24] audit: type=1400 audit(1766651248.970:145): avc: denied { create } for pid=2358 comm="syz.2.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 62.945715][ T2389] device veth0_vlan left promiscuous mode [ 63.001402][ T2389] device veth0_vlan entered promiscuous mode [ 63.541672][ T2427] device sit0 left promiscuous mode [ 63.572357][ T2427] device sit0 entered promiscuous mode [ 63.907235][ T2459] device wg2 entered promiscuous mode [ 64.778119][ T2493] device pim6reg1 entered promiscuous mode [ 64.867971][ T2510] device wg2 left promiscuous mode [ 65.340545][ T2528] device sit0 left promiscuous mode [ 65.434763][ T2529] device sit0 entered promiscuous mode [ 68.304775][ T2625] device syzkaller0 entered promiscuous mode [ 68.501208][ T2636] syz.1.640[2636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.501297][ T2636] syz.1.640[2636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.829217][ T2720] device bridge_slave_1 left promiscuous mode [ 69.870215][ T2720] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.901802][ T2720] device bridge_slave_0 left promiscuous mode [ 69.924983][ T2720] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.203338][ T2724] device syzkaller0 entered promiscuous mode [ 70.746949][ T2751] device syzkaller0 entered promiscuous mode [ 70.864096][ T2755] device syzkaller0 entered promiscuous mode [ 71.638394][ T2772] device sit0 left promiscuous mode [ 71.969408][ T2772] device sit0 entered promiscuous mode [ 72.074756][ T2789] device veth0_vlan left promiscuous mode [ 72.206567][ T2789] device veth0_vlan entered promiscuous mode [ 72.789267][ T2809] device sit0 left promiscuous mode [ 72.845830][ T2809] device sit0 entered promiscuous mode [ 72.890891][ T2820] device pim6reg1 entered promiscuous mode [ 73.265463][ T2841] device wg2 entered promiscuous mode [ 74.859823][ T2936] device pim6reg1 entered promiscuous mode [ 75.158569][ T2956] device veth1_macvtap left promiscuous mode [ 75.287712][ T2960] device veth1_macvtap entered promiscuous mode [ 75.328781][ T2960] device macsec0 entered promiscuous mode [ 76.127743][ T2992] device wg2 entered promiscuous mode [ 78.250618][ T3096] device syzkaller0 entered promiscuous mode [ 78.423631][ T3112] device veth0_vlan left promiscuous mode [ 78.455264][ T3112] device veth0_vlan entered promiscuous mode [ 78.501888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.530653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 78.566181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.252179][ T3203] device syzkaller0 entered promiscuous mode [ 82.162154][ T24] audit: type=1400 audit(1766651268.770:146): avc: denied { create } for pid=3225 comm="syz.1.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 82.683926][ T3237] device pim6reg1 entered promiscuous mode [ 83.085068][ T24] audit: type=1400 audit(1766651269.720:147): avc: denied { create } for pid=3246 comm="syz.1.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 84.751130][ T24] audit: type=1400 audit(1766651271.390:148): avc: denied { create } for pid=3326 comm="syz.1.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 84.968407][ T3353] device pim6reg1 entered promiscuous mode [ 85.085010][ T3363] device veth1_macvtap left promiscuous mode [ 85.098194][ T3362] device veth1_macvtap entered promiscuous mode [ 85.104767][ T3362] device macsec0 entered promiscuous mode [ 85.258168][ T3382] device syzkaller0 entered promiscuous mode [ 85.280154][ T3382] device syzkaller0 left promiscuous mode [ 85.889496][ T3412] tun0: tun_chr_ioctl cmd 1074025692 [ 86.615151][ T3496] device syzkaller0 entered promiscuous mode [ 86.786529][ T3507] device wg2 left promiscuous mode [ 86.903110][ T24] audit: type=1400 audit(1766651273.540:149): avc: denied { create } for pid=3515 comm="syz.4.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 86.965291][ T3511] device syzkaller0 entered promiscuous mode [ 86.980652][ T3507] device wg2 entered promiscuous mode [ 87.400012][ T24] audit: type=1400 audit(1766651274.030:150): avc: denied { create } for pid=3541 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 87.480652][ T3535] device syzkaller0 entered promiscuous mode [ 87.957117][ T3558] device pim6reg1 entered promiscuous mode [ 88.974057][ T3613] device veth1_macvtap left promiscuous mode [ 89.003714][ T3613] device macsec0 left promiscuous mode [ 89.108250][ T3616] device veth1_macvtap entered promiscuous mode [ 89.135765][ T3616] device macsec0 entered promiscuous mode [ 91.433475][ T3632] cgroup: fork rejected by pids controller in /syz1 [ 92.213300][ T3666] : renamed from syzkaller0 [ 92.449905][ T3668] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.457191][ T3668] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.465386][ T3668] device bridge_slave_0 entered promiscuous mode [ 92.559585][ T3668] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.576189][ T3668] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.617903][ T3668] device bridge_slave_1 entered promiscuous mode [ 92.758083][ T24] audit: type=1400 audit(1766651279.400:151): avc: denied { append } for pid=3711 comm="syz.0.942" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 92.846135][ T3718] device sit0 entered promiscuous mode [ 93.049516][ T24] audit: type=1400 audit(1766651279.690:152): avc: denied { create } for pid=3668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.101486][ T24] audit: type=1400 audit(1766651279.690:153): avc: denied { write } for pid=3668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.101678][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.136069][ T24] audit: type=1400 audit(1766651279.690:154): avc: denied { read } for pid=3668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.158768][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.186135][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.203351][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.225412][ T470] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.232660][ T470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.255745][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.282907][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.296329][ T470] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.303556][ T470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.322151][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.332187][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.364186][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.385685][ T3746] cgroup: fork rejected by pids controller in /syz4 [ 93.396336][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.427385][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.451808][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.463532][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.481120][ T3668] device veth0_vlan entered promiscuous mode [ 93.512912][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.523486][ T3760] device sit0 entered promiscuous mode [ 93.663244][ T3668] device veth1_macvtap entered promiscuous mode [ 93.760383][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.769431][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.787585][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.808834][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.049551][ T3768] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.056873][ T3768] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.108473][ T3768] device bridge_slave_0 entered promiscuous mode [ 94.167285][ T7] device veth1_macvtap left promiscuous mode [ 94.205372][ T7] device veth0_vlan left promiscuous mode [ 94.326088][ T3768] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.350468][ T3768] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.379191][ T3768] device bridge_slave_1 entered promiscuous mode [ 94.881187][ T3811] device sit0 left promiscuous mode [ 95.054475][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.064849][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.114037][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.141883][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.150802][ T470] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.157976][ T470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.165988][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.175238][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.184186][ T470] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.191482][ T470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.238148][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.250661][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.259314][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.277247][ T3821] device wg2 entered promiscuous mode [ 95.363328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.378072][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.389674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.398119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.406645][ T3768] device veth0_vlan entered promiscuous mode [ 95.438077][ T3837] syz.1.976[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.438135][ T3837] syz.1.976[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.604178][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.629974][ T3768] device veth1_macvtap entered promiscuous mode [ 95.780553][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.809068][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.848515][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.862401][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.581879][ T7] device veth1_macvtap left promiscuous mode [ 98.004203][ T3922] device syzkaller0 entered promiscuous mode [ 98.570209][ T3951] device veth1_macvtap left promiscuous mode [ 98.576854][ T3951] device macsec0 left promiscuous mode [ 99.161577][ T3982] device syzkaller0 entered promiscuous mode [ 99.193364][ T3984] syz.2.1017[3984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.193427][ T3984] syz.2.1017[3984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.426653][ T3988] syz.3.1018 (3988) used obsolete PPPIOCDETACH ioctl [ 100.104934][ T3998] device veth0_vlan left promiscuous mode [ 100.127128][ T3998] device veth0_vlan entered promiscuous mode [ 100.167009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.187601][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.208215][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.273848][ T4018] device veth0_vlan left promiscuous mode [ 100.300700][ T4018] device veth0_vlan entered promiscuous mode [ 100.388343][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.398348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.406531][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.523865][ T4044] device syzkaller0 entered promiscuous mode [ 101.385400][ T24] audit: type=1400 audit(1766651288.020:155): avc: denied { create } for pid=4074 comm="syz.1.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 102.266164][ T4129] device syzkaller0 entered promiscuous mode [ 102.379203][ T4136] device veth0_vlan left promiscuous mode [ 102.397251][ T4136] device veth0_vlan entered promiscuous mode [ 103.288003][ T4202] device pim6reg1 entered promiscuous mode [ 103.658369][ T4227] device syzkaller0 entered promiscuous mode [ 104.104598][ T4240] device pim6reg1 entered promiscuous mode [ 104.798061][ T4258] device wg2 entered promiscuous mode [ 104.857272][ T24] audit: type=1400 audit(1766651291.490:156): avc: denied { create } for pid=4266 comm="syz.0.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 105.220390][ T4292] device syzkaller0 entered promiscuous mode [ 105.605491][ T4321] syz.4.1111[4321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.605551][ T4321] syz.4.1111[4321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.664265][ T4322] syz.4.1111[4322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.702263][ T4322] syz.4.1111[4322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.008685][ T4348] device veth1_macvtap left promiscuous mode [ 106.289511][ T4348] device macsec0 entered promiscuous mode [ 106.331017][ T4350] device wg2 left promiscuous mode [ 106.562318][ T4377] device syzkaller0 entered promiscuous mode [ 108.979606][ T4483] device sit0 entered promiscuous mode [ 110.242608][ T95] udevd[95]: worker [2183] terminated by signal 33 (Unknown signal 33) [ 110.307706][ T95] udevd[95]: worker [2183] failed while handling '/devices/virtual/block/loop3' [ 110.679682][ T4573] device syzkaller0 entered promiscuous mode [ 110.745568][ T4578] device syzkaller0 entered promiscuous mode [ 110.759300][ T481] syzkaller0: tun_net_xmit 48 [ 110.822432][ T4575] device syzkaller0 entered promiscuous mode [ 110.848401][ T4573] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 111.137229][ T24] audit: type=1400 audit(1766651297.770:157): avc: denied { associate } for pid=4593 comm="syz.4.1190" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 112.029214][ T4646] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.038786][ T4646] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.106575][ T4649] device bridge_slave_1 left promiscuous mode [ 112.113485][ T4649] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.121477][ T4649] device bridge_slave_0 left promiscuous mode [ 112.127835][ T4649] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.530306][ T4671] device pim6reg1 entered promiscuous mode [ 112.676564][ T4679] device sit0 entered promiscuous mode [ 113.086640][ T4694] device sit0 left promiscuous mode [ 113.181394][ T4697] device sit0 entered promiscuous mode [ 113.482575][ T4711] device pim6reg1 entered promiscuous mode [ 113.776594][ T4723] device syzkaller0 entered promiscuous mode [ 113.956240][ T4748] device sit0 left promiscuous mode [ 114.216964][ T4766] device sit0 left promiscuous mode [ 114.633118][ T4783] device pim6reg1 entered promiscuous mode [ 115.112646][ T4825] : renamed from vlan1 [ 116.065176][ T4879] device syzkaller0 entered promiscuous mode [ 116.148012][ T4891] device wg2 left promiscuous mode [ 116.855175][ T4908] device syzkaller0 entered promiscuous mode [ 117.901420][ T5003] device wg2 left promiscuous mode [ 117.909227][ T5003] device sit0 left promiscuous mode [ 117.922645][ T5003] device sit0 entered promiscuous mode [ 118.112217][ T5017] device syzkaller0 entered promiscuous mode [ 118.149535][ T5025] device pim6reg1 entered promiscuous mode [ 118.562650][ T5041] device pim6reg1 entered promiscuous mode [ 118.593303][ T24] audit: type=1400 audit(1766651305.230:158): avc: denied { read } for pid=5054 comm="syz.4.1319" dev="nsfs" ino=4026532362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.614588][ T24] audit: type=1400 audit(1766651305.230:159): avc: denied { open } for pid=5054 comm="syz.4.1319" path="mnt:[4026532362]" dev="nsfs" ino=4026532362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.638749][ T24] audit: type=1400 audit(1766651305.240:160): avc: denied { ioctl } for pid=5054 comm="syz.4.1319" path="mnt:[4026532362]" dev="nsfs" ino=4026532362 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.892748][ T5064] device syzkaller0 entered promiscuous mode [ 119.093669][ T5075] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.101664][ T5075] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.437915][ T5082] device pim6reg1 entered promiscuous mode [ 119.681085][ T5096] device pim6reg1 entered promiscuous mode [ 119.913762][ T24] audit: type=1400 audit(1766651306.550:161): avc: denied { create } for pid=5119 comm="syz.0.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 120.347154][ T5147] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.314104][ T5242] device veth0_vlan left promiscuous mode [ 121.321938][ T5242] device veth0_vlan entered promiscuous mode [ 121.335674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.348728][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 121.359854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 121.644878][ T5274] device wg2 left promiscuous mode [ 122.602864][ T5351] device veth0_vlan left promiscuous mode [ 122.621092][ T5351] device veth0_vlan entered promiscuous mode [ 122.662001][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.676908][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.686704][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.955454][ T5369] device sit0 entered promiscuous mode [ 123.237261][ T5403] device pim6reg1 entered promiscuous mode [ 123.592241][ T5428] device wg2 left promiscuous mode [ 123.773385][ T5430] device syzkaller0 entered promiscuous mode [ 124.327565][ T5454] : renamed from vlan1 [ 124.831241][ T5491] syz.1.1441[5491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.831301][ T5491] syz.1.1441[5491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.953630][ T5496] device pim6reg1 entered promiscuous mode [ 125.052464][ T24] audit: type=1400 audit(1766651311.690:162): avc: denied { create } for pid=5492 comm="syz.4.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 125.073670][ T5501] device syzkaller0 entered promiscuous mode [ 126.980795][ T5588] syz.1.1467[5588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.980856][ T5588] syz.1.1467[5588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.107313][ T5581] device pim6reg1 entered promiscuous mode [ 127.311404][ T5600] device sit0 left promiscuous mode [ 127.550860][ T5601] device sit0 entered promiscuous mode [ 128.345465][ T5660] device syzkaller0 entered promiscuous mode [ 130.103776][ T5781] device syzkaller0 entered promiscuous mode [ 130.314975][ T24] audit: type=1400 audit(1766651316.950:163): avc: denied { create } for pid=5759 comm="syz.0.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 130.381302][ T5786] device pim6reg1 entered promiscuous mode [ 130.758511][ T5793] device syzkaller0 entered promiscuous mode [ 130.819054][ T5818] device pim6reg1 entered promiscuous mode [ 131.094240][ T24] audit: type=1400 audit(1766651317.730:164): avc: denied { create } for pid=5837 comm="syz.1.1536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 131.115423][ T5828] device wg2 entered promiscuous mode [ 131.925395][ T5885] device syzkaller0 entered promiscuous mode [ 131.996225][ T5890] device pim6reg1 entered promiscuous mode [ 134.071737][ T5999] device pim6reg1 entered promiscuous mode [ 136.243778][ T6114] device syzkaller0 entered promiscuous mode [ 137.632185][ T6185] device syzkaller0 entered promiscuous mode [ 138.096357][ T6223] device veth0_vlan left promiscuous mode [ 138.157900][ T6223] device veth0_vlan entered promiscuous mode [ 138.167916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.198648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.237035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.317451][ T6233] device pim6reg1 entered promiscuous mode [ 138.780373][ T6263] device wg2 entered promiscuous mode [ 138.890396][ T6271] device sit0 entered promiscuous mode [ 139.369125][ T6298] device pim6reg1 entered promiscuous mode [ 140.103835][ T6326] device pim6reg1 entered promiscuous mode [ 140.477857][ T6362] device syzkaller0 entered promiscuous mode [ 140.700941][ T6389] device sit0 left promiscuous mode [ 140.727382][ T6389] device sit0 entered promiscuous mode [ 141.361681][ T6419] device wg2 left promiscuous mode [ 141.393043][ T6419] device wg2 entered promiscuous mode [ 141.814368][ T6448] device macsec0 left promiscuous mode [ 142.467072][ T6469] device syzkaller0 entered promiscuous mode [ 142.991287][ T6510] device syzkaller0 entered promiscuous mode [ 143.008569][ T6538] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.016357][ T6538] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.040141][ T6542] device wg2 left promiscuous mode [ 143.046638][ T6538] device bridge_slave_1 left promiscuous mode [ 143.063399][ T6538] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.071760][ T6538] device bridge_slave_0 left promiscuous mode [ 143.078525][ T6538] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.107175][ T24] audit: type=1400 audit(1766651329.740:165): avc: denied { create } for pid=6539 comm="syz.2.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 143.896828][ T6598] device pim6reg1 entered promiscuous mode [ 144.422759][ T6640] device syzkaller0 entered promiscuous mode [ 144.933838][ T6687] device pim6reg1 entered promiscuous mode [ 145.150958][ T6701] pimreg: tun_chr_ioctl cmd 2147767507 [ 145.592100][ T6715] device veth1_macvtap entered promiscuous mode [ 145.618067][ T6715] device macsec0 entered promiscuous mode [ 145.638308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.592799][ T6793] device syzkaller0 entered promiscuous mode [ 147.226127][ T6829] device veth0_vlan left promiscuous mode [ 147.235969][ T6829] device veth0_vlan entered promiscuous mode [ 147.244794][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.261748][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.302537][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 147.360842][ T6833] device syzkaller0 entered promiscuous mode [ 147.492812][ T6845] device sit0 entered promiscuous mode [ 148.978032][ T6947] device syzkaller0 entered promiscuous mode [ 149.043516][ T6949] device veth0_vlan left promiscuous mode [ 149.056457][ T6949] device veth0_vlan entered promiscuous mode [ 149.098533][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.115272][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.123598][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.704125][ T7063] syz.0.1875[7063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.704205][ T7063] syz.0.1875[7063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.425525][ T7121] device veth1_macvtap entered promiscuous mode [ 152.466920][ T7121] device macsec0 entered promiscuous mode [ 152.482110][ T7113] device wg2 left promiscuous mode [ 152.489958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.513393][ T7193] device veth0_vlan left promiscuous mode [ 153.552738][ T7193] device veth0_vlan entered promiscuous mode [ 153.657941][ T7195] device sit0 left promiscuous mode [ 153.915646][ T7199] device sit0 entered promiscuous mode [ 153.922993][ T7221] syz.2.1920[7221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.923075][ T7221] syz.2.1920[7221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.824007][ T7336] device pim6reg1 entered promiscuous mode [ 157.930679][ T7342] device wg2 entered promiscuous mode [ 158.063953][ T7351] device syzkaller0 entered promiscuous mode [ 158.357328][ T7370] device syzkaller0 entered promiscuous mode [ 158.600615][ T7395] tap0: tun_chr_ioctl cmd 2147767521 [ 161.523087][ T7471] device syzkaller0 entered promiscuous mode [ 164.029313][ T24] audit: type=1400 audit(1766651350.670:166): avc: denied { create } for pid=7586 comm="syz.1.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 164.278325][ T7589] Q6\bY4: renamed from lo [ 164.363946][ T7607] device syzkaller0 entered promiscuous mode [ 166.387336][ T7720] device syzkaller0 entered promiscuous mode [ 167.037004][ T7753] device syzkaller0 entered promiscuous mode [ 167.075811][ T24] audit: type=1400 audit(1766651353.710:167): avc: denied { ioctl } for pid=7757 comm="syz.4.2067" path="" dev="cgroup2" ino=165 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 167.169847][ T7761] device pim6reg1 entered promiscuous mode [ 168.156299][ T7815] device wg2 entered promiscuous mode [ 168.869811][ T24] audit: type=1400 audit(1766651355.510:168): avc: denied { create } for pid=7860 comm="syz.0.2096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 169.142095][ T7886] device pim6reg1 entered promiscuous mode [ 169.598403][ T7916] device vlan1 entered promiscuous mode [ 171.308877][ T8010] device pim6reg1 entered promiscuous mode [ 171.745034][ T8033] device pim6reg1 entered promiscuous mode [ 173.251612][ T8069] device pim6reg1 entered promiscuous mode [ 174.623097][ T8144] device pim6reg1 entered promiscuous mode [ 176.031092][ T8255] device pim6reg1 entered promiscuous mode [ 176.246648][ T8283] device sit0 left promiscuous mode [ 176.284548][ T8283] device sit0 entered promiscuous mode [ 176.493196][ T8289] device sit0 entered promiscuous mode [ 177.049658][ T8313] device veth0_vlan left promiscuous mode [ 177.075298][ T8313] device veth0_vlan entered promiscuous mode [ 177.108372][ T8310] device sit0 left promiscuous mode [ 177.232195][ T8314] device wg2 entered promiscuous mode [ 177.248618][ T8315] device sit0 entered promiscuous mode [ 177.450856][ T8331] device sit0 left promiscuous mode [ 177.631244][ T8343] device wg2 left promiscuous mode [ 178.436619][ T8364] device sit0 left promiscuous mode [ 179.840819][ T8463] device pim6reg1 entered promiscuous mode [ 181.886080][ T8546] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.283256][ T8557] device sit0 entered promiscuous mode [ 183.317115][ T8585] device syzkaller0 entered promiscuous mode [ 183.461602][ T8589] device sit0 entered promiscuous mode [ 184.951014][ T8664] A6: renamed from team_slave_1 [ 185.504129][ T8708] device pim6reg1 entered promiscuous mode [ 187.143501][ T8828] device syzkaller0 entered promiscuous mode [ 187.928876][ T8872] device veth1_macvtap left promiscuous mode [ 187.935156][ T8872] device macsec0 left promiscuous mode [ 188.363396][ T8900] syz.0.2378[8900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.363454][ T8900] syz.0.2378[8900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.377114][ T8910] syz.0.2378[8910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.899353][ T8982] device veth0_vlan left promiscuous mode [ 189.918365][ T8982] device veth0_vlan entered promiscuous mode [ 189.953474][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.963250][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.978158][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.468902][ T9023] syz.3.2410[9023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.468983][ T9023] syz.3.2410[9023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.770535][ T9051] device wg2 entered promiscuous mode [ 193.321896][ T9163] device syzkaller0 entered promiscuous mode [ 193.595569][ T9175] device sit0 left promiscuous mode [ 194.130922][ T9182] device sit0 entered promiscuous mode [ 194.780871][ T9218] syz.3.2472[9218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.784006][ T9218] syz.3.2472[9218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.745714][ T9224] device syzkaller0 entered promiscuous mode [ 196.136185][ T9254] device syzkaller0 entered promiscuous mode [ 196.463134][ T9313] syz.0.2502[9313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.463197][ T9313] syz.0.2502[9313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.442710][ T9481] device veth0_vlan left promiscuous mode [ 199.507639][ T9481] device veth0_vlan entered promiscuous mode [ 199.518684][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.530981][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.603342][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 200.804129][ T9537] syz.0.2564[9537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.804193][ T9537] syz.0.2564[9537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.652189][ T9551] device pim6reg1 entered promiscuous mode [ 202.015394][ T95] udevd[95]: worker [299] terminated by signal 33 (Unknown signal 33) [ 202.054042][ T95] udevd[95]: worker [299] failed while handling '/devices/virtual/block/loop1' [ 203.235096][ T9609] device pim6reg1 entered promiscuous mode [ 204.215796][ T9673] device syzkaller0 entered promiscuous mode [ 204.439959][ T9701] device veth0_vlan left promiscuous mode [ 204.526939][ T9701] device veth0_vlan entered promiscuous mode [ 206.327718][ T9809] device sit0 left promiscuous mode [ 206.448261][ T9809] device sit0 entered promiscuous mode [ 206.801783][ T9826] device veth0_vlan left promiscuous mode [ 206.842721][ T9826] device veth0_vlan entered promiscuous mode [ 206.914841][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.926619][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.948558][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.561256][ T9883] device sit0 left promiscuous mode [ 207.582575][ T9884] device sit0 entered promiscuous mode [ 208.003001][ T9921] device pim6reg1 entered promiscuous mode [ 208.293830][ T9950] device syzkaller0 entered promiscuous mode [ 210.676503][T10059] device syzkaller0 entered promiscuous mode [ 210.843045][T10076] syz.2.2715[10076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.849002][T10076] syz.2.2715[10076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.927991][T10080] device wg2 left promiscuous mode [ 211.050822][T10098] device wg2 entered promiscuous mode [ 211.136799][T10105] device wg2 left promiscuous mode [ 211.144305][T10105] device wg2 entered promiscuous mode [ 211.168553][T10106] device wg2 left promiscuous mode [ 212.047156][ T24] audit: type=1400 audit(1766651398.670:169): avc: denied { create } for pid=10185 comm="syz.0.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 212.635177][T10209] device sit0 left promiscuous mode [ 212.657658][T10209] device sit0 entered promiscuous mode [ 213.927428][T10276] syz.3.2770[10276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.932859][T10276] syz.3.2770[10276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.981686][T10274] device veth1_macvtap left promiscuous mode [ 214.092293][T10274] device macsec0 entered promiscuous mode [ 214.188500][T10294] device pim6reg1 entered promiscuous mode [ 214.509116][T10316] device pim6reg1 entered promiscuous mode [ 214.949068][T10335] device sit0 left promiscuous mode [ 215.907565][T10358] device dummy0 entered promiscuous mode [ 216.328432][T10383] device pim6reg1 entered promiscuous mode [ 217.383337][T10422] device wg2 left promiscuous mode [ 217.580406][T10422] device wg2 entered promiscuous mode [ 218.400675][T10464] device lo entered promiscuous mode [ 219.451229][T10505] device pim6reg1 entered promiscuous mode [ 220.149286][T10546] : port 1(ip6gretap0) entered blocking state [ 220.208267][T10546] : port 1(ip6gretap0) entered disabled state [ 220.248895][T10546] device ip6gretap0 entered promiscuous mode [ 222.791728][T10701] device syzkaller0 entered promiscuous mode [ 222.803292][T10708] device sit0 left promiscuous mode [ 222.851517][T10709] device sit0 entered promiscuous mode [ 223.338662][T10747] device pim6reg1 entered promiscuous mode [ 224.799554][T10788] bridge0: port 3(gretap0) entered blocking state [ 224.836507][T10788] bridge0: port 3(gretap0) entered disabled state [ 224.873440][T10788] device gretap0 entered promiscuous mode [ 225.142287][T10795] device veth0_vlan left promiscuous mode [ 225.178574][T10795] device veth0_vlan entered promiscuous mode [ 225.307511][T10803] : renamed from bond_slave_0 [ 226.863866][T10846] device veth0_vlan left promiscuous mode [ 226.898478][T10846] device veth0_vlan entered promiscuous mode [ 227.094425][T10864] device pim6reg1 entered promiscuous mode [ 227.151061][T10870] device syzkaller0 entered promiscuous mode [ 232.909812][ T24] audit: type=1400 audit(1766651419.550:170): avc: denied { mounton } for pid=10906 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 233.080798][T10902] device syzkaller0 entered promiscuous mode [ 233.126384][T10914] device pim6reg1 entered promiscuous mode [ 233.401547][T10906] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.409565][T10906] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.417942][T10906] device bridge_slave_0 entered promiscuous mode [ 233.430744][T10906] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.438599][T10906] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.446114][T10906] device bridge_slave_1 entered promiscuous mode [ 233.596251][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.607077][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.633099][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.650748][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.669075][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.676170][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.699096][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.716304][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.733436][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.740661][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.773610][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.789171][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.807109][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.921006][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.006986][ T7] device ip6gretap0 left promiscuous mode [ 234.049350][ T7] : port 1(ip6gretap0) entered disabled state [ 234.082247][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.118172][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.174831][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.196165][T10906] device veth0_vlan entered promiscuous mode [ 234.241727][T10950] device pim6reg1 entered promiscuous mode [ 234.363123][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.398434][T10906] device veth1_macvtap entered promiscuous mode [ 234.517940][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.549495][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.596321][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.641757][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.824702][ T24] audit: type=1400 audit(1766651421.460:171): avc: denied { unmount } for pid=10906 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 235.128826][ T7] device veth0_to_team left promiscuous mode [ 235.167312][ T7] : port 1(veth0_to_team) entered disabled state [ 235.268357][ T7] device bridge_slave_1 left promiscuous mode [ 235.295743][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.304371][ T7] device bridge_slave_0 left promiscuous mode [ 235.311707][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.331180][ T7] device veth0_vlan left promiscuous mode [ 237.366934][ T24] audit: type=1400 audit(1766651424.000:172): avc: denied { create } for pid=11095 comm="syz.1.2991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 237.695948][T11117] syz.4.2996[11117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.696026][T11117] syz.4.2996[11117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.072564][ T24] audit: type=1400 audit(1766651424.710:173): avc: denied { create } for pid=11200 comm="syz.3.3010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 238.461457][T11230] device sit0 left promiscuous mode [ 238.490364][T11230] device sit0 entered promiscuous mode [ 238.814682][T11245] device gretap0 left promiscuous mode [ 238.856795][T11245] bridge0: port 3(gretap0) entered disabled state [ 238.926667][T11245] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.985934][T11245] device bridge_slave_0 left promiscuous mode [ 239.000677][T11245] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.428755][T11279] device pim6reg1 entered promiscuous mode [ 241.780890][T11367] device wg2 left promiscuous mode [ 241.855708][T11367] device wg2 entered promiscuous mode [ 242.293175][T11399] device syzkaller0 entered promiscuous mode [ 242.426502][T11408] device syzkaller0 entered promiscuous mode [ 243.257386][T11452] syz.2.3081[11452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.257552][T11452] syz.2.3081[11452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.249010][T11591] syzkaller0: mtu greater than device maximum [ 245.641135][T11612] device pim6reg1 entered promiscuous mode [ 245.810072][T11615] device syzkaller0 entered promiscuous mode [ 246.197542][T11630] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 246.753463][T11670] device veth0_vlan left promiscuous mode [ 246.794736][T11670] device veth0_vlan entered promiscuous mode [ 246.867359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.878143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 246.902127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 247.733627][T11701] device syzkaller0 entered promiscuous mode [ 249.450993][T11772] device pim6reg1 entered promiscuous mode [ 249.523663][T11760] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.530940][T11760] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.538565][T11760] device bridge_slave_0 entered promiscuous mode [ 249.588136][T11760] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.595346][T11760] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.603058][T11760] device bridge_slave_1 entered promiscuous mode [ 249.868657][T11760] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.875860][T11760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.883341][T11760] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.890422][T11760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.990212][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.028039][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.037401][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.045861][T11793] device wg2 left promiscuous mode [ 250.163144][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.171503][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.178572][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.275381][T11760] device veth0_vlan entered promiscuous mode [ 250.317254][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.377998][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.406552][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.416371][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.423957][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.432227][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.465768][T11760] device veth1_macvtap entered promiscuous mode [ 250.483415][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.492271][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.501267][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.592048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.601950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.641792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.651219][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.283132][T11821] syz.3.3188[11821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.296180][T11821] syz.3.3188[11821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.511938][T11823] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.530910][T11823] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.539334][T11823] device bridge_slave_0 entered promiscuous mode [ 251.600104][T11823] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.607352][T11823] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.636048][T11823] device bridge_slave_1 entered promiscuous mode [ 251.644688][ T470] device veth1_macvtap left promiscuous mode [ 251.651046][ T470] device veth0_vlan left promiscuous mode [ 251.847752][T11853] device sit0 entered promiscuous mode [ 252.269773][T11823] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.276840][T11823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.284255][T11823] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.291304][T11823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.487425][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.495271][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.531762][T11874] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.541035][T11874] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.770712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.787899][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.844187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.855657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.866675][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.873855][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.882424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.890913][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.977187][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.984334][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.026923][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.035409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.044138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.059904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.114502][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.123009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.170061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.182402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.254425][T11823] device veth0_vlan entered promiscuous mode [ 253.265571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.273286][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.425948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.434311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.455295][T11823] device veth1_macvtap entered promiscuous mode [ 253.507559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.528992][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.537820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.574910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.594011][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.623052][T11914] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.009640][ T470] device bridge_slave_1 left promiscuous mode [ 254.015877][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.083845][ T470] device bridge_slave_0 left promiscuous mode [ 254.129161][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.140958][ T24] audit: type=1400 audit(1766651440.780:174): avc: denied { setattr } for pid=11929 comm="syz.2.3219" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 254.166071][ T470] device veth1_macvtap left promiscuous mode [ 254.364024][T11952] device pim6reg1 entered promiscuous mode [ 255.299243][T12037] device wg2 entered promiscuous mode [ 255.627328][T12053] device syzkaller0 entered promiscuous mode [ 255.793358][T12081] device sit0 left promiscuous mode [ 255.837913][T12081] device sit0 entered promiscuous mode [ 256.477154][T12126] device pim6reg1 entered promiscuous mode [ 256.609107][T12140] device wg2 left promiscuous mode [ 256.695156][T12145] Q6\bY4: renamed from lo [ 256.720559][T12151] device sit0 left promiscuous mode [ 256.897545][T12151] device sit0 entered promiscuous mode [ 257.437236][T12170] device veth1_macvtap left promiscuous mode [ 257.542507][T12172] device veth1_macvtap entered promiscuous mode [ 257.591522][T12172] device macsec0 entered promiscuous mode [ 258.338559][T12227] device veth0_vlan left promiscuous mode [ 258.395568][T12227] device veth0_vlan entered promiscuous mode [ 258.452245][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.460588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.468261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 258.760539][T12236] device pim6reg1 entered promiscuous mode [ 260.002390][T12315] device pim6reg1 entered promiscuous mode [ 260.023866][T12314] device pim6reg1 entered promiscuous mode [ 260.179230][T12316] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.192147][T12316] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.228818][T12316] device bridge_slave_0 entered promiscuous mode [ 260.272571][T12316] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.287530][T12316] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.295125][T12316] device bridge_slave_1 entered promiscuous mode [ 260.561814][T12333] device pim6reg1 entered promiscuous mode [ 260.684938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.694031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.777087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.833073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.937854][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.944933][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.009942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.035669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.064365][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.071472][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.117708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.145795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.190497][T12359] device syzkaller0 entered promiscuous mode [ 261.261528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.275973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.292284][T12316] device veth0_vlan entered promiscuous mode [ 261.333358][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.395909][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.411912][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.432979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.450053][T12316] device veth1_macvtap entered promiscuous mode [ 261.523854][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.537833][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.649496][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.699011][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.271055][ T470] device veth0_vlan left promiscuous mode [ 263.162502][T12462] device veth0_vlan left promiscuous mode [ 263.210279][T12462] device veth0_vlan entered promiscuous mode [ 263.375469][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.404010][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.429061][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.711919][T12519] device pim6reg1 entered promiscuous mode [ 264.892625][T12531] device pim6reg1 entered promiscuous mode [ 265.441953][T12566] pimreg: tun_chr_ioctl cmd 1074025677 [ 265.447595][T12566] pimreg: linktype set to 805 [ 265.551209][T12593] : renamed from vlan0 [ 267.256801][T12654] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.399479][T12651] device bridge_slave_1 left promiscuous mode [ 267.465374][T12651] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.508213][T12651] device bridge_slave_0 left promiscuous mode [ 267.547706][T12651] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.093701][T12675] device veth1_macvtap left promiscuous mode [ 269.806490][T12737] device sit0 entered promiscuous mode [ 270.133663][T12750] device syzkaller0 entered promiscuous mode [ 270.365205][T12783] device sit0 entered promiscuous mode [ 270.579209][T12770] device sit0 left promiscuous mode [ 271.240768][T12823] device syzkaller0 entered promiscuous mode [ 271.948016][T12866] device veth0_vlan left promiscuous mode [ 271.962212][T12866] device veth0_vlan entered promiscuous mode [ 271.978844][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.012260][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.030243][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.201169][T12861] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.208364][T12861] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.216110][T12861] device bridge_slave_0 entered promiscuous mode [ 272.223933][T12861] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.231242][T12861] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.239198][T12861] device bridge_slave_1 entered promiscuous mode [ 272.370661][T12861] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.377773][T12861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.385125][T12861] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.392204][T12861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.555944][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.586305][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.612739][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.629943][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.638445][ T470] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.645549][ T470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.691379][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.711254][ T470] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.718454][ T470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.781522][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.810148][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.847729][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.861712][T12916] device pim6reg1 entered promiscuous mode [ 272.891830][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.903452][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.918699][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.124608][T12861] device veth0_vlan entered promiscuous mode [ 273.217245][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.229238][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.254679][T12861] device veth1_macvtap entered promiscuous mode [ 273.276246][ T49] device bridge_slave_1 left promiscuous mode [ 273.282959][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.307940][ T49] device bridge_slave_0 left promiscuous mode [ 273.314095][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.338938][ T49] device veth1_macvtap left promiscuous mode [ 273.498868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.521828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.601042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.639797][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.683183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.806151][T13003] syz.2.3515[13003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.806233][T13003] syz.2.3515[13003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.722732][T13113] device sit0 left promiscuous mode [ 281.332046][T13151] device syzkaller0 entered promiscuous mode [ 281.834149][T13172] device pim6reg1 entered promiscuous mode [ 283.502040][T13216] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.509390][T13216] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.734485][T13232] device pim6reg1 entered promiscuous mode [ 286.282919][T13260] tap0: tun_chr_ioctl cmd 1074025677 [ 286.327513][T13260] tap0: linktype set to 780 [ 286.368864][T13264] tap0: tun_chr_ioctl cmd 35108 [ 286.475664][T13267] device pim6reg1 entered promiscuous mode [ 287.983305][T13317] syz.4.3605[13317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.983369][T13317] syz.4.3605[13317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.978753][T13353] device pim6reg1 entered promiscuous mode [ 293.514688][T13490] device veth0_vlan left promiscuous mode [ 293.539333][T13490] device veth0_vlan entered promiscuous mode [ 293.571362][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.611397][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.668042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.077988][T13547] device sit0 entered promiscuous mode [ 295.360919][T13552] device pim6reg1 entered promiscuous mode [ 295.581857][T13559] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.589089][T13559] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.664214][T13562] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.671335][T13562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.678741][T13562] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.685787][T13562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.693412][T13562] device bridge0 entered promiscuous mode [ 297.074399][T13584] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.109323][T13584] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.116858][T13584] device bridge_slave_0 entered promiscuous mode [ 297.160757][T13584] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.177895][T13584] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.188583][T13584] device bridge_slave_1 entered promiscuous mode [ 297.402711][T13617] device veth0_vlan left promiscuous mode [ 297.425758][T13617] device veth0_vlan entered promiscuous mode [ 298.103160][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.127918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.171978][ T298] device bridge_slave_1 left promiscuous mode [ 298.184392][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.229020][ T298] device bridge_slave_0 left promiscuous mode [ 298.241882][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.272327][ T298] device veth1_macvtap left promiscuous mode [ 298.305701][ T298] device veth0_vlan left promiscuous mode [ 298.530741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.539148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.547364][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.554428][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.661473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.763355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.775269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.783697][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.790759][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.915925][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.925391][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.935247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.944559][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.066706][T13584] device veth0_vlan entered promiscuous mode [ 299.073105][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 299.081786][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.090320][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 299.098556][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.134479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.150594][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.166400][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.184099][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.220089][T13584] device veth1_macvtap entered promiscuous mode [ 299.237774][T13698] device sit0 left promiscuous mode [ 299.254537][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.263403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.278248][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.306851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.355491][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.406251][T13703] device macsec0 left promiscuous mode [ 299.455367][T13703] device veth1_macvtap entered promiscuous mode [ 299.544697][T13703] device macsec0 entered promiscuous mode [ 299.639936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.134630][T13758] : renamed from vlan0 [ 300.303448][T13776] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.310720][T13776] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.342016][T13776] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.349212][T13776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.356511][T13776] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.363676][T13776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.386771][T13776] device bridge0 entered promiscuous mode [ 302.785274][T13857] device syzkaller0 entered promiscuous mode [ 303.061101][T13853] device syzkaller0 entered promiscuous mode [ 304.450420][T13905] device veth0_vlan left promiscuous mode [ 304.472004][T13905] device veth0_vlan entered promiscuous mode [ 304.486807][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.496863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.505340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.247049][T13972] device syzkaller0 entered promiscuous mode [ 307.482965][T14057] device pim6reg1 entered promiscuous mode [ 308.377414][T14076] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.452373][T14076] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.508235][T14076] device bridge_slave_0 entered promiscuous mode [ 308.518760][T14076] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.525926][T14076] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.536423][T14076] device bridge_slave_1 entered promiscuous mode [ 308.628372][T14076] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.635470][T14076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.642826][T14076] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.649893][T14076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.697122][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.848196][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.922313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.930025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.942235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.950810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.959319][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.966389][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.975334][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.983982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.992631][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.999696][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.055239][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.081405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.111090][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.121732][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.156658][T14076] device veth0_vlan entered promiscuous mode [ 309.166955][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.176610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.197256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.213653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.249863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.287292][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.325512][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.366052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.402732][T14076] device veth1_macvtap entered promiscuous mode [ 309.429039][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.446982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.481508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.529186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.563964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 309.721266][ T298] device veth1_macvtap left promiscuous mode [ 309.738385][ T298] device veth0_vlan left promiscuous mode [ 310.097581][T14145] device pim6reg1 entered promiscuous mode [ 310.720200][T14192] bridge0: port 3(veth0) entered blocking state [ 310.741462][T14192] bridge0: port 3(veth0) entered disabled state [ 310.748416][T14192] device veth0 entered promiscuous mode [ 310.792404][T14197] device veth0 left promiscuous mode [ 310.871404][T14197] bridge0: port 3(veth0) entered disabled state [ 310.911419][T14207] : port 1(veth0_to_team) entered blocking state [ 310.919373][T14207] : port 1(veth0_to_team) entered disabled state [ 310.935465][T14207] device veth0_to_team entered promiscuous mode [ 311.236982][T14228] device pim6reg1 entered promiscuous mode [ 311.305179][T14229] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.312446][T14229] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.431693][T14229] device bridge0 left promiscuous mode [ 312.256589][T14281] device sit0 entered promiscuous mode [ 312.818726][T14288] geneve1: tun_chr_ioctl cmd 1074025672 [ 312.824997][T14288] geneve1: ignored: set checksum enabled [ 313.376922][T14323] device pim6reg1 entered promiscuous mode [ 313.871354][T14336] device veth1_macvtap left promiscuous mode [ 314.135286][T14351] : renamed from team_slave_1 [ 314.983415][T14382] device veth0_vlan left promiscuous mode [ 315.004501][T14382] device veth0_vlan entered promiscuous mode [ 315.042764][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.053620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.061475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.463412][T14421] device syzkaller0 entered promiscuous mode [ 315.529615][T14421] device pim6reg1 entered promiscuous mode [ 316.521745][T14467] device sit0 left promiscuous mode [ 317.289713][T14505] syz.2.3935[14505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.289776][T14505] syz.2.3935[14505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.031800][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 318.711233][T14589] Q6\bY4: renamed from lo [ 320.624171][T14688] geneve1: tun_chr_ioctl cmd 1074025672 [ 320.692759][T14688] geneve1: ignored: set checksum enabled [ 322.319072][T14797] device syzkaller0 entered promiscuous mode [ 322.343671][T14808] device veth0_vlan left promiscuous mode [ 322.350288][T14808] device veth0_vlan entered promiscuous mode [ 322.378342][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.397187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 322.406386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.603822][T14836] device dummy0 entered promiscuous mode [ 324.030888][T14923] bridge0: port 3(gretap0) entered blocking state [ 324.037671][T14923] bridge0: port 3(gretap0) entered disabled state [ 324.051315][T14923] device gretap0 entered promiscuous mode [ 324.058249][T14923] bridge0: port 3(gretap0) entered blocking state [ 324.064828][T14923] bridge0: port 3(gretap0) entered forwarding state [ 324.847805][T14953] device wg2 left promiscuous mode [ 324.880390][T14953] device wg2 entered promiscuous mode [ 325.169946][T14978] device sit0 entered promiscuous mode [ 325.369598][T14975] device sit0 left promiscuous mode [ 325.656817][T15005] device syzkaller0 entered promiscuous mode [ 325.705978][T15022] device sit0 entered promiscuous mode [ 325.765578][T15027] device syzkaller0 entered promiscuous mode [ 325.910313][T15030] device wg2 entered promiscuous mode [ 326.012226][T15039] device sit0 entered promiscuous mode [ 326.168828][T15033] device sit0 left promiscuous mode [ 326.835106][T15129] device veth0_vlan left promiscuous mode [ 326.843152][T15129] device veth0_vlan entered promiscuous mode [ 326.950696][T15143] syz.1.4116[15143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.950758][T15143] syz.1.4116[15143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.013765][T15143] device veth1_macvtap left promiscuous mode [ 327.197069][T15143] device macsec0 entered promiscuous mode [ 327.320276][T15148] device pim6reg1 entered promiscuous mode [ 327.895837][T15164] device sit0 left promiscuous mode [ 328.133969][T15172] device wg2 left promiscuous mode [ 328.237792][T15165] device sit0 entered promiscuous mode [ 328.545671][T15190] device syzkaller0 entered promiscuous mode [ 329.113876][T15218] device sit0 left promiscuous mode [ 329.319192][T15221] device pim6reg1 entered promiscuous mode [ 329.335119][T15224] device sit0 entered promiscuous mode [ 329.829813][T15253] device veth1_macvtap left promiscuous mode [ 329.886345][T15253] device veth1_macvtap entered promiscuous mode [ 329.898561][T15253] device macsec0 entered promiscuous mode [ 331.274917][T15339] device pim6reg1 entered promiscuous mode [ 331.867703][T15359] device veth0_vlan left promiscuous mode [ 331.873842][T15359] device veth0_vlan entered promiscuous mode [ 331.999943][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.029877][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 332.087088][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.025330][T15427] device syzkaller0 entered promiscuous mode [ 333.595708][T15453] device syzkaller0 left promiscuous mode [ 333.651998][T15455] device sit0 left promiscuous mode [ 333.679167][T15459] bridge0: port 3(gretap0) entered disabled state [ 333.685710][T15459] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.693024][T15459] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.011258][T15526] device syzkaller0 entered promiscuous mode [ 338.612484][T15706] device sit0 entered promiscuous mode [ 339.006289][T15743] device syzkaller0 entered promiscuous mode [ 340.963347][T15793] device syzkaller0 entered promiscuous mode [ 341.171864][T15813] bridge0: port 3(gretap0) entered blocking state [ 341.268813][T15813] bridge0: port 3(gretap0) entered disabled state [ 341.337587][T15813] device gretap0 entered promiscuous mode [ 344.718067][T15936] device wg2 entered promiscuous mode [ 345.009745][T15968] device sit0 left promiscuous mode [ 345.858031][T15998] : renamed from vlan0 [ 348.656558][T16119] device macsec0 left promiscuous mode [ 348.680870][T16119] device veth1_macvtap entered promiscuous mode [ 348.697780][T16119] device macsec0 entered promiscuous mode [ 348.748362][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.210059][T16192] device wg2 left promiscuous mode [ 350.231513][T16192] device wg2 entered promiscuous mode [ 350.628632][T16215] device pim6reg1 entered promiscuous mode [ 351.780810][T16246] device sit0 entered promiscuous mode [ 353.069727][T16279] device veth0_vlan left promiscuous mode [ 353.076703][T16279] device veth0_vlan entered promiscuous mode [ 353.273534][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.302351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.338622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.136415][T16416] device veth0_vlan left promiscuous mode [ 356.229241][T16416] device veth0_vlan entered promiscuous mode [ 356.753242][T16435] device pim6reg1 entered promiscuous mode [ 356.989983][T16442] syzkaller0: refused to change device tx_queue_len [ 357.779761][T16458] device syzkaller0 entered promiscuous mode [ 358.290039][T16468] device pim6reg1 entered promiscuous mode [ 358.617979][T16186] syz.4.4413 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 358.788029][T16186] CPU: 1 PID: 16186 Comm: syz.4.4413 Tainted: G W syzkaller #0 [ 358.796924][T16186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 358.807089][T16186] Call Trace: [ 358.810391][T16186] __dump_stack+0x21/0x24 [ 358.814725][T16186] dump_stack_lvl+0x169/0x1d8 [ 358.819515][T16186] ? show_regs_print_info+0x18/0x18 [ 358.824715][T16186] ? ___ratelimit+0x3d1/0x560 [ 358.829395][T16186] ? __kasan_check_write+0x14/0x20 [ 358.834595][T16186] ? _raw_spin_lock+0x8e/0xe0 [ 358.839397][T16186] dump_stack+0x15/0x1c [ 358.843548][T16186] dump_header+0xdd/0x650 [ 358.848487][T16186] oom_kill_process+0x1fa/0x2c0 [ 358.853342][T16186] out_of_memory+0x94a/0xd70 [ 358.857929][T16186] ? unregister_oom_notifier+0x20/0x20 [ 358.863488][T16186] ? mutex_lock_killable+0x8c/0xe0 [ 358.868610][T16186] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 358.875119][T16186] mem_cgroup_out_of_memory+0x260/0x310 [ 358.880665][T16186] ? mem_cgroup_oom_trylock+0x350/0x350 [ 358.886318][T16186] ? _raw_spin_lock+0x8e/0xe0 [ 358.890993][T16186] ? _raw_spin_trylock_bh+0x130/0x130 [ 358.896366][T16186] ? _raw_spin_unlock+0x4d/0x70 [ 358.901219][T16186] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 358.906763][T16186] ? _raw_spin_unlock_irq+0x4e/0x70 [ 358.911955][T16186] try_charge+0xf61/0x14e0 [ 358.916553][T16186] ? __memcg_kmem_charge+0x140/0x140 [ 358.921841][T16186] ? percpu_counter_add_batch+0x13c/0x160 [ 358.927558][T16186] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 358.933099][T16186] __mem_cgroup_charge+0x14c/0x6d0 [ 358.938206][T16186] shmem_add_to_page_cache+0x55e/0xe10 [ 358.943673][T16186] ? shmem_alloc_page+0x300/0x300 [ 358.948785][T16186] ? _raw_spin_lock_irqsave+0x110/0x110 [ 358.954336][T16186] ? find_lock_entry+0x4b/0x200 [ 358.959178][T16186] ? lru_cache_add+0x164/0x380 [ 358.963942][T16186] ? shmem_getpage_gfp+0x8f3/0x2110 [ 358.969179][T16186] shmem_getpage_gfp+0x8e8/0x2110 [ 358.974205][T16186] shmem_write_begin+0xce/0x1b0 [ 358.979057][T16186] generic_perform_write+0x2be/0x510 [ 358.984433][T16186] ? atime_needs_update+0x5b0/0x5b0 [ 358.989720][T16186] ? grab_cache_page_write_begin+0xb0/0xb0 [ 358.995522][T16186] ? file_remove_privs+0x580/0x580 [ 359.000628][T16186] ? __kasan_check_write+0x14/0x20 [ 359.005734][T16186] ? down_write+0xac/0x110 [ 359.010152][T16186] __generic_file_write_iter+0x24b/0x480 [ 359.016040][T16186] ? generic_write_checks+0x3d4/0x480 [ 359.021409][T16186] generic_file_write_iter+0xa9/0x1d0 [ 359.026900][T16186] __kernel_write+0x55a/0x910 [ 359.031575][T16186] ? vfs_read+0xa10/0xa10 [ 359.035998][T16186] ? populate_vma_page_range+0xf0/0xf0 [ 359.041449][T16186] ? sched_clock+0x3a/0x40 [ 359.045860][T16186] ? cgroup_freezing+0x86/0xb0 [ 359.050637][T16186] ? freezing_slow_path+0x10a/0x150 [ 359.055914][T16186] dump_emit+0x240/0x360 [ 359.060169][T16186] ? wait_for_dump_helpers+0x390/0x390 [ 359.065624][T16186] dump_user_range+0x6a/0x1a0 [ 359.070323][T16186] elf_core_dump+0x278a/0x2bc0 [ 359.075096][T16186] ? load_elf_binary+0x2890/0x2890 [ 359.080200][T16186] ? __fsnotify_parent+0x5ff/0x6c0 [ 359.085309][T16186] ? shmem_unused_huge_scan+0xa0/0xa0 [ 359.090691][T16186] ? do_truncate+0x1ad/0x210 [ 359.095281][T16186] ? putname+0xfe/0x150 [ 359.099434][T16186] ? __kasan_check_read+0x11/0x20 [ 359.104460][T16186] ? cgroup_freezing+0x86/0xb0 [ 359.109228][T16186] ? freezing_slow_path+0x10a/0x150 [ 359.114419][T16186] do_coredump+0x1ac9/0x27f0 [ 359.119112][T16186] ? simple_acl_create+0x1c0/0x1c0 [ 359.124230][T16186] ? debug_smp_processor_id+0x17/0x20 [ 359.129597][T16186] ? __irq_exit_rcu+0x40/0x150 [ 359.134353][T16186] ? irq_exit_rcu+0x9/0x10 [ 359.138765][T16186] ? sysvec_irq_work+0xc8/0xd0 [ 359.143532][T16186] ? _raw_spin_unlock_irq+0x49/0x70 [ 359.148727][T16186] get_signal+0xf23/0x12e0 [ 359.153145][T16186] arch_do_signal_or_restart+0xbf/0x10f0 [ 359.158776][T16186] ? __bad_area_nosemaphore+0x2b0/0x420 [ 359.164314][T16186] ? down_read_trylock+0x100/0x150 [ 359.169421][T16186] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 359.175063][T16186] ? bad_area+0x6a/0x80 [ 359.179239][T16186] exit_to_user_mode_loop+0xa2/0xe0 [ 359.184428][T16186] exit_to_user_mode_prepare+0x76/0xa0 [ 359.189882][T16186] irqentry_exit_to_user_mode+0x9/0x10 [ 359.195431][T16186] irqentry_exit+0x12/0x60 [ 359.199853][T16186] exc_page_fault+0x67/0xc0 [ 359.204453][T16186] ? asm_exc_page_fault+0x8/0x30 [ 359.209385][T16186] asm_exc_page_fault+0x1e/0x30 [ 359.214240][T16186] RIP: 0033:0x0 [ 359.217702][T16186] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [ 359.225496][T16186] RSP: 002b:0000200000000008 EFLAGS: 00010217 [ 359.231575][T16186] RAX: 0000000000000000 RBX: 00007f56ecab6180 RCX: 00007f56ec85f749 [ 359.239545][T16186] RDX: 0000200000000240 RSI: 0000200000000000 RDI: 0000000022020000 [ 359.247598][T16186] RBP: 00007f56ec8e3f91 R08: 0000000000000000 R09: 0000000000000000 [ 359.255568][T16186] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 359.263733][T16186] R13: 00007f56ecab6218 R14: 00007f56ecab6180 R15: 00007ffc8c746658 [ 359.354600][T16186] memory: usage 307200kB, limit 307200kB, failcnt 11045 [ 359.558040][T16186] memory+swap: usage 427348kB, limit 9007199254740988kB, failcnt 0 [ 359.565977][T16186] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 359.616184][T16186] Memory cgroup stats for /syz4: [ 359.616398][T16186] anon 270336 [ 359.616398][T16186] file 309399552 [ 359.616398][T16186] kernel_stack 0 [ 359.616398][T16186] percpu 0 [ 359.616398][T16186] sock 0 [ 359.616398][T16186] shmem 309264384 [ 359.616398][T16186] file_mapped 135168 [ 359.616398][T16186] file_dirty 0 [ 359.616398][T16186] file_writeback 0 [ 359.616398][T16186] anon_thp 0 [ 359.616398][T16186] inactive_anon 304148480 [ 359.616398][T16186] active_anon 10002432 [ 359.616398][T16186] inactive_file 155648 [ 359.616398][T16186] active_file 155648 [ 359.616398][T16186] unevictable 0 [ 359.616398][T16186] slab_reclaimable 0 [ 359.616398][T16186] slab_unreclaimable 0 [ 359.616398][T16186] slab 0 [ 359.616398][T16186] workingset_refault_anon 0 [ 359.616398][T16186] workingset_refault_file 264 [ 359.616398][T16186] workingset_activate_anon 0 [ 359.616398][T16186] workingset_activate_file 132 [ 359.616398][T16186] workingset_restore_anon 0 [ 359.616398][T16186] workingset_restore_file 132 [ 359.737494][T16186] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.4413,pid=16186,uid=0 [ 359.757624][T16186] Memory cgroup out of memory: Killed process 16186 (syz.4.4413) total-vm:90380kB, anon-rss:1176kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 359.783803][ T27] oom_reaper: reaped process 16186 (syz.4.4413), now anon-rss:0kB, file-rss:53376kB, shmem-rss:0kB [ 359.797771][T16197] syz.4.4413 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 359.828201][T16197] CPU: 1 PID: 16197 Comm: syz.4.4413 Tainted: G W syzkaller #0 [ 359.837505][T16197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 359.847556][T16197] Call Trace: [ 359.850960][T16197] __dump_stack+0x21/0x24 [ 359.855288][T16197] dump_stack_lvl+0x169/0x1d8 [ 359.860061][T16197] ? show_regs_print_info+0x18/0x18 [ 359.865273][T16197] ? ___ratelimit+0x3d1/0x560 [ 359.869952][T16197] ? __kasan_check_write+0x14/0x20 [ 359.875074][T16197] ? _raw_spin_lock+0x8e/0xe0 [ 359.879748][T16197] dump_stack+0x15/0x1c [ 359.883919][T16197] dump_header+0xdd/0x650 [ 359.888246][T16197] oom_kill_process+0x1fa/0x2c0 [ 359.893111][T16197] out_of_memory+0x94a/0xd70 [ 359.897700][T16197] ? unregister_oom_notifier+0x20/0x20 [ 359.903171][T16197] ? mutex_lock_killable+0xd3/0xe0 [ 359.908277][T16197] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 359.914794][T16197] mem_cgroup_out_of_memory+0x260/0x310 [ 359.920423][T16197] ? mem_cgroup_oom_trylock+0x350/0x350 [ 359.926065][T16197] ? _raw_spin_lock+0x8e/0xe0 [ 359.930740][T16197] ? _raw_spin_trylock_bh+0x130/0x130 [ 359.936129][T16197] ? _raw_spin_unlock+0x4d/0x70 [ 359.941083][T16197] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 359.946777][T16197] ? _raw_spin_unlock_irq+0x4e/0x70 [ 359.951973][T16197] try_charge+0xf61/0x14e0 [ 359.956478][T16197] ? __memcg_kmem_charge+0x140/0x140 [ 359.961758][T16197] ? percpu_counter_add_batch+0x13c/0x160 [ 359.967478][T16197] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 359.973023][T16197] __mem_cgroup_charge+0x14c/0x6d0 [ 359.978138][T16197] shmem_add_to_page_cache+0x55e/0xe10 [ 359.983600][T16197] ? shmem_alloc_page+0x300/0x300 [ 359.988628][T16197] ? _raw_spin_lock_irqsave+0x110/0x110 [ 359.994172][T16197] ? find_lock_entry+0x4b/0x200 [ 359.999017][T16197] ? lru_cache_add+0x164/0x380 [ 360.003782][T16197] ? shmem_getpage_gfp+0x8f3/0x2110 [ 360.008977][T16197] shmem_getpage_gfp+0x8e8/0x2110 [ 360.014027][T16197] shmem_write_begin+0xce/0x1b0 [ 360.019141][T16197] generic_perform_write+0x2be/0x510 [ 360.024423][T16197] ? preempt_count_add+0x90/0x1b0 [ 360.029456][T16197] ? grab_cache_page_write_begin+0xb0/0xb0 [ 360.035262][T16197] ? file_remove_privs+0x580/0x580 [ 360.040373][T16197] ? __kasan_check_write+0x14/0x20 [ 360.045478][T16197] ? down_write+0xac/0x110 [ 360.049897][T16197] __generic_file_write_iter+0x24b/0x480 [ 360.055529][T16197] ? generic_write_checks+0x3d4/0x480 [ 360.060995][T16197] generic_file_write_iter+0xa9/0x1d0 [ 360.066365][T16197] __kernel_write+0x55a/0x910 [ 360.071046][T16197] ? vfs_read+0xa10/0xa10 [ 360.075471][T16197] ? populate_vma_page_range+0xf0/0xf0 [ 360.080965][T16197] ? cgroup_freezing+0x86/0xb0 [ 360.085722][T16197] ? freezing_slow_path+0x10a/0x150 [ 360.090936][T16197] dump_emit+0x240/0x360 [ 360.095192][T16197] ? wait_for_dump_helpers+0x390/0x390 [ 360.100649][T16197] dump_user_range+0x6a/0x1a0 [ 360.105340][T16197] elf_core_dump+0x278a/0x2bc0 [ 360.110103][T16197] ? load_elf_binary+0x2890/0x2890 [ 360.115210][T16197] ? __fsnotify_parent+0x5ff/0x6c0 [ 360.120415][T16197] ? shmem_unused_huge_scan+0xa0/0xa0 [ 360.125807][T16197] ? do_truncate+0x1ad/0x210 [ 360.130393][T16197] ? putname+0xfe/0x150 [ 360.134542][T16197] ? __kasan_check_read+0x11/0x20 [ 360.139564][T16197] ? cgroup_freezing+0x86/0xb0 [ 360.144495][T16197] ? freezing_slow_path+0x10a/0x150 [ 360.149784][T16197] do_coredump+0x1ac9/0x27f0 [ 360.154392][T16197] ? simple_acl_create+0x1c0/0x1c0 [ 360.159500][T16197] ? debug_smp_processor_id+0x17/0x20 [ 360.164870][T16197] ? __irq_exit_rcu+0x40/0x150 [ 360.169634][T16197] ? irq_exit_rcu+0x9/0x10 [ 360.174050][T16197] ? sysvec_irq_work+0xc8/0xd0 [ 360.178822][T16197] ? _raw_spin_unlock_irq+0x49/0x70 [ 360.184205][T16197] get_signal+0xf23/0x12e0 [ 360.188623][T16197] arch_do_signal_or_restart+0xbf/0x10f0 [ 360.194268][T16197] ? __bad_area_nosemaphore+0x2b0/0x420 [ 360.199811][T16197] ? down_read_trylock+0x100/0x150 [ 360.204919][T16197] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 360.210632][T16197] ? bad_area+0x6a/0x80 [ 360.214794][T16197] exit_to_user_mode_loop+0xa2/0xe0 [ 360.219990][T16197] exit_to_user_mode_prepare+0x76/0xa0 [ 360.225454][T16197] irqentry_exit_to_user_mode+0x9/0x10 [ 360.230941][T16197] irqentry_exit+0x12/0x60 [ 360.235352][T16197] exc_page_fault+0x67/0xc0 [ 360.239856][T16197] ? asm_exc_page_fault+0x8/0x30 [ 360.245036][T16197] asm_exc_page_fault+0x1e/0x30 [ 360.249890][T16197] RIP: 0033:0x0 [ 360.253342][T16197] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [ 360.261048][T16197] RSP: 002b:0000200000000008 EFLAGS: 00010217 [ 360.267114][T16197] RAX: 0000000000000000 RBX: 00007f56ecab6180 RCX: 00007f56ec85f749 [ 360.275259][T16197] RDX: 0000200000000240 RSI: 0000200000000000 RDI: 0000000022020000 [ 360.283326][T16197] RBP: 00007f56ec8e3f91 R08: 0000000000000000 R09: 0000000000000000 [ 360.291385][T16197] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 360.299354][T16197] R13: 00007f56ecab6218 R14: 00007f56ecab6180 R15: 00007ffc8c746658 [ 360.472705][T16511] device syzkaller0 entered promiscuous mode [ 360.607584][T16197] memory: usage 288200kB, limit 307200kB, failcnt 11286 [ 360.623910][T16197] memory+swap: usage 396472kB, limit 9007199254740988kB, failcnt 0 [ 360.634264][T16197] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.641214][T16197] Memory cgroup stats for /syz4: [ 360.641335][T16197] anon 270336 [ 360.641335][T16197] file 290611200 [ 360.641335][T16197] kernel_stack 0 [ 360.641335][T16197] percpu 0 [ 360.641335][T16197] sock 0 [ 360.641335][T16197] shmem 290611200 [ 360.641335][T16197] file_mapped 135168 [ 360.641335][T16197] file_dirty 0 [ 360.641335][T16197] file_writeback 0 [ 360.641335][T16197] anon_thp 0 [ 360.641335][T16197] inactive_anon 267837440 [ 360.641335][T16197] active_anon 27439104 [ 360.641335][T16197] inactive_file 155648 [ 360.641335][T16197] active_file 155648 [ 360.641335][T16197] unevictable 0 [ 360.641335][T16197] slab_reclaimable 0 [ 360.641335][T16197] slab_unreclaimable 0 [ 360.641335][T16197] slab 0 [ 360.641335][T16197] workingset_refault_anon 0 [ 360.641335][T16197] workingset_refault_file 264 [ 360.641335][T16197] workingset_activate_anon 0 [ 360.641335][T16197] workingset_activate_file 132 [ 360.641335][T16197] workingset_restore_anon 0 [ 360.641335][T16197] workingset_restore_file 132 [ 360.737461][T16197] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.4413,pid=16194,uid=0 [ 360.752580][T16197] Memory cgroup out of memory: Killed process 16194 (syz.4.4413) total-vm:90380kB, anon-rss:1152kB, file-rss:53184kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 360.949285][T16524] device sit0 left promiscuous mode [ 361.021775][T16526] device sit0 entered promiscuous mode [ 361.603472][T16532] device syzkaller0 entered promiscuous mode [ 362.055960][T16530] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.063886][T16530] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.071605][T16530] device bridge_slave_0 entered promiscuous mode [ 362.107555][T16530] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.135894][T16530] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.204382][T16530] device bridge_slave_1 entered promiscuous mode [ 362.634950][T16187] syz.4.4413 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 362.729319][T16187] CPU: 0 PID: 16187 Comm: syz.4.4413 Tainted: G W syzkaller #0 [ 362.738569][T16187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 362.748719][T16187] Call Trace: [ 362.752117][T16187] __dump_stack+0x21/0x24 [ 362.756560][T16187] dump_stack_lvl+0x169/0x1d8 [ 362.761263][T16187] ? show_regs_print_info+0x18/0x18 [ 362.766483][T16187] ? ___ratelimit+0x3d1/0x560 [ 362.771179][T16187] ? __kasan_check_write+0x14/0x20 [ 362.776309][T16187] ? _raw_spin_lock+0x8e/0xe0 [ 362.781006][T16187] dump_stack+0x15/0x1c [ 362.785185][T16187] dump_header+0xdd/0x650 [ 362.789527][T16187] oom_kill_process+0x1fa/0x2c0 [ 362.794420][T16187] out_of_memory+0x94a/0xd70 [ 362.799027][T16187] ? unregister_oom_notifier+0x20/0x20 [ 362.804509][T16187] ? mutex_lock_killable+0x8c/0xe0 [ 362.809642][T16187] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 362.816161][T16187] mem_cgroup_out_of_memory+0x260/0x310 [ 362.821738][T16187] ? mem_cgroup_oom_trylock+0x350/0x350 [ 362.827298][T16187] ? _raw_spin_lock+0x8e/0xe0 [ 362.832005][T16187] ? _raw_spin_trylock_bh+0x130/0x130 [ 362.837400][T16187] ? _raw_spin_unlock+0x4d/0x70 [ 362.842286][T16187] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 362.848034][T16187] ? _raw_spin_unlock_irq+0x4e/0x70 [ 362.853248][T16187] try_charge+0xf61/0x14e0 [ 362.857702][T16187] ? __memcg_kmem_charge+0x140/0x140 [ 362.863001][T16187] ? percpu_counter_add_batch+0x13c/0x160 [ 362.868746][T16187] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 362.874308][T16187] __mem_cgroup_charge+0x14c/0x6d0 [ 362.879437][T16187] shmem_add_to_page_cache+0x55e/0xe10 [ 362.884918][T16187] ? shmem_alloc_page+0x300/0x300 [ 362.889956][T16187] ? _raw_spin_lock_irqsave+0x110/0x110 [ 362.895512][T16187] ? find_lock_entry+0x4b/0x200 [ 362.900476][T16187] ? lru_cache_add+0x164/0x380 [ 362.905337][T16187] ? shmem_getpage_gfp+0x8f3/0x2110 [ 362.910551][T16187] shmem_getpage_gfp+0x8e8/0x2110 [ 362.915618][T16187] shmem_write_begin+0xce/0x1b0 [ 362.920485][T16187] generic_perform_write+0x2be/0x510 [ 362.925790][T16187] ? atime_needs_update+0x5b0/0x5b0 [ 362.931013][T16187] ? grab_cache_page_write_begin+0xb0/0xb0 [ 362.936843][T16187] ? file_remove_privs+0x580/0x580 [ 362.941968][T16187] ? __kasan_check_write+0x14/0x20 [ 362.947184][T16187] ? down_write+0xac/0x110 [ 362.951636][T16187] __generic_file_write_iter+0x24b/0x480 [ 362.957285][T16187] ? generic_write_checks+0x3d4/0x480 [ 362.962759][T16187] generic_file_write_iter+0xa9/0x1d0 [ 362.968324][T16187] __kernel_write+0x55a/0x910 [ 362.973013][T16187] ? vfs_read+0xa10/0xa10 [ 362.977445][T16187] ? populate_vma_page_range+0xf0/0xf0 [ 362.983006][T16187] ? cgroup_freezing+0x86/0xb0 [ 362.987910][T16187] ? freezing_slow_path+0x10a/0x150 [ 362.993126][T16187] dump_emit+0x240/0x360 [ 362.997395][T16187] ? wait_for_dump_helpers+0x390/0x390 [ 363.002954][T16187] dump_user_range+0x6a/0x1a0 [ 363.007641][T16187] elf_core_dump+0x278a/0x2bc0 [ 363.012428][T16187] ? load_elf_binary+0x2890/0x2890 [ 363.017567][T16187] ? __fsnotify_parent+0x5ff/0x6c0 [ 363.022818][T16187] ? shmem_unused_huge_scan+0xa0/0xa0 [ 363.028219][T16187] ? do_truncate+0x1ad/0x210 [ 363.032823][T16187] ? putname+0xfe/0x150 [ 363.036992][T16187] ? __kasan_check_read+0x11/0x20 [ 363.042029][T16187] ? cgroup_freezing+0x86/0xb0 [ 363.046890][T16187] ? freezing_slow_path+0x10a/0x150 [ 363.052197][T16187] do_coredump+0x1ac9/0x27f0 [ 363.056798][T16187] ? simple_acl_create+0x1c0/0x1c0 [ 363.061937][T16187] ? debug_smp_processor_id+0x17/0x20 [ 363.067323][T16187] ? __irq_exit_rcu+0x40/0x150 [ 363.072177][T16187] ? irq_exit_rcu+0x9/0x10 [ 363.076686][T16187] ? sysvec_irq_work+0xc8/0xd0 [ 363.081460][T16187] ? _raw_spin_unlock_irq+0x49/0x70 [ 363.086652][T16187] get_signal+0xf23/0x12e0 [ 363.091099][T16187] arch_do_signal_or_restart+0xbf/0x10f0 [ 363.096739][T16187] ? __bad_area_nosemaphore+0x2b0/0x420 [ 363.102302][T16187] ? down_read_trylock+0x100/0x150 [ 363.107410][T16187] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 363.113043][T16187] ? bad_area+0x6a/0x80 [ 363.117205][T16187] exit_to_user_mode_loop+0xa2/0xe0 [ 363.122399][T16187] exit_to_user_mode_prepare+0x76/0xa0 [ 363.127851][T16187] irqentry_exit_to_user_mode+0x9/0x10 [ 363.133583][T16187] irqentry_exit+0x12/0x60 [ 363.137994][T16187] exc_page_fault+0x67/0xc0 [ 363.142493][T16187] ? asm_exc_page_fault+0x8/0x30 [ 363.147427][T16187] asm_exc_page_fault+0x1e/0x30 [ 363.152273][T16187] RIP: 0033:0x0 [ 363.155745][T16187] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [ 363.163482][T16187] RSP: 002b:0000200000000008 EFLAGS: 00010217 [ 363.169549][T16187] RAX: 0000000000000000 RBX: 00007f56ecab6180 RCX: 00007f56ec85f749 [ 363.177516][T16187] RDX: 0000200000000240 RSI: 0000200000000000 RDI: 0000000022020000 [ 363.186005][T16187] RBP: 00007f56ec8e3f91 R08: 0000000000000000 R09: 0000000000000000 [ 363.194069][T16187] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 363.202129][T16187] R13: 00007f56ecab6218 R14: 00007f56ecab6180 R15: 00007ffc8c746658 [ 363.220807][T16187] memory: usage 296600kB, limit 307200kB, failcnt 14966 [ 363.232890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.252329][T16187] memory+swap: usage 416828kB, limit 9007199254740988kB, failcnt 0 [ 363.253645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.293019][T16187] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.310105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.374246][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.392640][T16187] Memory cgroup stats for /syz4: [ 363.392800][T16187] anon 270336 [ 363.392800][T16187] file 294260736 [ 363.392800][T16187] kernel_stack 0 [ 363.392800][T16187] percpu 0 [ 363.392800][T16187] sock 0 [ 363.392800][T16187] shmem 294125568 [ 363.392800][T16187] file_mapped 135168 [ 363.392800][T16187] file_dirty 0 [ 363.392800][T16187] file_writeback 0 [ 363.392800][T16187] anon_thp 0 [ 363.392800][T16187] inactive_anon 277291008 [ 363.392800][T16187] active_anon 21086208 [ 363.392800][T16187] inactive_file 114688 [ 363.392800][T16187] active_file 0 [ 363.392800][T16187] unevictable 0 [ 363.392800][T16187] slab_reclaimable 0 [ 363.392800][T16187] slab_unreclaimable 0 [ 363.392800][T16187] slab 0 [ 363.392800][T16187] workingset_refault_anon 66 [ 363.392800][T16187] workingset_refault_file 1320 [ 363.392800][T16187] workingset_activate_anon 0 [ 363.392800][T16187] workingset_activate_file 1188 [ 363.392800][T16187] workingset_restore_anon 0 [ 363.392800][T16187] workingset_restore_file 1089 [ 363.488670][T16187] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.4413,pid=16218,uid=0 [ 363.504572][T16187] Memory cgroup out of memory: Killed process 16218 (syz.4.4413) total-vm:90380kB, anon-rss:1152kB, file-rss:53488kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 363.527673][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.534900][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.582864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.591505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.599900][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.606977][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.705235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.718466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.736783][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.794708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.812668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.859305][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.872158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.889165][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.912035][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.953475][T16530] device veth0_vlan entered promiscuous mode [ 363.977752][T16530] device veth1_macvtap entered promiscuous mode [ 364.031530][T16598] device sit0 left promiscuous mode [ 364.182974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.201080][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.219584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.251850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.270364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.326903][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.337947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.499735][T16603] device veth1_macvtap left promiscuous mode [ 364.507951][T16603] device macsec0 entered promiscuous mode [ 364.721859][T16633] device wg2 left promiscuous mode [ 364.748425][ T470] device gretap0 left promiscuous mode [ 364.755086][ T470] bridge0: port 3(gretap0) entered disabled state [ 364.776074][T16633] device wg2 entered promiscuous mode [ 365.006706][ T470] device bridge_slave_1 left promiscuous mode [ 365.014055][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.060969][ T470] device bridge_slave_0 left promiscuous mode [ 365.093497][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.475672][T16709] syz.0.4559[16709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.475761][T16709] syz.0.4559[16709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.960917][T16734] tun0: tun_chr_ioctl cmd 1074812117 [ 367.107366][T16742] device syzkaller0 entered promiscuous mode [ 367.133240][T16740] device pim6reg1 entered promiscuous mode [ 368.426315][T16814] device veth0_vlan left promiscuous mode [ 368.446844][T16814] device veth0_vlan entered promiscuous mode [ 368.454429][T16787] device sit0 entered promiscuous mode [ 368.520247][T16818] device pim6reg1 entered promiscuous mode [ 368.527844][T16819] device sit0 left promiscuous mode [ 368.544242][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.555938][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.566449][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.386404][T16879] device syzkaller0 entered promiscuous mode [ 369.463715][T16883] syzkaller0: tun_net_xmit 1280 [ 369.475390][T16883] syzkaller0: create flow: hash 3936269488 index 2 [ 369.515883][T16878] syzkaller0: delete flow: hash 3936269488 index 2 [ 370.013565][T16909] device syzkaller0 entered promiscuous mode [ 371.684200][T16981] bridge0: port 3(gretap0) entered blocking state [ 371.690876][T16981] bridge0: port 3(gretap0) entered forwarding state [ 371.699658][T16981] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.707045][T16981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.715908][T16981] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.723184][T16981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.796965][T16981] device bridge0 entered promiscuous mode [ 372.802104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.960132][T17029] device pimreg0 entered promiscuous mode [ 374.211788][T17079] syz.3.4662[17079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.211849][T17079] syz.3.4662[17079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.391644][T17165] device pim6reg1 entered promiscuous mode [ 376.824563][T17188] device sit0 entered promiscuous mode [ 377.095127][T17192] device wg2 left promiscuous mode [ 377.128514][T17193] device wg2 entered promiscuous mode [ 377.260877][T17202] syz.3.4703[17202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.260976][T17202] syz.3.4703[17202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.442449][T17231] device syzkaller0 entered promiscuous mode [ 377.873142][T17245] syz.4.4715[17245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.875277][T17245] syz.4.4715[17245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.281924][T17253] device pim6reg1 entered promiscuous mode [ 378.647514][T16530] cgroup: fork rejected by pids controller in /syz5 [ 379.847169][T17309] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.887199][T17343] syz.3.4742[17343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.887288][T17343] syz.3.4742[17343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.903457][T17309] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.930929][T17309] device bridge_slave_0 entered promiscuous mode [ 379.963564][T17309] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.005108][T17309] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.038089][T17309] device bridge_slave_1 entered promiscuous mode [ 380.173186][T17356] device veth0_vlan left promiscuous mode [ 380.192719][T17356] device veth0_vlan entered promiscuous mode [ 380.421935][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.455434][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.475779][T15873] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.482933][T15873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.523341][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.545901][T15873] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.553040][T15873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.785626][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 380.799295][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.813935][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.855345][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 380.869874][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 380.898454][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 380.908737][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.947318][T17309] device veth0_vlan entered promiscuous mode [ 380.956807][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.967375][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.003234][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 381.015204][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.042829][T17309] device veth1_macvtap entered promiscuous mode [ 381.091604][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.106008][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.137360][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.195067][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 381.208694][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.356979][ T470] device bridge_slave_1 left promiscuous mode [ 381.368911][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.391783][ T470] device bridge_slave_0 left promiscuous mode [ 381.406101][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.447636][ T470] device veth1_macvtap left promiscuous mode [ 381.477092][ T470] device veth0_vlan left promiscuous mode [ 382.042715][T17426] device veth0_vlan left promiscuous mode [ 382.056852][T17426] device veth0_vlan entered promiscuous mode [ 382.152725][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.161857][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 382.245614][T15873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.086365][T17516] device wg2 left promiscuous mode [ 384.179718][T17576] : renamed from veth0_vlan [ 384.501180][T17583] device pim6reg1 entered promiscuous mode [ 385.016248][T17598] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.340806][T17621] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.792301][T17648] syz.3.4834[17648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.792358][T17648] syz.3.4834[17648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.900785][T17654] device veth1_macvtap left promiscuous mode [ 386.169768][T17684] device sit0 entered promiscuous mode [ 386.772968][T17706] device sit0 entered promiscuous mode [ 387.376212][T17751] device veth0_vlan left promiscuous mode [ 387.409752][T17751] device veth0_vlan entered promiscuous mode [ 387.481064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.491782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.506788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.618015][ T95] udevd[95]: worker [13619] terminated by signal 33 (Unknown signal 33) [ 387.643711][ T95] udevd[95]: worker [13619] failed while handling '/devices/virtual/block/loop2' [ 388.239428][T17792] device syzkaller0 entered promiscuous mode [ 388.287589][T17798] device pim6reg1 entered promiscuous mode [ 388.520982][T17824] device syzkaller0 left promiscuous mode [ 388.559878][T17827] device pim6reg1 entered promiscuous mode [ 388.974785][T17843] device pim6reg1 entered promiscuous mode [ 390.301992][T17933] device sit0 left promiscuous mode [ 390.375565][T17933] device sit0 entered promiscuous mode [ 390.607208][T17918] device veth0_vlan left promiscuous mode [ 390.645331][T17918] device veth0_vlan entered promiscuous mode [ 390.705496][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.717370][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 390.753784][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.933739][T17950] device syzkaller0 entered promiscuous mode [ 390.989884][T17948] device veth0_vlan left promiscuous mode [ 390.997402][T17948] device veth0_vlan entered promiscuous mode [ 391.014028][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.038172][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.057698][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.491104][T17984] device pim6reg1 entered promiscuous mode [ 393.001786][T18024] syz.3.4940[18024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.001850][T18024] syz.3.4940[18024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.112460][T18031] device veth0_vlan left promiscuous mode [ 393.155301][T18031] device veth0_vlan entered promiscuous mode [ 393.222348][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.253129][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 393.298162][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.692322][T18053] device pim6reg1 entered promiscuous mode [ 393.758141][T18063] device veth0_vlan left promiscuous mode [ 393.764740][T18063] device veth0_vlan entered promiscuous mode [ 393.773703][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.675293][T18097] device syzkaller0 left promiscuous mode [ 395.301822][T18132] device pim6reg1 entered promiscuous mode [ 395.725992][T18152] device syzkaller0 entered promiscuous mode [ 396.034934][T18171] device syzkaller0 left promiscuous mode [ 396.098652][T18171] syz.0.4980[18171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.098714][T18171] syz.0.4980[18171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.193740][T18199] device pim6reg1 entered promiscuous mode [ 397.512346][T18219] device pim6reg1 entered promiscuous mode [ 397.804492][T18234] device wg2 entered promiscuous mode [ 399.378998][T18271] device wg2 entered promiscuous mode [ 399.718385][T18298] device syzkaller0 entered promiscuous mode [ 399.801612][T18304] device syzkaller0 entered promiscuous mode [ 402.127894][T18404] : renamed from vlan0 [ 403.065269][T18443] device syzkaller0 entered promiscuous mode [ 403.403526][T18448] device wg2 entered promiscuous mode [ 403.910296][T18474] device macsec0 left promiscuous mode [ 403.931282][T18474] device veth1_macvtap entered promiscuous mode [ 403.938218][T18474] device macsec0 entered promiscuous mode [ 403.953260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 403.991802][T18488] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 404.020182][T18488] device syzkaller0 entered promiscuous mode [ 404.133317][T18492] device sit0 left promiscuous mode [ 405.227220][T18558] device sit0 entered promiscuous mode [ 405.709464][T18588] -1: renamed from syzkaller0 [ 406.172771][T18606] device sit0 entered promiscuous mode [ 407.574740][T18672] device pim6reg1 entered promiscuous mode [ 407.831050][T18695] device sit0 left promiscuous mode [ 407.887228][T18695] syz.4.5121[18695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.888888][T18695] syz.4.5121[18695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.555714][T18723] device sit0 left promiscuous mode [ 408.698378][T18726] device wg2 entered promiscuous mode [ 408.818887][T18723] device sit0 entered promiscuous mode [ 409.256655][T18770] device veth0_vlan left promiscuous mode [ 409.268990][T18770] device veth0_vlan entered promiscuous mode [ 409.470660][T18784] device veth1_macvtap left promiscuous mode [ 409.484657][T18784] device macsec0 left promiscuous mode [ 410.317241][T18807] device sit0 left promiscuous mode [ 410.622737][T18810] device sit0 entered promiscuous mode [ 411.165758][T18826] device batadv_slave_0 entered promiscuous mode [ 415.814225][T18980] device pim6reg1 entered promiscuous mode [ 416.634176][T19039] device pim6reg1 entered promiscuous mode [ 416.678184][T19038] device pim6reg1 entered promiscuous mode [ 416.894401][T19054] device pim6reg1 entered promiscuous mode [ 417.181334][T19068] device pim6reg1 entered promiscuous mode [ 440.464851][T19181] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.472011][T19181] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.479648][T19181] device bridge_slave_0 entered promiscuous mode [ 440.506848][T19185] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.514164][T19185] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.521795][T19185] device bridge_slave_0 entered promiscuous mode [ 440.528915][T19181] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.535977][T19181] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.543523][T19181] device bridge_slave_1 entered promiscuous mode [ 440.560353][T19185] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.567736][T19185] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.575205][T19185] device bridge_slave_1 entered promiscuous mode [ 440.620495][T19184] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.627623][T19184] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.635006][T19184] device bridge_slave_0 entered promiscuous mode [ 440.642230][T19184] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.649443][T19184] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.657100][T19184] device bridge_slave_1 entered promiscuous mode [ 440.717650][T19183] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.724710][T19183] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.732303][T19183] device bridge_slave_0 entered promiscuous mode [ 440.748065][T19183] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.755236][T19183] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.763439][T19183] device bridge_slave_1 entered promiscuous mode [ 440.790159][T19182] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.797206][T19182] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.804791][T19182] device bridge_slave_0 entered promiscuous mode [ 440.814013][T19182] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.821124][T19182] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.828559][T19182] device bridge_slave_1 entered promiscuous mode [ 440.844145][T19181] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.851207][T19181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.858494][T19181] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.865519][T19181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.973159][T19183] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.980494][T19183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.987844][T19183] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.994968][T19183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.006104][T19185] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.013273][T19185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.020653][T19185] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.027708][T19185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.048949][T19184] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.056021][T19184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.063335][T19184] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.070379][T19184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.092205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.100614][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.108850][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.116102][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.123634][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.130922][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.138253][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.145692][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.153249][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.177566][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.186033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.194257][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.201310][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.209187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.217655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.226189][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.233258][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.240795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.248924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.257044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.265296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.273784][ T470] device bridge_slave_1 left promiscuous mode [ 441.280081][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.287540][ T470] device bridge_slave_0 left promiscuous mode [ 441.293655][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.301473][ T470] device veth1_macvtap left promiscuous mode [ 441.411074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.418699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.446821][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.455587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.463948][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.471002][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.478783][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.487272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.495803][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.502883][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.521269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.528783][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.551155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.559100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.566493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.575069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.584120][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.591320][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.599018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.607263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.615678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.624032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.632605][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.639765][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.647999][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.656412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.664962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 441.673355][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.681994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.689532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.697024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 441.714571][T19181] device veth0_vlan entered promiscuous mode [ 441.722966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.731063][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.739206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.747785][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.755961][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.763049][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.770864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 441.779030][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.787194][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.794741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.804321][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.813038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.821455][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.828513][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.836191][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.844929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.853177][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.860214][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.871714][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.880200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.888437][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.895461][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.914987][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.923968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.933446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.941880][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.955118][T19182] device veth0_vlan entered promiscuous mode [ 441.968182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.976291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.984010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.991562][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.999766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.007232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.015750][T19181] device veth1_macvtap entered promiscuous mode [ 442.027771][T19183] device veth0_vlan entered promiscuous mode [ 442.036782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.044723][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 442.054074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.063204][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 442.071650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.083127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.104667][T19184] device veth0_vlan entered promiscuous mode [ 442.112969][T19182] device veth1_macvtap entered promiscuous mode [ 442.121106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 442.130216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.138641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.146143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.154259][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.162641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.171028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.179404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.187920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 442.195964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.217031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 442.225587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.233718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 442.242350][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.256827][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 442.265355][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=-1 (errno 104: Connection reset by peer) [ 442.291515][T19183] device veth1_macvtap entered promiscuous mode [ 442.300997][T19184] device veth1_macvtap entered promiscuous mode [ 442.324624][ T24] audit: type=1400 audit(1766651628.960:175): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1449]" dev="pipefs" ino=1449 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 442.360347][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.368726][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 442.377043][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.385616][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.394133][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 442.403018][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.411472][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.420211][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.429115][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.438278][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.446695][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.455783][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.470133][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.478962][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.487806][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.495367][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.000678][ T470] bridge0: port 3(gretap0) entered disabled state [ 443.010795][ T470] device gretap0 left promiscuous mode [ 443.016277][ T470] bridge0: port 3(gretap0) entered disabled state [ 443.178539][ T470] device bridge_slave_1 left promiscuous mode [ 443.184878][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.192280][ T470] device bridge_slave_0 left promiscuous mode [ 443.198569][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.206724][ T470] device bridge_slave_1 left promiscuous mode [ 443.212901][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.221876][ T470] device bridge_slave_0 left promiscuous mode [ 443.228038][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.235531][ T470] device veth0_to_team left promiscuous mode [ 443.241916][ T470] : port 1(veth0_to_team) entered disabled state [ 443.249312][ T470] device bridge_slave_1 left promiscuous mode [ 443.255424][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.263125][ T470] device bridge_slave_0 left promiscuous mode [ 443.269282][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.278562][ T470] device veth0_vlan left promiscuous mode [ 443.284420][ T470] device veth1_macvtap left promiscuous mode [ 446.118740][ T470] device bridge_slave_1 left promiscuous mode [ 446.124880][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.132587][ T470] device bridge_slave_0 left promiscuous mode [ 446.138931][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.146712][ T470] device bridge_slave_1 left promiscuous mode [ 446.152947][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.160399][ T470] device bridge_slave_0 left promiscuous mode [ 446.166500][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.174414][ T470] device bridge_slave_1 left promiscuous mode [ 446.180616][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.188087][ T470] device bridge_slave_0 left promiscuous mode [ 446.194232][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.202111][ T470] device bridge_slave_1 left promiscuous mode [ 446.208286][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.215694][ T470] device bridge_slave_0 left promiscuous mode [ 446.222063][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.229972][ T470] device bridge_slave_1 left promiscuous mode [ 446.236072][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.243591][ T470] device bridge_slave_0 left promiscuous mode [ 446.249770][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.258304][ T470] device veth1_macvtap left promiscuous mode [ 446.264311][ T470] device veth0_vlan left promiscuous mode [ 446.270178][ T470] device veth1_macvtap left promiscuous mode [ 446.276174][ T470] device veth0_vlan left promiscuous mode [ 446.282126][ T470] device veth1_macvtap left promiscuous mode [ 446.288291][ T470] device veth0_vlan left promiscuous mode [ 446.294070][ T470] device veth1_macvtap left promiscuous mode [ 446.300202][ T470] device veth0_vlan left promiscuous mode