last executing test programs: 5m7.868784737s ago: executing program 1 (id=132): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000280)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa, 0x0, 0x10000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xd2, &(0x7f0000001580)=""/210, 0x40f00, 0x4, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x19, &(0x7f0000000000)={0x3, 0x400000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2, 0x5}, 0x10}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x4, 0x8820, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0xc8, 0x0, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4e5"], &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0xfffffffe}, 0x28) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x10001, 0x4}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x2c, 0x0, 0xc7a8, 0x0, 0x4}, r5, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[], 0x0, 0x77, 0x0, 0x0, 0x20000007}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e000000040000000400", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b3"], 0x50) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) 5m7.384261296s ago: executing program 1 (id=136): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r3) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5d371c61f550e9d86aabda45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0db2b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec08647566b1bdd75d6a9a1e600aaf0f42ce94b4725d4c2da80150dc34e5975d6904f061ed9a7608959f2d24ee6ec4f2395d16e02f53c746f74b12013f738d76456c3407188eff97f31ca36e5d79e1f1c7c3b688ee21d37ba5ebf4afc2a61f16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) 5m6.845395246s ago: executing program 1 (id=140): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0xfe, 0x0, 0xfe, 0x0, 0xe9d7, 0x28c6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200)}, 0x4a1c, 0x4, 0x0, 0x3, 0x6, 0x0, 0x51c, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r2, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000000000000000003000000000000000000000000000000000c1297e00000000105"], 0x0, 0x42}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000073a4f4c5b000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r7, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x0, 0x0, &(0x7f0000000580), 0x8, 0x45, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0xc3f, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b400}, [@btf_id={0x18, 0x17, 0x3, 0x0, 0x2}, @ldst={0x1, 0x3, 0x2, 0x1, 0xb, 0x3585ab36a51a5a51, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xff8}, @generic={0x4, 0x1, 0x9, 0x8, 0x400}, @exit]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x9, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xc, 0x3, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r9, r6], 0x0, 0x10, 0x5}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', r8, @fallback=0x22, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r13}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0xf, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$unix(r14, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 5m6.690205769s ago: executing program 1 (id=141): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a0"], 0x0, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001b00000000000000000018110000", @ANYRES32=r4], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d00)={&(0x7f0000000cc0)='mm_page_alloc\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) 5m5.778100457s ago: executing program 1 (id=148): r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="660a0000000000006111840000000000180000000000000000de0bb0723afee7464110d7d3dffa0000000000000095000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async, rerun: 64) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (rerun: 64) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x52) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) (rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000dd0000000a"], 0x50) (async, rerun: 64) close(0x3) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="750a000000180000000000000000000000000000009500"/40], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) syz_clone(0x4eb82100, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) write$cgroup_subtree(r7, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) 5m5.647114939s ago: executing program 1 (id=149): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x17, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @tail_call]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa2, &(0x7f0000000240)=""/162, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xf, 0x3, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x5, 0x3, 0x8, 0xc}, {0x4, 0x4, 0x3, 0x4}, {0x0, 0x2, 0x6, 0x5}, {0x5, 0x5, 0xe, 0x9}, {0x4, 0x5, 0x10, 0x8}, {0x2, 0x4, 0x8}], 0x10, 0x18}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000500)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b80)={r6, &(0x7f0000000b00)="d3f188ea11d49243ad5f40cb668b659d67e98ca6c6a9024861876da95c4c4cd09d15ef1d3b8e1a602de14c7aa63cddd2af03b803fd627014be2a517cdea22788b0c9cbe1db16975db22e88eb02d2b645c5b10b87575e8e7f3af2c161ce011658ec6d", &(0x7f0000002a00)=""/4096, 0x4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x17, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x1, 0x0, 0xa, 0x5, 0x8, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffff8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000000680)='GPL\x00', 0x8000, 0xe1, &(0x7f00000006c0)=""/225, 0x41100, 0x48, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x6, 0xffff, 0x789f}, 0x10, 0x0, r6, 0x8, &(0x7f0000000840)=[r4, 0x1, r6, r6, r6, r5, r6], &(0x7f0000000880)=[{0x4, 0x5, 0xd, 0xc}, {0x0, 0x2, 0x8, 0x6}, {0x5, 0x5, 0x1, 0xb}, {0x3, 0x5, 0x1, 0xb}, {0x2, 0x3, 0x9, 0x8}, {0x2, 0x2, 0x6, 0x1}, {0x1, 0x2, 0x10, 0x2}, {0x5, 0x1, 0x9}], 0x10, 0xffffffff}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f00000009c0)={r7, r6}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r1, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x11, 0x8, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x0, 0x0, 0xffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000a40)='GPL\x00', 0x7, 0x78, &(0x7f0000000bc0)=""/120, 0x41100, 0x0, '\x00', r8, 0x0, r6, 0x8, &(0x7f0000000cc0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000d00)={0x4, 0xb, 0xaea9de29, 0x6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000d40)=[{0x1, 0x1, 0xc, 0x7}, {0x1, 0x2, 0x6, 0x8}, {0x0, 0x4, 0xf}], 0x10, 0x9e8}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0xf51b, '\x00', 0x0, r6, 0x3, 0x5}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) 4m50.649804318s ago: executing program 32 (id=149): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x17, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @tail_call]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa2, &(0x7f0000000240)=""/162, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xf, 0x3, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x5, 0x3, 0x8, 0xc}, {0x4, 0x4, 0x3, 0x4}, {0x0, 0x2, 0x6, 0x5}, {0x5, 0x5, 0xe, 0x9}, {0x4, 0x5, 0x10, 0x8}, {0x2, 0x4, 0x8}], 0x10, 0x18}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000500)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b80)={r6, &(0x7f0000000b00)="d3f188ea11d49243ad5f40cb668b659d67e98ca6c6a9024861876da95c4c4cd09d15ef1d3b8e1a602de14c7aa63cddd2af03b803fd627014be2a517cdea22788b0c9cbe1db16975db22e88eb02d2b645c5b10b87575e8e7f3af2c161ce011658ec6d", &(0x7f0000002a00)=""/4096, 0x4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x17, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x1, 0x0, 0xa, 0x5, 0x8, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffff8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000000680)='GPL\x00', 0x8000, 0xe1, &(0x7f00000006c0)=""/225, 0x41100, 0x48, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x6, 0xffff, 0x789f}, 0x10, 0x0, r6, 0x8, &(0x7f0000000840)=[r4, 0x1, r6, r6, r6, r5, r6], &(0x7f0000000880)=[{0x4, 0x5, 0xd, 0xc}, {0x0, 0x2, 0x8, 0x6}, {0x5, 0x5, 0x1, 0xb}, {0x3, 0x5, 0x1, 0xb}, {0x2, 0x3, 0x9, 0x8}, {0x2, 0x2, 0x6, 0x1}, {0x1, 0x2, 0x10, 0x2}, {0x5, 0x1, 0x9}], 0x10, 0xffffffff}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f00000009c0)={r7, r6}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r1, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x11, 0x8, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x0, 0x0, 0xffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000a40)='GPL\x00', 0x7, 0x78, &(0x7f0000000bc0)=""/120, 0x41100, 0x0, '\x00', r8, 0x0, r6, 0x8, &(0x7f0000000cc0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000d00)={0x4, 0xb, 0xaea9de29, 0x6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000d40)=[{0x1, 0x1, 0xc, 0x7}, {0x1, 0x2, 0x6, 0x8}, {0x0, 0x4, 0xf}], 0x10, 0x9e8}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0xf51b, '\x00', 0x0, r6, 0x3, 0x5}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) 5.258132639s ago: executing program 3 (id=3216): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x0, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 4.897288106s ago: executing program 3 (id=3223): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x3, 0xff, 0x5, 0x0, 0x6150, 0x61000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0x7, 0x2, 0x4000, 0x0, 0x8, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000840)={&(0x7f0000000680)=@name={0x1e, 0x2, 0x3, {{0x42}, 0x4}}, 0x10, &(0x7f00000007c0)=[{&(0x7f00000006c0)="6ce435b6afe91d35623161b3535a961f89e8cb2b6bba405d994653fb27daf56e74c25dc6d15dcd90a584fcf7d78de5fad1ca219e22dce11fd67b5cdfa0eeb618388a1ad93251bbaff51b4acd8457d7dbb56662b8944a85c22ca210e92c894a77495c6990aada30e20a76b287f6977280e63bf680dace965c69f20146e7be7753383c9a7a0a44da61483a8561720392c39d8470095775428c429a369465d7e8619e77ad3fdb1d6993411656891af6838eb4c2ce50087f17a55312bbd2be8869d2ee4cc6556fd8c2cf2b979226ffb3e48a201b587f0764591d28a4f05f33e4", 0xde}], 0x1, &(0x7f0000000800)="78da770de6bad24097728caaa847f2b094cc13676afd00c513", 0x19, 0x4000000}, 0x880) write$cgroup_subtree(r7, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3c200007"], 0xfdef) 3.900107185s ago: executing program 0 (id=3229): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = syz_clone(0x4000a00, &(0x7f0000000000)="a2d0e273319b75299c11b97322318b2d29cf3303216b571dbd7ba0f277d1048477bedc48fbf3115838ffaa053a", 0x2d, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)="ee1266edab053ca4128efaa95e722daf4844420f26b2bb5a44") r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000040100000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000200000003000000"], 0x48) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r6, r2, 0x0, 0x2, &(0x7f0000000380)='$\x00'}, 0x30) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r13}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000680)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x5}, @ldst={0x1, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x8}, @call={0x85, 0x0, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], &(0x7f0000000580)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xd, 0x5, 0x80}, 0x10, 0x1d8ae, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r9], 0xffffffffffffffff, 0x10, 0x9}, 0x94) close(r0) 3.838976166s ago: executing program 3 (id=3230): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="004b5ff6ff00000070b30fc703b7000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x8000000000000001, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97eb, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'wlan0\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r6, r7, 0x2, 0x2}, 0x10) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0200000002"], 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 3.828633266s ago: executing program 0 (id=3231): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}, 0x0, 0xc8, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10040) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08fff500000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.782492717s ago: executing program 0 (id=3232): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) close(0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) 3.723233768s ago: executing program 3 (id=3233): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000002000000000000180100002020702500000000002020207b1af8ff00000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11368}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400eaff070000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) write$cgroup_type(r0, &(0x7f00000002c0), 0x9) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000240)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001ff, 0x4, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.63141214s ago: executing program 3 (id=3235): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, 0x0, &(0x7f00000001c0)}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 3.489202083s ago: executing program 0 (id=3236): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000d00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000302"], 0x48) 3.478192113s ago: executing program 0 (id=3237): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) r5 = getpid() syz_open_procfs$namespace(r5, &(0x7f00000001c0)='ns/cgroup\x00') perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000003040)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) sendmsg$tipc(r10, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r9) 3.335199046s ago: executing program 2 (id=3238): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="09000000020000006d0500000200000000000000", @ANYRES32, @ANYBLOB='.\x00\x00\x00\x00\x00\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000004c0), 0x1000, r0}, 0x38) 3.163615009s ago: executing program 2 (id=3239): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000000080000000c000000fbbfffff01000000", @ANYRES32=0x1, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32=r1, @ANYRES32], 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='0'], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 2.897700604s ago: executing program 2 (id=3243): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r3, 0x0, 0x0, 0x0}, 0x30) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) syz_open_procfs$namespace(r4, &(0x7f00000002c0)='ns/time\x00') openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000007112050000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000080ffffff000000000000000085000000360000008500000008000000950000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x739d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007de0b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cd67b5b18065752a3ad500000000000000cb450063bc36005400000000000000ff7f00000001000000000000000000cb04fcbb0b5ba9918d37b056b9bbd11b6b9f260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fb4845124ef2e487204000000aaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aadffcc75fe369258673b5d053bdec75dca377232a790bce5a6f087ae8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db9af1b5d356d0f062137d866d11be4b1260b06cca9098a3f0151fdbbd4e97d62ecc6405003a60f1c6edc76683073909826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bdaeecc952a3fd2c46f3c1cde71a19d1a2982492abaa96765372831210e00d2bfea3b8df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f22542c133aadafdc96fdb49cc992dbdd5ac01ba51508951c7a7c5f5093bd6ca0916c3a12912715649c2b1c7193a4251b59d378d0616a48c7957e122665c8b7e89eddfc3783f000000000000000050572061dfb5248d3d4a1c37dcb92d9ef99e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf19524cf30f810da3204f4c93f4f5d7321acfefc4d1c9139ca4b65b9990995000000000000000000000000000000c8a3988cca41217c950554bb043cf364d709c2bf3ec46b75f1bce43e726210b53d362072bc120c076b4647afc595d97c288f5017088ac2b02ed97fc883a102ae6000044542e3aa7ada6d13ff93ec634a0fa0b5f41ed317b48b8b8c03b243d6e14b7087e2c5d41f8a51408e27283b54d04212cbb0f5af76b70b1bdcec7c0abe6407e7fa204b9919490af8bffca6fbbd2174a84328af4acc9c7ec655729125fc15da558cb6edfcdd0c3fca7130863d13369f79f1d13ac166249e4bffa4a272a0116b591a63bfca11205d216b34000000000000000045b5ade570aeb7cf89e900004dc6c89355082bdcb0b08b810cf63fd19a17f4d440f1546e8e5f8addedb88c7f7990947505d2fcd8cb14"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) 2.817412046s ago: executing program 2 (id=3244): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) (async) openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) (async) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) 2.702919138s ago: executing program 4 (id=3245): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x32, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=0x0], 0x0, 0x400003, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x7}, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000008510000003000000182000004471bbe556e4c488a8e5631c4895e0d53ca7b9e6490185063872851f1c7f09f607d0d19fb5f4383862084944490455acbd9f2f5207bb05fba3d4d0", @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0xfdeb}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0xd96d164a04c0d5e2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="a2", 0x1}], 0x1}, 0x0) 2.58923064s ago: executing program 2 (id=3246): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_freezer_state(r1, &(0x7f00000000c0)='THAWED\x00', 0x7) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f0000000140)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], &(0x7f00000001c0)='syzkaller\x00', 0x8, 0x6d, &(0x7f0000000200)=""/109, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x5, 0x7e3a, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x1, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000340)=[{0x0, 0x3, 0xd, 0x5}, {0x3, 0x3, 0x8, 0x3}], 0x10, 0x40000000}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='hrtimer_expire_entry\x00', r3, 0x0, 0x9}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000005c0)={r1, &(0x7f0000000480)="3d2989cda7c2001d2c4cb1f287a97e31bc02e400631593c9c135956b923552b0a8510d56dc8bb13efd8225a0cb986cb27225cafda2755ff03c3a5ed445ac14d4e0061b301e6396e9cec4f8612df9c2d49a2bd7dc4d349bed5132ee7de2390f446791d07ea9628289c2800ed336fd43453a7a86736ef5e478a4f4fcc2899aa0a931266eee2664139baefe15bea3adbdc1abac5463325ed64b1fc5e92a46f9f7b3cd2554e5b4a40c5b903156adbfc5276f2279830b1b7e6722e5acb6a798f180945cfe9477c0828de7a7f083fa02a704a122982ffbcadaff4ed6078b1d3bdc3ee44a7a4481b8fa4456a78ccca543", &(0x7f0000000580)=""/13}, 0x20) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='cq_alloc_error\x00', r3, 0x0, 0x7}, 0x18) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0x4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r3, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa6, &(0x7f0000001900)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa3, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001d80)={&(0x7f0000001b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xc}, {0x3, 0x1}, {0x10, 0x5}, {0x10}, {0x5}]}, @enum64={0x2, 0x1, 0x0, 0x13, 0x1, 0x5, [{0xe, 0xfd, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xe, 0xd3}, {0x2, 0x2}, {0x5, 0x4}, {0xb, 0x4}, {0x3, 0x2}, {0xc, 0x4}, {0x1, 0x3}, {0xf, 0x5}, {0x0, 0x1}, {0x7, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x80000000}}, @const={0x8, 0x0, 0x0, 0xa, 0x4}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x2e, 0x0, 0x30, 0x7}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x2}, @func={0xc, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000001c80)=""/246, 0x11b, 0xf6, 0x1, 0x3, 0x10000, @value=r0}, 0x28) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x16, 0xf, &(0x7f0000000780)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x8}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10}}], &(0x7f0000000800)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000840)=""/4096, 0x40f00, 0x44, '\x00', r10, @flow_dissector, r11, 0x8, &(0x7f0000001dc0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001e00)={0x2, 0xb, 0xffffffff, 0xfffffbff}, 0x10, 0x0, r3, 0x2, &(0x7f0000001e40)=[0xffffffffffffffff, r6, r6, r6, r6], &(0x7f0000001e80)=[{0x0, 0x4, 0x4, 0xa}, {0x2, 0x3, 0x2, 0x7}], 0x10, 0x6ff}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000004000)={&(0x7f0000001f80)="7889cf454306d9d23b29dc65b698e182f3214feefa503edc2ba685638374a48f519b592a7ab49d2b873ca576c2", &(0x7f0000001fc0)=""/60, &(0x7f0000002000)="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", &(0x7f0000003000)="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", 0x40, 0x1, 0x4}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004140)={@map=r6, 0xd, 0x0, 0xa, &(0x7f0000004040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000004080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000040c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000004180)={@ifindex=r8, r3, 0xe, 0x24, 0x0, @void, @void, @void, @value=r9, r14}, 0x20) r15 = perf_event_open$cgroup(&(0x7f0000004200)={0x1, 0x80, 0x2, 0x80, 0x2d, 0x8, 0x0, 0x7, 0x8400, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfca0, 0x1, @perf_bp={&(0x7f00000041c0), 0xc}, 0x200, 0x71d7, 0x4e, 0x6, 0x8, 0x2000000, 0x6}, r2, 0x1, r4, 0x6) ioctl$PERF_EVENT_IOC_DISABLE(r15, 0x2401, 0xffffffffffffffff) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000004280), 0x8) ioctl$TUNSETIFF(r16, 0x400454ca, &(0x7f00000042c0)={'erspan0\x00', 0x4000}) sendmsg$unix(r16, &(0x7f0000004700)={0x0, 0x0, &(0x7f0000004640)=[{&(0x7f0000004300)="bda33350457c96455aca", 0xa}, {&(0x7f0000004340)="0ce99203eab1f66c56d3c3802bb12240cedbcc3b29b16bbc14e49cfc2fb40cba3790becb3795f7b272d38c1a22b508a34dde5aeef94e93e415d7af66df5ab8b00309d5aa2060fc39bfc0e70aedad91db16830c35771b1847904a26d55ba95e7db38dde297abf3a10", 0x68}, {&(0x7f00000043c0)="47844abd544e0a7495e587", 0xb}, {&(0x7f0000004400)}, {&(0x7f0000004440)="d076411d1e0b192108dbdd893ad70fb66bcc6db02d9c22999db8b8b28cf617d95cb44143b7bcfbb290e2aee994add1b0b5760541022eb6edd95a18ee6e1376233dc29938c1c1d42438c24246669225b27eb2a4a0ea17f95db90ae0ec8b978bf41e40fbada9d2add7ac9b956dab4acf5effcba36b9df72d0ed9539c7461cf8fab84b3306dc69cb156cfe045e7ff027aa57db2628f817826271920f9a47dec165ceccf0d7dd2386aa705dcab13d27f59ccfa11512b14", 0xb5}, {&(0x7f0000004500)="70841b000dd22afc084bb98bddc44277514588d1b3d360870f86953b02c0070a71ba0226e350227e72f8006009528758238601b7f2b37b0eab090103b4ab22d33beb3e0bccdc8c3fbb68512b9949544913", 0x51}, {&(0x7f0000004580)="566466129f981eeb837dc35a9db464752d28a28e929b039cb7f9af616842bf72b17987d640c436fe43c94af79f88c789a92fd608d0a8db32b3a5eb6af5cbe7323c10459e051f3339e0267cbeb96955071e814da8595c1e1a4df58eb40da31ad1f65504dc0b98ccefee9489a5aa442c36a24438e51d088f04a299a151b094dd8f88966884835e829116a64a", 0x8b}], 0x7, &(0x7f00000046c0)=[@rights={{0x14, 0x1, 0x1, [r12]}}], 0x18, 0x8808}, 0x800) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000005900)={&(0x7f0000005840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x4, [@typedef={0xa, 0x0, 0x0, 0x8, 0x3}, @enum64={0x3, 0x2, 0x0, 0x13, 0x1, 0xc, [{0x7, 0x0, 0x6}, {0xa, 0x1, 0xc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x2}}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x18, 0x0, 0xd, 0x5}, @ptr={0x3}]}, {0x0, [0x5f, 0x61]}}, &(0x7f00000058c0)=""/8, 0x80, 0x8, 0x1, 0x8, 0x10000, @value=r16}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000059c0)={0x11, 0x17, &(0x7f0000004740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf492}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffff1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @map_idx={0x18, 0xd, 0x5, 0x0, 0xf}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000004800)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000004840)=""/4096, 0x40f00, 0x20, '\x00', 0x0, 0x0, r17, 0x8, &(0x7f0000005940)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005980)=[r6, r13, r6, r13, r16], 0x0, 0x10, 0x10001}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000005b80)={@cgroup, 0x1c, 0x1, 0x7ff, &(0x7f0000005a80)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000005ac0)=[0x0, 0x0, 0x0], &(0x7f0000005b00)=[0x0, 0x0, 0x0], &(0x7f0000005b40)=[0x0]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000005dc0)={r16, 0x58, &(0x7f0000005d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000005f00)={0x17, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xeed8}, [@map_val={0x18, 0xb, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x7fffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit]}, &(0x7f0000005c80)='GPL\x00', 0x9, 0x44, &(0x7f0000005cc0)=""/68, 0x40f00, 0x51, '\x00', r18, @fallback, r11, 0x8, &(0x7f0000005e00)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000005e40)={0x0, 0x2, 0x6, 0x3}, 0x10, 0x0, r16, 0x8, 0x0, &(0x7f0000005e80)=[{0x5, 0x4, 0x4}, {0x4, 0x5, 0xd, 0x9}, {0x5, 0x3, 0xc, 0x7}, {0x3, 0x4, 0x9, 0x5}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x5, 0x6, 0xa}, {0x0, 0x1, 0x7}, {0x3, 0x3, 0x5, 0xb}], 0x10, 0x1f}, 0x94) r19 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005fc0)={r7, 0x7, 0x8}, 0xc) r20 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000006040)=@o_path={&(0x7f0000006000)='./file0\x00', 0x0, 0xc000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000007740)={0x1e, 0x3a, &(0x7f0000006080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @alu={0x3, 0x1, 0x4, 0x5, 0x2, 0x30, 0xffffffffffffffff}, @map_fd={0x18, 0x9, 0x1, 0x0, r16}, @map_val={0x18, 0x7, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x10001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @call={0x85, 0x0, 0x0, 0x7a}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r20}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000006280)='GPL\x00', 0xc31, 0x2c, &(0x7f00000062c0)=""/44, 0x41000, 0x11, '\x00', 0x0, @sk_lookup=0x24, r11, 0x8, &(0x7f00000063c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000006400)={0x3, 0x2, 0x7, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000076c0)=[r13, r13, r16, 0xffffffffffffffff], &(0x7f0000007700)=[{0x1, 0x4, 0x3, 0x5}], 0x10, 0x8}, 0x94) 2.58855802s ago: executing program 2 (id=3247): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xb, 0x2000000000000221, &(0x7f00000007c0)=ANY=[@ANYBLOB="441b2ae623c9a2a359f4262a4dce09000acf376e7bfeaa45be984a3fda612f6f7a684f3915ba1d465dc07ca5ede565ab468b9f9d845e1093634b1eb88e1639f646d6979a052c311dd8826fdb9d582cf28a7a66acd0bbce119bacf6ad2501bef6e5bf6077dae8e7721eb102cfb01ba8c8dcaf85b5c686bd5246ae63c83aaf9efcd44b94c708c736d5eb7421674d8e52df733ba7586565a54a8e1c6bb9d0a1d45e36bc254bd2f5a0fb3beee7e16c2a3ccabc88e9a486bbe31d3b0671445489c08ec9eddca24963dfddc71b7a1c69639f4fb933b4288e6cab577f21550e72c3ef34f50847ffd0117ed9f04769917d1bddba83a8df85ab20a29cd0130b8cd4a996b7f55d7709fc", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x10, 0x0, 0x0, 0x0, 0xb0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000013000000000000000000004629d74bd30f7366656fb295ef00000000001c60ca78778df8a3ce55c710605adcdcba98c7970646"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004008b00e1c11445efd7040000001400", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x2a, 0x4, 0xeffffff6, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x2a, 0x4, 0xeffffff6, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r4) (async) close(r4) write$cgroup_int(r3, &(0x7f0000000400)=0x9, 0x12) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.58728594s ago: executing program 0 (id=3248): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x18, 0x13, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000007000000000000000000000018110000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000940)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000a00)=""/117, 0x40f00, 0x6a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d80)={0x4, 0xe, 0x6, 0x800}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001000)=[{0x1, 0x5, 0xa, 0xc}], 0x10, 0x4}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="3109000000000000a333246a4308a3d599e079df9300008000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='kmem_cache_free\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[], 0xfdef) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x45, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x6}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200004, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f00000004c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.051190581s ago: executing program 5 (id=3251): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000c43800000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r5, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x22010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x37fb9f24, 0x40000}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) 1.56330801s ago: executing program 4 (id=3252): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x0, 0x1, 0xe}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f0000000200)=@raw=[@exit, @ldst, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0xc, 0x0, 0x2, 0x10, &(0x7f00000004c0), 0x10}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/4098, 0x1002}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, r4, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.507469811s ago: executing program 4 (id=3253): ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x4, 0x80, 0xe1, 0x4, 0xd, 0x2, 0x0, 0x0, 0x40000, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8e07, 0x4, @perf_bp, 0x100004, 0x4, 0x7ff7ffff, 0x9, 0x6, 0x1fc, 0x8, 0x0, 0xfffff49f, 0x0, 0x9}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x4, 0x28}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES16, @ANYRESHEX], &(0x7f0000000780)='GPL\x00', 0x18a3, 0x0, 0x0, 0x40f00, 0x44, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x40) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00083300db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x9, 0x3, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x110000, 0x7, 0x9, 0x1, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xf, r1, 0xc35b42fd65b6e448) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000340)=0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r4}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.475431862s ago: executing program 5 (id=3254): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x0) (async) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) close(r6) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r1, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000a40)=[0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0, 0x61, &(0x7f0000000ac0)=[{}], 0x8, 0x10, &(0x7f0000000b00), &(0x7f0000000b80), 0x8, 0x31, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=@bloom_filter={0x1e, 0x6, 0x83ae, 0xef, 0x0, r7, 0xac, '\x00', r8, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8b, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x3e, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r9}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r13, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) 1.265371276s ago: executing program 5 (id=3255): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)=""/135, 0x87}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f00000004c0)=""/229, 0xe5}, {&(0x7f0000000180)=""/51, 0x33}, {&(0x7f0000000200)=""/48, 0x30}, {&(0x7f0000000740)=""/180, 0xb4}], 0x6, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}, 0x1) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000008c0)=""/4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.071415999s ago: executing program 5 (id=3256): perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r0 = syz_clone(0x10eb22b000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/27], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r3}, 0x8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa8}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.017247081s ago: executing program 5 (id=3257): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0xd, &(0x7f0000000300)=ANY=[@ANYRESOCT=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100f2060000fa0a00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000080)='syz0\x00', 0x1ff) (async) socketpair(0x27, 0x80000, 0x2, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000380)=r0, 0x4) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x8, 0xb}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r9}, &(0x7f0000000080), &(0x7f0000000280), 0x2000000}, 0x20) mkdirat$cgroup(r8, &(0x7f00000000c0)='syz1\x00', 0x1ff) (async) openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 925.370202ms ago: executing program 5 (id=3258): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000040000000000000000000085000000500000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) close(r5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00040f08000000040000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000000000000000000002000000850000001700000085000000070000d4dc378ef593ae8cdcb1602d009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000200)={'erspan0\x00', @random="bfb9286e66f7"}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FREEZING\x00', 0x9) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 653.786768ms ago: executing program 4 (id=3259): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="b7020000c3000000bf230000000000002703000000fefeff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500001000000000acaa8e53a53cb864c300094c07000000000000d94cf0987b00a749a8e53b5c9491cd1f2b94a64f1de23d03a8f0362ebfc44c77511e60070e25510070f7778d3e77ad85319f0113abbac795f8c24abca246150226eb93fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49d00000097184c8e9d34b1e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec264e3d96ad19a0c99a234b4b71b0bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9a565c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da4089269ccb4e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313ffff0b7f73335279aa2b68c9f045831119881764c71bb65b5138c50e06024e80fd9656bc077e4e259695748989335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e000000cb0868b48719e47296f2299df3ecfb5f3f0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc9d73223fe614f025a7f284de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c68dfbb03ddedc3e029b08959b145a7b110068ba071e75d75716243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e954ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109d221b7b26b7c9c209000005b7918a6cd856b8fa806c85480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3563a19582e0000000000000000000000000084b27fc6a3f95bf02b4eb5f1599dd46edcad432cc216316fe07afe27649c89cf022a90d895a2d70fcde7a9c37ede0c47c27f44595ab4b1fb1ed5b1d91314b2d50f94a768fb605679485041a6376b8344a39af68aed2be39794dd86ae82f9660cf4f935255d71f9fab2e430ac42bba1f54141cf39d4d50c4ded504beacb0de210d7a3716dca7362c134b91cef3efc514fbcb4747e6814ac16449ac02a43d9d4151697b4b7890ec6b481c5f0ca8c52a6322f34a796fa5941d23409ecf73458223baaffb94a89ee2884df000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x0, 0x1, 0xe}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f0000000200)=@raw=[@exit, @ldst, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0xc, 0x0, 0x2, 0x10, &(0x7f00000004c0), 0x10}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/4098, 0x1002}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, r4, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 469.452521ms ago: executing program 4 (id=3260): bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x128a2, 0x0) 403.164713ms ago: executing program 4 (id=3261): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="00070000000dbd7a9e3907906abe19b016aa0000c1a3818564afedb306c7e8c67e7720995beb478f0962d41124c78b86d06e7b5c2e58c02027b1887d5974f4c6157890cae01fc54d3030ee40bc8c6e200e4280e5dd0ea38d13370c4e6be32f62ce4ed0745a52fd1c2b3f93edfc63f6016cbcc732edb4d0b8038335f8811b28413da7dc0f4c4f42f928a90d7040e1a52f689bbe668146930d92fb276bae2d7344108132fcf67c212e2e6ff6fbe8cda6da87a7bd850b664994238383a0de80a7fb7f861c774d7ff3f8fcdd59d5110adbdde34ae6295be3f29c0ac372897e9c4d1deffcdbf846a4ede30f7e9ad885de5f00df94ac5d53fc2055", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000200"/28], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@typedef={0x0, 0x0, 0x0, 0x8, 0x1}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x30, 0x2e, 0x30, 0x5f, 0x5f, 0x0, 0x30, 0x61, 0x10]}}, &(0x7f0000000480)=""/203, 0x3b, 0xcb, 0x1, 0x8, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0), 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b0000000500000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0xa, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}]}, &(0x7f00000003c0)='GPL\x00', 0x24, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000400)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0xa, 0x200, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000500)=[r8], &(0x7f0000000540)=[{0x4, 0x4, 0x8, 0x5}, {0x5, 0x5, 0x7, 0x5}, {0x3, 0x5, 0x8, 0x9}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r10}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 0s ago: executing program 3 (id=3235): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, 0x0, &(0x7f00000001c0)}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.56' (ED25519) to the list of known hosts. [ 23.277383][ T30] audit: type=1400 audit(1757677312.228:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.278287][ T273] cgroup: Unknown subsys name 'net' [ 23.300223][ T30] audit: type=1400 audit(1757677312.228:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.327614][ T30] audit: type=1400 audit(1757677312.258:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.327762][ T273] cgroup: Unknown subsys name 'devices' [ 23.532116][ T273] cgroup: Unknown subsys name 'hugetlb' [ 23.537963][ T273] cgroup: Unknown subsys name 'rlimit' [ 23.761518][ T30] audit: type=1400 audit(1757677312.718:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.784807][ T30] audit: type=1400 audit(1757677312.718:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.809526][ T30] audit: type=1400 audit(1757677312.718:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.835872][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.844952][ T30] audit: type=1400 audit(1757677312.798:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.870859][ T30] audit: type=1400 audit(1757677312.798:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.906122][ T30] audit: type=1400 audit(1757677312.858:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.906489][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.932416][ T30] audit: type=1400 audit(1757677312.858:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.476177][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.483425][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.490923][ T281] device bridge_slave_0 entered promiscuous mode [ 24.498685][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.505773][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.513145][ T281] device bridge_slave_1 entered promiscuous mode [ 24.593783][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.600858][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.608256][ T282] device bridge_slave_0 entered promiscuous mode [ 24.619777][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.626978][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.634511][ T284] device bridge_slave_0 entered promiscuous mode [ 24.644380][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.651642][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.658954][ T282] device bridge_slave_1 entered promiscuous mode [ 24.668454][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.675619][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.683066][ T284] device bridge_slave_1 entered promiscuous mode [ 24.735039][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.742200][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.749582][ T285] device bridge_slave_0 entered promiscuous mode [ 24.767689][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.774740][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.782032][ T283] device bridge_slave_0 entered promiscuous mode [ 24.788572][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.795599][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.802884][ T285] device bridge_slave_1 entered promiscuous mode [ 24.818806][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.825868][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.833209][ T283] device bridge_slave_1 entered promiscuous mode [ 24.899727][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.906831][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.914122][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.921154][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.009582][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.016659][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.024042][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.031075][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.045874][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.053170][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.060367][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.068122][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.076877][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.084363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.106940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.141422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.150014][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.158302][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.165331][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.173158][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.181610][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.188727][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.196349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.204565][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.211598][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.219062][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.227372][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.234392][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.241742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.250056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.266148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.279168][ T281] device veth0_vlan entered promiscuous mode [ 25.300656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.308700][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.317050][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.325057][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.333890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.342462][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.350738][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.358858][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.367177][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.374320][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.381818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.389911][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.396951][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.404433][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.412752][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.423487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.445457][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.454735][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.461897][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.469723][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.478102][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.485328][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.493928][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.501961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.513021][ T285] device veth0_vlan entered promiscuous mode [ 25.519919][ T281] device veth1_macvtap entered promiscuous mode [ 25.531406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.539667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.547816][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.555853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.564149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.572348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.580592][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.588435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.596891][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.605494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.613125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.623409][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.630872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.649965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.658357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.666775][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.675197][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.694257][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.702974][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 25.703013][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.718741][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.725816][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.733289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.741700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.749865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.757964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.766047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.774031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.782098][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.789818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.797437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.805558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.814049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.822486][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.829742][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.839098][ T285] device veth1_macvtap entered promiscuous mode [ 25.846474][ T282] device veth0_vlan entered promiscuous mode [ 25.861165][ T282] device veth1_macvtap entered promiscuous mode [ 25.872375][ T284] device veth0_vlan entered promiscuous mode [ 25.887525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.895924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.905236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.913707][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.921572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.929454][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.937893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.946435][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.955088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.000480][ C1] hrtimer: interrupt took 24478 ns [ 26.041211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.069855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.077416][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.085317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.094822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.127296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.145976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.154937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.163338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.172143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.180242][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.188698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.197066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.271877][ T284] device veth1_macvtap entered promiscuous mode [ 26.286777][ T283] device veth0_vlan entered promiscuous mode [ 26.365214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.406037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.431031][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.439681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.452335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.461219][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.469494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.478105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.486970][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.667830][ T283] device veth1_macvtap entered promiscuous mode [ 26.701251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.708846][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.739925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.790874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.804418][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.848191][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.860752][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.869295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.880383][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.928053][ T375] device syzkaller0 entered promiscuous mode [ 28.251787][ T378] device syzkaller0 entered promiscuous mode [ 28.293460][ T381] @0Ù: renamed from bond_slave_1 [ 31.037044][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 31.037064][ T30] audit: type=1400 audit(1757677319.978:113): avc: denied { read } for pid=414 comm="syz.4.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.279499][ T429] device veth0_vlan left promiscuous mode [ 32.294858][ T429] device veth0_vlan entered promiscuous mode [ 32.307254][ T418] syz.0.22 (418) used greatest stack depth: 22784 bytes left [ 32.731200][ T30] audit: type=1400 audit(1757677321.678:114): avc: denied { relabelfrom } for pid=431 comm="syz.4.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.864826][ T30] audit: type=1400 audit(1757677321.678:115): avc: denied { relabelto } for pid=431 comm="syz.4.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.883405][ T468] device veth0_vlan left promiscuous mode [ 34.008256][ T468] device veth0_vlan entered promiscuous mode [ 34.283579][ T472] device wg2 entered promiscuous mode [ 34.738166][ T30] audit: type=1400 audit(1757677323.688:116): avc: denied { cpu } for pid=493 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.781472][ T423] syz.2.24 (423) used greatest stack depth: 21632 bytes left [ 35.139816][ T30] audit: type=1400 audit(1757677324.088:117): avc: denied { read } for pid=503 comm="syz.2.45" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.286857][ T30] audit: type=1400 audit(1757677324.088:118): avc: denied { open } for pid=503 comm="syz.2.45" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.444439][ T510] device syzkaller0 entered promiscuous mode [ 35.941182][ T30] audit: type=1400 audit(1757677324.898:119): avc: denied { create } for pid=531 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 36.363896][ T30] audit: type=1400 audit(1757677325.318:120): avc: denied { create } for pid=540 comm="syz.2.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 37.356598][ T30] audit: type=1400 audit(1757677326.308:121): avc: denied { create } for pid=548 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 37.765025][ T30] audit: type=1400 audit(1757677326.718:122): avc: denied { tracepoint } for pid=564 comm="syz.3.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.868507][ T563] device pim6reg1 entered promiscuous mode [ 39.144248][ T30] audit: type=1400 audit(1757677328.098:123): avc: denied { create } for pid=606 comm="syz.2.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 39.594637][ T30] audit: type=1400 audit(1757677328.548:124): avc: denied { write } for pid=620 comm="syz.3.77" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.640495][ T623] device veth0_vlan left promiscuous mode [ 39.791399][ T30] audit: type=1400 audit(1757677328.618:125): avc: denied { create } for pid=627 comm="syz.4.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 39.822236][ T623] device veth0_vlan entered promiscuous mode [ 40.000692][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.010147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.023912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.328947][ T30] audit: type=1400 audit(1757677329.278:126): avc: denied { ioctl } for pid=661 comm="syz.1.88" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.362677][ T662] device sit0 entered promiscuous mode [ 40.441712][ T30] audit: type=1400 audit(1757677329.308:127): avc: denied { create } for pid=661 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.164530][ T689] device veth0_vlan left promiscuous mode [ 41.173196][ T689] device veth0_vlan entered promiscuous mode [ 41.575163][ T721] syz.0.106[721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.575238][ T721] syz.0.106[721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.625562][ T734] device syzkaller0 entered promiscuous mode [ 44.500460][ C1] sched: RT throttling activated [ 45.245229][ T714] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 45.277000][ T714] device syzkaller0 entered promiscuous mode [ 45.359445][ T759] syz.4.115[759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.359516][ T759] syz.4.115[759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.484271][ T820] syz.2.131[820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.657829][ T820] syz.2.131[820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.718115][ T30] audit: type=1400 audit(1757677336.668:128): avc: denied { create } for pid=817 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 49.895030][ T901] syz.0.152[901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.895134][ T901] syz.0.152[901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.084359][ T30] audit: type=1400 audit(1757677340.038:129): avc: denied { create } for pid=934 comm="syz.4.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 51.327971][ T948] device sit0 entered promiscuous mode [ 51.854314][ T30] audit: type=1400 audit(1757677340.808:130): avc: denied { ioctl } for pid=963 comm="syz.0.171" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.001591][ T30] audit: type=1400 audit(1757677342.958:131): avc: denied { create } for pid=1006 comm="syz.3.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 54.638654][ T1045] device wg2 left promiscuous mode [ 55.802705][ T1069] device wg2 entered promiscuous mode [ 56.519050][ T1085] bond_slave_1: mtu less than device minimum [ 58.675681][ T1125] ÿÿÿÿÿÿ: renamed from vlan1 [ 59.717761][ T30] audit: type=1400 audit(1757677348.668:132): avc: denied { create } for pid=1166 comm="syz.4.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 60.385755][ T1189] device syzkaller0 entered promiscuous mode [ 60.441263][ T1197] pimreg: tun_chr_ioctl cmd 1074025677 [ 60.460365][ T1197] pimreg: linktype set to 769 [ 61.891726][ T30] audit: type=1400 audit(1757677350.848:133): avc: denied { create } for pid=1231 comm="syz.3.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 62.040093][ T1241] device syzkaller0 entered promiscuous mode [ 62.111294][ T1253] syz.0.265[1253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.111369][ T1253] syz.0.265[1253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.394291][ T1263] device veth0_vlan left promiscuous mode [ 62.461750][ T1263] device veth0_vlan entered promiscuous mode [ 63.208788][ T30] audit: type=1400 audit(1757677352.158:134): avc: denied { create } for pid=1297 comm="syz.4.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 63.385277][ T1301] device pim6reg1 entered promiscuous mode [ 63.529723][ T30] audit: type=1400 audit(1757677352.478:135): avc: denied { create } for pid=1302 comm="syz.4.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 64.253993][ T1329] syz.0.285[1329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.254094][ T1329] syz.0.285[1329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.348310][ T1327] syz.0.285[1327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.416609][ T1327] syz.0.285[1327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.338964][ T1353] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 65.400794][ T1343] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.420802][ T1343] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.441483][ T1343] device bridge_slave_0 entered promiscuous mode [ 65.470811][ T1343] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.495296][ T1343] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.502933][ T1343] device bridge_slave_1 entered promiscuous mode [ 65.740061][ T30] audit: type=1400 audit(1757677354.688:136): avc: denied { create } for pid=1343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.828786][ T30] audit: type=1400 audit(1757677354.688:137): avc: denied { write } for pid=1343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.874959][ T1343] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.882068][ T1343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.889534][ T1343] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.896708][ T1343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.944367][ T30] audit: type=1400 audit(1757677354.688:138): avc: denied { read } for pid=1343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.020951][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.045830][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.186774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.196964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.380698][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.389099][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.424590][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.431982][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.488650][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.526701][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.561901][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.569015][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.707628][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.772599][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.800565][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.825512][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.878396][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.898930][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.962145][ T1343] device veth0_vlan entered promiscuous mode [ 66.979180][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.989272][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.016769][ T1343] device veth1_macvtap entered promiscuous mode [ 67.076807][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.097178][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.117659][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.131167][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.149789][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.342060][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.366520][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.404950][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.424816][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.780770][ T1448] device wg2 left promiscuous mode [ 68.814074][ T1448] device wg2 entered promiscuous mode [ 72.873963][ T1545] device wg2 left promiscuous mode [ 72.969621][ T1547] device wg2 entered promiscuous mode [ 74.004407][ T30] audit: type=1400 audit(1757677362.958:139): avc: denied { create } for pid=1578 comm="syz.3.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 74.075180][ T30] audit: type=1400 audit(1757677363.028:140): avc: denied { create } for pid=1578 comm="syz.3.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 74.185048][ T1585] device syzkaller0 entered promiscuous mode [ 74.249310][ T1590] bond_slave_1: mtu less than device minimum [ 75.064688][ T1614] device pim6reg1 entered promiscuous mode [ 75.308831][ T8] device bridge_slave_1 left promiscuous mode [ 75.317980][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.343404][ T8] device bridge_slave_0 left promiscuous mode [ 75.355220][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.374440][ T30] audit: type=1400 audit(1757677364.328:141): avc: denied { create } for pid=1636 comm="syz.2.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 75.396790][ T8] device veth1_macvtap left promiscuous mode [ 75.404416][ T8] device veth0_vlan left promiscuous mode [ 76.340101][ T1661] device veth1_macvtap left promiscuous mode [ 76.631643][ T1678] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.638883][ T1678] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.132328][ T30] audit: type=1400 audit(1757677367.088:142): avc: denied { create } for pid=1732 comm="syz.0.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 80.594102][ T1820] device wg2 entered promiscuous mode [ 80.612786][ T1825] device veth1_macvtap left promiscuous mode [ 80.633750][ T30] audit: type=1400 audit(1757677369.588:143): avc: denied { create } for pid=1823 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 83.403468][ T1937] bond_slave_1: mtu less than device minimum [ 92.400022][ T2187] device wg2 left promiscuous mode [ 92.481947][ T2187] device wg2 entered promiscuous mode [ 93.225014][ T2237] device wg2 entered promiscuous mode [ 94.901572][ T2250] syz.5.557 (2250) used greatest stack depth: 21568 bytes left [ 94.991212][ T2276] device macsec0 entered promiscuous mode [ 95.166078][ T2276] device sit0 entered promiscuous mode [ 97.206606][ T2330] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.322233][ T2374] syz.0.593[2374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.322307][ T2374] syz.0.593[2374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.627359][ T30] audit: type=1400 audit(1757677387.578:144): avc: denied { create } for pid=2384 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.110759][ T2405] device syzkaller0 entered promiscuous mode [ 99.901044][ T2443] device syzkaller0 entered promiscuous mode [ 100.304804][ T2451] device pim6reg1 entered promiscuous mode [ 100.321942][ T2452] device syzkaller0 entered promiscuous mode [ 100.826661][ T2469] device syzkaller0 entered promiscuous mode [ 102.311459][ T2510] device syzkaller0 entered promiscuous mode [ 102.794682][ T2532] syz.3.639[2532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.794777][ T2532] syz.3.639[2532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.839157][ T2519] device pim6reg1 entered promiscuous mode [ 103.024984][ T2535] device syzkaller0 left promiscuous mode [ 103.487779][ T2563] device syzkaller0 entered promiscuous mode [ 104.541678][ T2614] device wg2 left promiscuous mode [ 105.144849][ T2688] device pim6reg1 entered promiscuous mode [ 105.214237][ T30] audit: type=1400 audit(1757677394.168:145): avc: denied { ioctl } for pid=2685 comm="syz.4.684" path="socket:[24726]" dev="sockfs" ino=24726 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 105.437569][ T2711] device sit0 left promiscuous mode [ 105.454977][ T2713] device sit0 entered promiscuous mode [ 105.716199][ T2707] device syzkaller0 entered promiscuous mode [ 105.761582][ T2711] device sit0 left promiscuous mode [ 105.798531][ T2716] device sit0 entered promiscuous mode [ 106.315434][ T2734] device sit0 entered promiscuous mode [ 106.849564][ T2771] device sit0 entered promiscuous mode [ 107.043061][ T2783] device wg2 left promiscuous mode [ 107.106103][ T2783] device wg2 entered promiscuous mode [ 107.451546][ T2809] tap0: tun_chr_ioctl cmd 1074025680 [ 107.913604][ T2827] device wg2 left promiscuous mode [ 108.008310][ T2827] device wg2 entered promiscuous mode [ 108.107070][ T2827] device veth0_vlan left promiscuous mode [ 108.150046][ T2827] device veth0_vlan entered promiscuous mode [ 108.309129][ T2845] device syzkaller0 entered promiscuous mode [ 108.508482][ T2859] -1: renamed from syzkaller0 [ 108.772931][ T2881] bond_slave_1: mtu less than device minimum [ 110.030045][ T2963] bridge0: port 3(veth1) entered blocking state [ 110.082583][ T2963] bridge0: port 3(veth1) entered disabled state [ 110.121529][ T2963] device veth1 entered promiscuous mode [ 111.713704][ T30] audit: type=1400 audit(1757677400.668:146): avc: denied { create } for pid=3016 comm="syz.2.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 111.753631][ T3034] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.799492][ T3034] device bridge_slave_1 left promiscuous mode [ 111.809618][ T3034] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.835422][ T3034] device bridge_slave_0 left promiscuous mode [ 111.842507][ T3034] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.487036][ T3068] bond_slave_1: mtu less than device minimum [ 113.086471][ T3074] GPL: port 1(erspan0) entered blocking state [ 113.110818][ T3074] GPL: port 1(erspan0) entered disabled state [ 113.128549][ T3074] device erspan0 entered promiscuous mode [ 113.689629][ T3097] GPL: port 1(erspan0) entered blocking state [ 113.695771][ T3097] GPL: port 1(erspan0) entered forwarding state [ 115.746615][ T3191] bond_slave_1: mtu less than device minimum [ 116.576078][ T3234] device wg2 left promiscuous mode [ 116.634832][ T3234] device wg2 entered promiscuous mode [ 116.694227][ T3265] device sit0 entered promiscuous mode [ 116.838833][ T3267] device sit0 left promiscuous mode [ 122.178737][ T3381] device veth0_vlan left promiscuous mode [ 122.188868][ T3381] device veth0_vlan entered promiscuous mode [ 122.210563][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.226601][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.234477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.850476][ T30] audit: type=1400 audit(1757677411.798:147): avc: denied { append } for pid=3391 comm="syz.0.892" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 123.254221][ T3402] device sit0 left promiscuous mode [ 123.417231][ T3402] device sit0 entered promiscuous mode [ 124.045582][ T3415] device pim6reg1 entered promiscuous mode [ 125.713108][ T3483] device sit0 left promiscuous mode [ 125.864177][ T3485] device veth0_vlan left promiscuous mode [ 125.881045][ T3485] device veth0_vlan entered promiscuous mode [ 126.044042][ T3513] syz.4.928[3513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.044123][ T3513] syz.4.928[3513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.173146][ T30] audit: type=1400 audit(1757677416.128:148): avc: denied { write } for pid=3555 comm="syz.4.942" name="cgroup.subtree_control" dev="cgroup2" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 127.227758][ T30] audit: type=1400 audit(1757677416.158:149): avc: denied { open } for pid=3555 comm="syz.4.942" path="" dev="cgroup2" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 127.263573][ T3556] device veth0_vlan left promiscuous mode [ 127.272967][ T3556] device veth0_vlan entered promiscuous mode [ 127.313492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.324366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.336760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.357715][ T3557] device pim6reg1 entered promiscuous mode [ 127.418232][ T3561] device sit0 entered promiscuous mode [ 127.648735][ T3570] syz.4.945[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.690399][ T3626] syz.0.962[3626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.725104][ T3646] syz.2.970[3646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.808118][ T3646] syz.2.970[3646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.796994][ T3687] bond_slave_1: mtu less than device minimum [ 134.004714][ T3700] device sit0 entered promiscuous mode [ 135.465398][ T3748] device pim6reg1 entered promiscuous mode [ 139.911232][ T3877] device pim6reg1 entered promiscuous mode [ 142.174619][ T3961] device syzkaller0 entered promiscuous mode [ 143.228210][ T4016] device pim6reg1 entered promiscuous mode [ 144.324365][ T4065] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 146.280737][ T4117] device veth0_vlan left promiscuous mode [ 146.293455][ T4117] device veth0_vlan entered promiscuous mode [ 150.686790][ T4223] device pim6reg1 entered promiscuous mode [ 151.062488][ T4240] sock: sock_timestamping_bind_phc: sock not bind to device [ 151.620546][ T4216] syz.4.1131 (4216) used greatest stack depth: 21376 bytes left [ 151.969127][ T4270] syz.3.1149[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.971861][ T4270] syz.3.1149[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.108019][ T4263] device syzkaller0 entered promiscuous mode [ 154.641672][ T4276] device sit0 left promiscuous mode [ 155.607945][ T4304] device syzkaller0 entered promiscuous mode [ 155.719350][ T4316] device veth1_macvtap entered promiscuous mode [ 155.730880][ T4316] device macsec0 entered promiscuous mode [ 155.751309][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.974640][ T4376] device syzkaller0 entered promiscuous mode [ 159.512037][ T4479] bond_slave_1: mtu less than device minimum [ 160.275487][ T4496] device sit0 entered promiscuous mode [ 160.770129][ T4503] device pim6reg1 entered promiscuous mode [ 161.488921][ T30] audit: type=1400 audit(1757677450.438:150): avc: denied { create } for pid=4517 comm="syz.2.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 161.574948][ T30] audit: type=1400 audit(1757677450.438:151): avc: denied { create } for pid=4517 comm="syz.2.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 162.463071][ T4530] device veth1 left promiscuous mode [ 162.510995][ T4530] bridge0: port 3(veth1) entered disabled state [ 162.560014][ T4530] device bridge_slave_1 left promiscuous mode [ 162.602729][ T4530] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.626447][ T4530] device bridge_slave_0 left promiscuous mode [ 162.657161][ T4530] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.887501][ T4547] device syzkaller0 entered promiscuous mode [ 162.894858][ T4543] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 164.962388][ T4600] device syzkaller0 entered promiscuous mode [ 165.881897][ T4639] device sit0 left promiscuous mode [ 165.977504][ T4642] device wg2 left promiscuous mode [ 166.915526][ T4677] device veth1_macvtap left promiscuous mode [ 166.983658][ T4677] device veth1_macvtap entered promiscuous mode [ 166.999478][ T4677] device macsec0 entered promiscuous mode [ 167.899597][ T4723] device pim6reg1 entered promiscuous mode [ 167.953558][ T4737] syz.3.1291[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.953628][ T4737] syz.3.1291[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.965478][ T4738] syz.3.1291[4738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.983431][ T4738] syz.3.1291[4738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.638674][ T4758] device veth0_vlan left promiscuous mode [ 168.666826][ T4758] device veth0_vlan entered promiscuous mode [ 171.791002][ T4881] bridge0: port 3(veth0) entered blocking state [ 171.826353][ T4881] bridge0: port 3(veth0) entered disabled state [ 171.930911][ T4881] device veth0 entered promiscuous mode [ 172.000688][ T4881] bridge0: port 3(veth0) entered blocking state [ 172.007262][ T4881] bridge0: port 3(veth0) entered forwarding state [ 172.085741][ T4901] syz.3.1338[4901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.085823][ T4901] syz.3.1338[4901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.140787][ T4897] device veth0_vlan left promiscuous mode [ 172.164150][ T4897] device veth0_vlan entered promiscuous mode [ 172.187554][ T4895] bond_slave_1: mtu less than device minimum [ 172.203028][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.321324][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.360627][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.429322][ T4929] device sit0 left promiscuous mode [ 172.495939][ T4929] device sit0 entered promiscuous mode [ 174.135684][ T5001] device syzkaller0 entered promiscuous mode [ 176.495164][ T5061] syz.2.1385 (5061) used greatest stack depth: 20800 bytes left [ 177.468127][ T30] audit: type=1400 audit(1757677466.418:152): avc: denied { attach_queue } for pid=5096 comm="syz.0.1395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 179.142948][ T5142] device syzkaller0 left promiscuous mode [ 179.881409][ T5140] device syzkaller0 entered promiscuous mode [ 179.955803][ T5149] device syzkaller0 entered promiscuous mode [ 180.032481][ T5165] device sit0 left promiscuous mode [ 180.746597][ T5195] device syzkaller0 entered promiscuous mode [ 180.811476][ T5195] syzkaller0: create flow: hash 3525944955 index 0 [ 181.198996][ T30] audit: type=1400 audit(1757677470.148:153): avc: denied { create } for pid=5235 comm="syz.4.1438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 182.837480][ T5352] syz.0.1477[5352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.837585][ T5352] syz.0.1477[5352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.760549][ C1] syzkaller0: delete flow: hash 3525944955 index 0 [ 184.908689][ T5406] ªªªªªª: renamed from vlan0 [ 185.470752][ T5427] device veth0_vlan left promiscuous mode [ 185.476890][ T5427] device veth0_vlan entered promiscuous mode [ 185.679950][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.688570][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.696634][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 185.987299][ T5446] syz.4.1502[5446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.987376][ T5446] syz.4.1502[5446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.823587][ T5447] ÿ: renamed from bond_slave_0 [ 188.294569][ T5494] syz.4.1518[5494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.294646][ T5494] syz.4.1518[5494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.856598][ T5519] device sit0 left promiscuous mode [ 189.010730][ T5520] device sit0 entered promiscuous mode [ 194.172350][ T5734] syz.3.1589[5734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.276314][ T5739] device veth1_to_bond entered promiscuous mode [ 195.220161][ T5794] device syzkaller0 entered promiscuous mode [ 195.298722][ T5796] device syzkaller0 entered promiscuous mode [ 195.861062][ T5821] device pim6reg1 entered promiscuous mode [ 199.551711][ T5884] device veth0_vlan left promiscuous mode [ 199.563573][ T5884] device veth0_vlan entered promiscuous mode [ 199.584032][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.592435][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 199.600122][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.630531][ T5881] tun1: tun_chr_ioctl cmd 1074025677 [ 199.635972][ T5881] tun1: linktype set to 776 [ 203.483917][ T6039] device syzkaller0 entered promiscuous mode [ 204.381220][ T6052] device pim6reg1 entered promiscuous mode [ 204.756301][ T6076] device veth0_vlan left promiscuous mode [ 204.788584][ T6076] device veth0_vlan entered promiscuous mode [ 206.055027][ T6111] device veth0_vlan left promiscuous mode [ 206.083919][ T6111] device veth0_vlan entered promiscuous mode [ 206.124308][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.132972][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.147238][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.443809][ T6125] device veth1_macvtap left promiscuous mode [ 206.520685][ T6129] device veth1_macvtap entered promiscuous mode [ 208.411640][ T6178] device veth0_vlan left promiscuous mode [ 208.418743][ T6178] device veth0_vlan entered promiscuous mode [ 208.878329][ T6192] device pim6reg1 entered promiscuous mode [ 210.063115][ T6204] sock: sock_set_timeout: `syz.3.1722' (pid 6204) tries to set negative timeout [ 210.092339][ T6204] device pim6reg1 entered promiscuous mode [ 210.648123][ T6224] ÿ: renamed from bond_slave_0 [ 211.989478][ T6267] device vlan0 entered promiscuous mode [ 212.048931][ T6271] tap0: tun_chr_ioctl cmd 2147767511 [ 212.067874][ T6272] tap0: tun_chr_ioctl cmd 2147767511 [ 212.725919][ T6304] ÿ: renamed from bond_slave_0 [ 215.438521][ T30] audit: type=1400 audit(1757677504.388:154): avc: denied { associate } for pid=6410 comm="syz.0.1781" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 217.856592][ T6515] syz.0.1813[6515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.856665][ T6515] syz.0.1813[6515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.311352][ T6606] device veth1_macvtap left promiscuous mode [ 224.059705][ T6621] device syzkaller0 entered promiscuous mode [ 224.699110][ T6672] bond_slave_1: mtu less than device minimum [ 224.776577][ T6673] bond_slave_1: mtu less than device minimum [ 224.827171][ T6678] device sit0 left promiscuous mode [ 224.894915][ T6678] device sit0 entered promiscuous mode [ 225.595507][ T6722] ------------[ cut here ]------------ [ 225.601150][ T6722] trace type BPF program uses run-time allocation [ 225.607878][ T6722] WARNING: CPU: 0 PID: 6722 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 225.620463][ T6722] Modules linked in: [ 225.624455][ T6722] CPU: 0 PID: 6722 Comm: syz.2.1879 Not tainted syzkaller #0 [ 225.644828][ T6722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 225.713389][ T6722] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 225.773972][ T30] audit: type=1400 audit(1757677514.728:155): avc: denied { create } for pid=6727 comm="syz.0.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 225.830969][ T6722] Code: ee ff 48 c7 c6 20 ea 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 a3 92 6b 05 01 48 c7 c7 80 e6 47 85 e8 83 2d 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 226.015982][ T6722] RSP: 0018:ffffc90000ab7428 EFLAGS: 00010246 [ 226.058168][ T6722] RAX: 8807f4f528ad7e00 RBX: 0000000000000001 RCX: 0000000000080000 [ 226.108773][ T6722] RDX: ffffc900027b0000 RSI: 0000000000002d59 RDI: 0000000000002d5a [ 226.119339][ T6722] RBP: ffffc90000ab7470 R08: dffffc0000000000 R09: ffffed103ee04e93 [ 226.141575][ T6722] R10: ffffed103ee04e93 R11: 1ffff1103ee04e92 R12: ffff88812a884000 [ 226.172752][ T6722] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810b781800 [ 226.224020][ T6722] FS: 00007f5a964a46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 226.283807][ T6722] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 226.335151][ T6722] CR2: 000000e100000000 CR3: 00000001accac000 CR4: 00000000003506a0 [ 226.373353][ T6722] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 226.423677][ T6722] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 226.486153][ T6722] Call Trace: [ 226.495980][ T6722] [ 226.499158][ T6748] device syzkaller0 entered promiscuous mode [ 226.525662][ T6722] resolve_pseudo_ldimm64+0x685/0x11d0 [ 226.551592][ T6722] ? check_attach_btf_id+0xde0/0xde0 [ 226.570478][ T6722] ? __mark_reg_known+0x1b0/0x1b0 [ 226.575578][ T6722] ? security_capable+0x87/0xb0 [ 226.634179][ T6722] bpf_check+0x2c25/0xf280 [ 226.680862][ T6722] ? 0xffffffffa002e000 [ 226.685074][ T6722] ? is_bpf_text_address+0x177/0x190 [ 226.758284][ T6722] ? bpf_get_btf_vmlinux+0x60/0x60 [ 226.763560][ T6722] ? unwind_get_return_address+0x4d/0x90 [ 226.769335][ T6722] ? stack_trace_save+0xe0/0xe0 [ 226.774610][ T6722] ? arch_stack_walk+0xee/0x140 [ 226.779662][ T6722] ? stack_trace_save+0x98/0xe0 [ 226.787733][ T6722] ? __stack_depot_save+0x34/0x480 [ 226.793212][ T6722] ? __kasan_slab_alloc+0x69/0xf0 [ 226.813346][ T6722] ? __kasan_kmalloc+0xec/0x110 [ 226.834607][ T6722] ? __kasan_kmalloc+0xda/0x110 [ 226.845798][ T6722] ? kmem_cache_alloc_trace+0x119/0x270 [ 226.858367][ T6722] ? selinux_bpf_prog_alloc+0x51/0x140 [ 226.886964][ T6722] ? security_bpf_prog_alloc+0x62/0x90 [ 226.907565][ T6722] ? bpf_prog_load+0x97c/0x1550 [ 226.912710][ T6722] ? __sys_bpf+0x4c3/0x730 [ 226.917260][ T6722] ? __x64_sys_bpf+0x7c/0x90 [ 226.929459][ T6722] ? x64_sys_call+0x4b9/0x9a0 [ 226.935568][ T6722] ? do_syscall_64+0x4c/0xa0 [ 226.950602][ T6722] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.956842][ T6722] ? check_stack_object+0x81/0x140 [ 226.970538][ T6722] ? memset+0x35/0x40 [ 226.974728][ T6722] ? bpf_obj_name_cpy+0x193/0x1e0 [ 226.980068][ T6722] bpf_prog_load+0x1042/0x1550 [ 226.985047][ T6722] ? map_freeze+0x360/0x360 [ 226.989627][ T6722] ? selinux_bpf+0xc7/0xf0 [ 226.994211][ T6722] ? security_bpf+0x82/0xa0 [ 226.998881][ T6722] __sys_bpf+0x4c3/0x730 [ 227.006124][ T6722] ? bpf_link_show_fdinfo+0x310/0x310 [ 227.011740][ T6722] ? __kasan_check_write+0x14/0x20 [ 227.018226][ T6722] ? switch_fpu_return+0x15d/0x2c0 [ 227.023792][ T6722] __x64_sys_bpf+0x7c/0x90 [ 227.028444][ T6722] x64_sys_call+0x4b9/0x9a0 [ 227.035664][ T6722] do_syscall_64+0x4c/0xa0 [ 227.041866][ T6722] ? clear_bhb_loop+0x50/0xa0 [ 227.055831][ T6722] ? clear_bhb_loop+0x50/0xa0 [ 227.060588][ T6722] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 227.066940][ T6722] RIP: 0033:0x7f5a97a3bba9 [ 227.073281][ T6722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.093533][ T6722] RSP: 002b:00007f5a964a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 227.103091][ T6722] RAX: ffffffffffffffda RBX: 00007f5a97c82fa0 RCX: 00007f5a97a3bba9 [ 227.114213][ T6722] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 227.122584][ T6722] RBP: 00007f5a97abee19 R08: 0000000000000000 R09: 0000000000000000 [ 227.137954][ T6722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 227.205027][ T6722] R13: 00007f5a97c83038 R14: 00007f5a97c82fa0 R15: 00007ffce4e51fe8 [ 227.280833][ T6722] [ 227.283903][ T6722] ---[ end trace ec690533c68a50be ]--- [ 229.541080][ T6927] device syzkaller0 entered promiscuous mode [ 230.114467][ T6987] device pim6reg1 entered promiscuous mode [ 230.932683][ T7028] device sit0 left promiscuous mode [ 230.989341][ T7020] device sit0 entered promiscuous mode [ 231.193539][ T7042] device syzkaller0 entered promiscuous mode [ 231.212721][ T7045] syz.2.1985[7045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.212794][ T7045] syz.2.1985[7045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.775763][ T7063] device pim6reg1 entered promiscuous mode [ 232.861481][ T30] audit: type=1400 audit(1757677521.818:156): avc: denied { create } for pid=7119 comm="syz.5.2007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 233.657649][ T7140] FAULT_INJECTION: forcing a failure. [ 233.657649][ T7140] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 233.683573][ T7140] CPU: 0 PID: 7140 Comm: syz.4.2013 Tainted: G W syzkaller #0 [ 233.692401][ T7140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 233.702559][ T7140] Call Trace: [ 233.705954][ T7140] [ 233.708998][ T7140] __dump_stack+0x21/0x30 [ 233.713437][ T7140] dump_stack_lvl+0xee/0x150 [ 233.718039][ T7140] ? show_regs_print_info+0x20/0x20 [ 233.723333][ T7140] dump_stack+0x15/0x20 [ 233.727504][ T7140] should_fail+0x3c1/0x510 [ 233.731930][ T7140] should_fail_usercopy+0x1a/0x20 [ 233.737017][ T7140] _copy_to_user+0x20/0x90 [ 233.741704][ T7140] simple_read_from_buffer+0xe9/0x160 [ 233.747267][ T7140] proc_fail_nth_read+0x19a/0x210 [ 233.752302][ T7140] ? proc_fault_inject_write+0x2f0/0x2f0 [ 233.757943][ T7140] ? security_file_permission+0x83/0xa0 [ 233.763493][ T7140] ? proc_fault_inject_write+0x2f0/0x2f0 [ 233.769133][ T7140] vfs_read+0x282/0xbe0 [ 233.773291][ T7140] ? kernel_read+0x1f0/0x1f0 [ 233.777969][ T7140] ? __kasan_check_write+0x14/0x20 [ 233.783091][ T7140] ? mutex_lock+0x95/0x1a0 [ 233.787518][ T7140] ? wait_for_completion_killable_timeout+0x10/0x10 [ 233.794196][ T7140] ? __fget_files+0x2c4/0x320 [ 233.798883][ T7140] ? __fdget_pos+0x2d2/0x380 [ 233.803473][ T7140] ? ksys_read+0x71/0x240 [ 233.807803][ T7140] ksys_read+0x140/0x240 [ 233.812050][ T7140] ? vfs_write+0xf70/0xf70 [ 233.816582][ T7140] ? __kasan_check_write+0x14/0x20 [ 233.821712][ T7140] ? switch_fpu_return+0x15d/0x2c0 [ 233.826838][ T7140] __x64_sys_read+0x7b/0x90 [ 233.831433][ T7140] x64_sys_call+0x96d/0x9a0 [ 233.835942][ T7140] do_syscall_64+0x4c/0xa0 [ 233.840700][ T7140] ? clear_bhb_loop+0x50/0xa0 [ 233.845425][ T7140] ? clear_bhb_loop+0x50/0xa0 [ 233.850114][ T7140] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.856012][ T7140] RIP: 0033:0x7f4701e775bc [ 233.860436][ T7140] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 233.880045][ T7140] RSP: 002b:00007f47008e1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 233.888469][ T7140] RAX: ffffffffffffffda RBX: 00007f47020bffa0 RCX: 00007f4701e775bc [ 233.896443][ T7140] RDX: 000000000000000f RSI: 00007f47008e10a0 RDI: 0000000000000007 [ 233.904420][ T7140] RBP: 00007f47008e1090 R08: 0000000000000000 R09: 0000000000000000 [ 233.912392][ T7140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.920361][ T7140] R13: 00007f47020c0038 R14: 00007f47020bffa0 R15: 00007ffcc8a576f8 [ 233.928344][ T7140] [ 234.111727][ T7160] device pim6reg1 entered promiscuous mode [ 235.536132][ T7243] device sit0 left promiscuous mode [ 235.639252][ T7245] device sit0 entered promiscuous mode [ 236.852456][ T7311] device syzkaller0 entered promiscuous mode [ 237.570202][ T7353] device sit0 left promiscuous mode [ 237.651332][ T7353] device sit0 entered promiscuous mode [ 239.855883][ T7430] device sit0 entered promiscuous mode [ 240.694319][ T7472] device pim6reg1 entered promiscuous mode [ 240.960655][ T7480] device pim6reg1 entered promiscuous mode [ 245.857166][ T7550] device wg2 left promiscuous mode [ 245.909306][ T7555] device wg2 entered promiscuous mode [ 247.187820][ T7586] device syzkaller0 entered promiscuous mode [ 248.429595][ T7628] device veth1_macvtap left promiscuous mode [ 248.500599][ T7628] device macsec0 left promiscuous mode [ 248.551611][ T7632] device veth1_macvtap entered promiscuous mode [ 248.558724][ T7632] device macsec0 entered promiscuous mode [ 252.577613][ T30] audit: type=1400 audit(1757677541.528:157): avc: denied { create } for pid=7656 comm="syz.4.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 252.679090][ T7647] device syzkaller0 entered promiscuous mode [ 253.271785][ T7681] syz.0.2172[7681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.553104][ T7685] device syzkaller0 entered promiscuous mode [ 254.034255][ T7699] tap0: tun_chr_ioctl cmd 1074025692 [ 254.467153][ T7710] device pim6reg1 entered promiscuous mode [ 254.584824][ T7710] device syzkaller0 entered promiscuous mode [ 255.770839][ T7750] device syzkaller0 entered promiscuous mode [ 255.881626][ T7756] tap0: tun_chr_ioctl cmd 1074025692 [ 260.060220][ T30] audit: type=1400 audit(1757677548.948:158): avc: denied { create } for pid=7774 comm="syz.4.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 260.204679][ T7775] device veth1_macvtap left promiscuous mode [ 260.223556][ T7775] device macsec0 left promiscuous mode [ 260.263420][ T7777] device veth1_macvtap entered promiscuous mode [ 260.300502][ T7777] device macsec0 entered promiscuous mode [ 262.417583][ T7833] device veth0_vlan left promiscuous mode [ 262.431889][ T7833] device veth0_vlan entered promiscuous mode [ 263.345087][ T7868] device sit0 left promiscuous mode [ 263.460312][ T7869] device sit0 entered promiscuous mode [ 264.287881][ T7891] device syzkaller0 entered promiscuous mode [ 264.596366][ T7908] device pim6reg1 entered promiscuous mode [ 265.062532][ T7938] device pim6reg1 entered promiscuous mode [ 265.102604][ T7942] device sit0 left promiscuous mode [ 265.158643][ T7942] device sit0 entered promiscuous mode [ 265.844918][ T7975] device syzkaller0 entered promiscuous mode [ 266.057142][ T7983] device macsec0 left promiscuous mode [ 266.126680][ T7985] device veth1_macvtap entered promiscuous mode [ 266.134394][ T7985] device macsec0 entered promiscuous mode [ 266.156796][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.481422][ T7999] €Â0: renamed from pim6reg1 [ 267.300339][ T8011] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 269.719025][ T30] audit: type=1400 audit(1757677558.668:159): avc: denied { create } for pid=8100 comm="syz.0.2297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 270.285900][ T30] audit: type=1400 audit(1757677559.238:160): avc: denied { create } for pid=8143 comm="syz.4.2307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 270.396885][ T8152] device pim6reg1 entered promiscuous mode [ 273.210586][ T8274] device syzkaller0 entered promiscuous mode [ 273.484651][ T8288] device pim6reg1 left promiscuous mode [ 274.982893][ T8345] device wg2 entered promiscuous mode [ 275.520171][ T8369] FAULT_INJECTION: forcing a failure. [ 275.520171][ T8369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.535688][ T8372] device sit0 left promiscuous mode [ 275.566126][ T8372] device sit0 entered promiscuous mode [ 275.595371][ T8369] CPU: 0 PID: 8369 Comm: syz.4.2371 Tainted: G W syzkaller #0 [ 275.604302][ T8369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 275.614474][ T8369] Call Trace: [ 275.617768][ T8369] [ 275.620728][ T8369] __dump_stack+0x21/0x30 [ 275.625078][ T8369] dump_stack_lvl+0xee/0x150 [ 275.629826][ T8369] ? show_regs_print_info+0x20/0x20 [ 275.635063][ T8369] dump_stack+0x15/0x20 [ 275.639353][ T8369] should_fail+0x3c1/0x510 [ 275.643790][ T8369] should_fail_usercopy+0x1a/0x20 [ 275.648839][ T8369] _copy_to_user+0x20/0x90 [ 275.653281][ T8369] simple_read_from_buffer+0xe9/0x160 [ 275.658776][ T8369] proc_fail_nth_read+0x19a/0x210 [ 275.663821][ T8369] ? proc_fault_inject_write+0x2f0/0x2f0 [ 275.669466][ T8369] ? security_file_permission+0x83/0xa0 [ 275.675124][ T8369] ? proc_fault_inject_write+0x2f0/0x2f0 [ 275.680874][ T8369] vfs_read+0x282/0xbe0 [ 275.685050][ T8369] ? kernel_read+0x1f0/0x1f0 [ 275.689663][ T8369] ? __kasan_check_write+0x14/0x20 [ 275.695001][ T8369] ? mutex_lock+0x95/0x1a0 [ 275.699445][ T8369] ? wait_for_completion_killable_timeout+0x10/0x10 [ 275.706291][ T8369] ? __fget_files+0x2c4/0x320 [ 275.710994][ T8369] ? __fdget_pos+0x2d2/0x380 [ 275.715694][ T8369] ? ksys_read+0x71/0x240 [ 275.720030][ T8369] ksys_read+0x140/0x240 [ 275.724280][ T8369] ? vfs_write+0xf70/0xf70 [ 275.728698][ T8369] ? __kasan_check_write+0x14/0x20 [ 275.733812][ T8369] ? switch_fpu_return+0x15d/0x2c0 [ 275.738994][ T8369] __x64_sys_read+0x7b/0x90 [ 275.743509][ T8369] x64_sys_call+0x96d/0x9a0 [ 275.748008][ T8369] do_syscall_64+0x4c/0xa0 [ 275.752418][ T8369] ? clear_bhb_loop+0x50/0xa0 [ 275.757119][ T8369] ? clear_bhb_loop+0x50/0xa0 [ 275.761799][ T8369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 275.767880][ T8369] RIP: 0033:0x7f4701e775bc [ 275.772394][ T8369] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 275.792257][ T8369] RSP: 002b:00007f47008e1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 275.800671][ T8369] RAX: ffffffffffffffda RBX: 00007f47020bffa0 RCX: 00007f4701e775bc [ 275.808639][ T8369] RDX: 000000000000000f RSI: 00007f47008e10a0 RDI: 0000000000000009 [ 275.816704][ T8369] RBP: 00007f47008e1090 R08: 0000000000000000 R09: 0000000000000000 [ 275.824669][ T8369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.832633][ T8369] R13: 00007f47020c0038 R14: 00007f47020bffa0 R15: 00007ffcc8a576f8 [ 275.840608][ T8369] [ 276.332439][ T30] audit: type=1400 audit(1757677565.288:161): avc: denied { create } for pid=8399 comm="syz.4.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 276.405005][ T30] audit: type=1400 audit(1757677565.308:162): avc: denied { create } for pid=8399 comm="syz.4.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 280.768468][ T8465] device wg2 entered promiscuous mode [ 281.845191][ T8518] device pim6reg1 entered promiscuous mode [ 282.310770][ T8546] bond_slave_1: mtu less than device minimum [ 283.214829][ T8563] device wg2 entered promiscuous mode [ 284.333226][ T8613] device pim6reg1 entered promiscuous mode [ 285.966894][ T8687] device veth1_macvtap left promiscuous mode [ 286.013670][ T8687] device veth1_macvtap entered promiscuous mode [ 286.023743][ T8687] device macsec0 entered promiscuous mode [ 286.307580][ T8705] device syzkaller0 entered promiscuous mode [ 286.613171][ T8728] device pim6reg1 entered promiscuous mode [ 286.843511][ T8744] bond_slave_1: mtu less than device minimum [ 287.278364][ T101] udevd[101]: worker [7763] terminated by signal 33 (Unknown signal 33) [ 287.327818][ T8754] device sit0 entered promiscuous mode [ 287.333038][ T101] udevd[101]: worker [7763] failed while handling '/devices/virtual/block/loop2' [ 287.624383][ T8758] device syzkaller0 entered promiscuous mode [ 289.307587][ T8834] device pim6reg1 entered promiscuous mode [ 289.495739][ T8850] device team_slave_1 entered promiscuous mode [ 289.507872][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.516293][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 289.734598][ T30] audit: type=1400 audit(1757677578.688:163): avc: denied { create } for pid=8871 comm="syz.4.2518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 292.409815][ T8969] device vlan0 entered promiscuous mode [ 294.334116][ T9023] device syzkaller0 entered promiscuous mode [ 294.423252][ T9040] device veth0_vlan left promiscuous mode [ 294.488485][ T9040] device veth0_vlan entered promiscuous mode [ 294.513806][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.524531][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.532547][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 295.649616][ T9088] device wg2 left promiscuous mode [ 295.928243][ T9113] device pim6reg1 entered promiscuous mode [ 296.163817][ T9129] device sit0 left promiscuous mode [ 296.243379][ T9130] device sit0 entered promiscuous mode [ 296.365933][ T9134] syz.4.2597 (9134) used obsolete PPPIOCDETACH ioctl [ 296.662991][ T9157] device sit0 left promiscuous mode [ 297.901723][ T9228] syz.3.2622[9228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.901784][ T9228] syz.3.2622[9228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.854235][ T9285] device veth0_vlan left promiscuous mode [ 298.890783][ T9285] device veth0_vlan entered promiscuous mode [ 298.965882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.980880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.988622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 300.660156][ T9378] device sit0 left promiscuous mode [ 302.564461][ T9391] device sit0 left promiscuous mode [ 302.585245][ T9392] device sit0 entered promiscuous mode [ 303.045493][ T9432] device sit0 left promiscuous mode [ 303.130695][ T9444] device syzkaller0 entered promiscuous mode [ 303.629751][ T9452] device pim6reg1 entered promiscuous mode [ 304.137837][ T30] audit: type=1400 audit(1757677593.088:164): avc: denied { create } for pid=9492 comm="syz.3.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 304.270147][ T9494] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.281309][ T9494] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.289025][ T9494] device bridge_slave_0 entered promiscuous mode [ 304.298479][ T9494] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.305840][ T9494] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.314433][ T9494] device bridge_slave_1 entered promiscuous mode [ 304.495304][ T9494] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.502502][ T9494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.509784][ T9494] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.516944][ T9494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.675067][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.684107][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.691570][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.714973][ T9533] device veth0_vlan left promiscuous mode [ 304.724794][ T9533] device veth0_vlan entered promiscuous mode [ 304.758826][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.767414][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.777280][ T4277] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.784355][ T4277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.792986][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.801662][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.810084][ T4277] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.817146][ T4277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.890486][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.901091][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.917260][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.926144][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.983750][ T9549] ref_ctr_offset mismatch. inode: 0x98b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 305.118724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.140568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.179640][ T9494] device veth0_vlan entered promiscuous mode [ 305.220047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 305.249425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.306581][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.321922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.496392][ T9494] device veth1_macvtap entered promiscuous mode [ 305.630699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.644532][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.661404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.690869][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.710744][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.738647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.750862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.810413][ T30] audit: type=1400 audit(1757677594.748:165): avc: denied { unmount } for pid=9494 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 305.880658][ T30] audit: type=1400 audit(1757677594.808:166): avc: denied { read } for pid=9594 comm="syz.3.2721" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 305.920500][ T30] audit: type=1400 audit(1757677594.808:167): avc: denied { open } for pid=9594 comm="syz.3.2721" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 305.960448][ T30] audit: type=1400 audit(1757677594.808:168): avc: denied { ioctl } for pid=9594 comm="syz.3.2721" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 306.199242][ T350] device veth1_macvtap left promiscuous mode [ 307.693765][ T30] audit: type=1400 audit(1757677596.648:169): avc: denied { create } for pid=9696 comm="syz.4.2748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 307.871723][ T9701] bond_slave_1: mtu less than device minimum [ 308.737994][ T9737] device pim6reg1 entered promiscuous mode [ 309.224088][ T9784] device veth0_vlan left promiscuous mode [ 309.278666][ T9784] device veth0_vlan entered promiscuous mode [ 309.877122][ T9808] device syzkaller0 left promiscuous mode [ 310.066577][ T9834] device sit0 left promiscuous mode [ 310.123355][ T9837] device sit0 entered promiscuous mode [ 310.662727][ T9873] device syzkaller0 entered promiscuous mode [ 311.667830][ T9911] device sit0 entered promiscuous mode [ 312.400112][ T9948] device syzkaller0 entered promiscuous mode [ 314.922192][T10087] device syzkaller0 entered promiscuous mode [ 315.203441][T10108] device veth0_vlan left promiscuous mode [ 315.248528][T10108] device veth0_vlan entered promiscuous mode [ 315.352637][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.375540][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 315.420650][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.526955][T10128] device sit0 entered promiscuous mode [ 315.766372][T10130] device veth1_macvtap left promiscuous mode [ 315.784261][T10130] device macsec0 left promiscuous mode [ 317.105979][T10189] device pim6reg1 entered promiscuous mode [ 317.114789][T10189] device wg2 left promiscuous mode [ 317.217521][T10194] device sit0 left promiscuous mode [ 317.232154][T10194] device sit0 entered promiscuous mode [ 318.417149][T10222] device sit0 left promiscuous mode [ 319.232701][T10255] syz.2.2908[10255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.232811][T10255] syz.2.2908[10255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.729667][T10279] device sit0 entered promiscuous mode [ 320.250008][T10312] device pim6reg1 entered promiscuous mode [ 320.424325][T10342] device sit0 entered promiscuous mode [ 321.208903][T10415] device veth1_macvtap left promiscuous mode [ 321.218319][T10415] device macsec0 entered promiscuous mode [ 321.251157][T10408] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.258339][T10408] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.266026][T10408] device bridge_slave_0 entered promiscuous mode [ 321.273327][T10408] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.305525][T10408] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.312922][T10408] device bridge_slave_1 entered promiscuous mode [ 321.483267][T10442] device sit0 left promiscuous mode [ 321.610113][T10451] device sit0 entered promiscuous mode [ 321.849636][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.863030][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.929046][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.940707][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.948999][ T4277] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.956108][ T4277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.968972][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.977912][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.987465][ T4277] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.994566][ T4277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.003675][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.044652][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.105688][ T350] GPL: port 1(erspan0) entered disabled state [ 322.113062][ T350] device erspan0 left promiscuous mode [ 322.118670][ T350] GPL: port 1(erspan0) entered disabled state [ 322.159499][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.198938][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.263115][T10408] device veth0_vlan entered promiscuous mode [ 322.357987][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.367648][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.379990][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.417485][T10408] device veth1_macvtap entered promiscuous mode [ 322.452846][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.461930][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.470263][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.599236][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.609793][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.621140][ T350] device bridge_slave_1 left promiscuous mode [ 322.637787][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.651055][ T350] device bridge_slave_0 left promiscuous mode [ 322.657190][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.682179][ T350] device veth1_macvtap left promiscuous mode [ 322.999874][T10489] device syzkaller0 entered promiscuous mode [ 323.029994][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.038770][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.796755][T10522] device pim6reg1 left promiscuous mode [ 323.899615][T10520] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.917409][T10520] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.924928][T10520] device bridge_slave_0 entered promiscuous mode [ 323.968086][T10520] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.980401][T10520] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.987745][T10520] device bridge_slave_1 entered promiscuous mode [ 324.147248][T10520] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.154391][T10520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.161700][T10520] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.168733][T10520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.270244][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.285025][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.294825][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.332970][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.341576][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.348640][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.356119][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.370817][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.378401][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.386289][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.394527][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.415401][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.423881][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.453631][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.511063][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.560286][T10520] device veth0_vlan entered promiscuous mode [ 324.567460][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.575771][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.653439][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.665329][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.718696][T10520] device veth1_macvtap entered promiscuous mode [ 325.016070][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 325.034624][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.074383][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.112089][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.134411][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.522570][T10579] device syzkaller0 entered promiscuous mode [ 325.777226][T10586] device pim6reg1 entered promiscuous mode [ 327.413190][T10642] device veth0_vlan left promiscuous mode [ 327.425367][T10642] device veth0_vlan entered promiscuous mode [ 327.694836][T10649] device sit0 left promiscuous mode [ 327.790130][T10662] device sit0 entered promiscuous mode [ 328.450304][T10683] device wg2 entered promiscuous mode [ 334.699814][T10774] device syzkaller0 entered promiscuous mode [ 337.304949][T10860] device sit0 left promiscuous mode [ 340.649414][T10949] syz.2.3111[10949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.649489][T10949] syz.2.3111[10949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.978630][T10966] device sit0 entered promiscuous mode [ 342.196037][T11022] device pim6reg1 entered promiscuous mode [ 342.245411][ T30] audit: type=1400 audit(1757677631.198:170): avc: denied { create } for pid=11019 comm="syz.0.3133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 342.324978][T11024] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.333201][T11024] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.627324][T11030] device sit0 left promiscuous mode [ 342.716181][T11030] device sit0 entered promiscuous mode [ 343.344837][T11051] bond_slave_1: mtu less than device minimum [ 344.319425][T11097] device pim6reg1 entered promiscuous mode [ 344.545999][T11106] syz.3.3157[11106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.546074][T11106] syz.3.3157[11106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.704495][T11106] device veth0_vlan left promiscuous mode [ 344.774427][T11106] device veth0_vlan entered promiscuous mode [ 344.860683][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.872328][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.905066][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 345.401003][T11115] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.408569][T11115] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.421587][T11115] device bridge_slave_0 entered promiscuous mode [ 345.449853][T11115] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.476406][T11115] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.492965][T11115] device bridge_slave_1 entered promiscuous mode [ 345.524464][T11130] device sit0 left promiscuous mode [ 345.682563][T11151] device syzkaller0 entered promiscuous mode [ 345.831248][T11115] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.838355][T11115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.845727][T11115] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.852800][T11115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.971443][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.981395][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.999186][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.041853][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.069956][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.077357][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.085632][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.094027][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.101110][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.112738][T11169] device pim6reg1 entered promiscuous mode [ 346.150291][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.158802][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.178984][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 346.187726][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.213725][T11115] device veth0_vlan entered promiscuous mode [ 346.226132][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 346.237629][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.259676][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.267840][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.276737][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 346.285576][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.294452][T11115] device veth1_macvtap entered promiscuous mode [ 346.317616][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.329330][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 346.359864][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.401886][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 346.444915][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.493763][T11179] device pim6reg1 entered promiscuous mode [ 347.217784][ T4277] device bridge_slave_1 left promiscuous mode [ 347.239984][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.284931][ T4277] device bridge_slave_0 left promiscuous mode [ 347.311542][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.360872][ T4277] device veth0_vlan left promiscuous mode [ 347.565875][T11227] device sit0 left promiscuous mode [ 347.596182][T11227] device sit0 entered promiscuous mode [ 349.039228][T11283] Ÿë: port 1(syz_tun) entered blocking state [ 349.073528][T11283] Ÿë: port 1(syz_tun) entered disabled state [ 349.085759][T11283] device syz_tun entered promiscuous mode [ 349.224468][T11294] device pim6reg1 entered promiscuous mode [ 351.547300][T11115] device syz_tun left promiscuous mode [ 351.560390][T11115] Ÿë: port 1(syz_tun) entered disabled state [ 352.284047][T11390] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.301010][T11390] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.308800][T11390] device bridge_slave_0 entered promiscuous mode [ 352.374196][T11390] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.390503][T11390] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.398107][T11390] device bridge_slave_1 entered promiscuous mode [ 352.630909][T11420] device syzkaller0 entered promiscuous mode [ 352.735377][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.765942][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.830542][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.853825][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.882600][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.889830][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.950090][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.995890][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.040876][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.048102][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.060525][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.244833][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.256274][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.335748][ T4277] device bridge_slave_1 left promiscuous mode [ 353.342034][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.349929][ T4277] device bridge_slave_0 left promiscuous mode [ 353.356501][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.369338][ T4277] device veth1_macvtap left promiscuous mode [ 353.375446][ T4277] device veth0_vlan left promiscuous mode [ 353.579434][T11446] device syzkaller0 entered promiscuous mode [ 353.600436][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.608654][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.661682][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.670314][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.716659][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.732253][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.817662][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.838997][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.949822][T11390] device veth0_vlan entered promiscuous mode [ 354.137125][T11463] device pim6reg1 entered promiscuous mode [ 354.386935][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.410996][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.598280][T11390] device veth1_macvtap entered promiscuous mode [ 354.734231][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.744818][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.753447][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.928931][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.947521][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.141595][ T4277] device veth0 left promiscuous mode [ 357.147084][ T4277] bridge0: port 3(veth0) entered disabled state [ 357.153781][ T4277] device bridge_slave_1 left promiscuous mode [ 357.159900][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.167299][ T4277] device bridge_slave_0 left promiscuous mode [ 357.173404][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.181288][ T4277] device bridge_slave_1 left promiscuous mode [ 357.187399][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.195029][ T4277] device bridge_slave_0 left promiscuous mode [ 357.201178][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.209050][ T4277] device bridge_slave_1 left promiscuous mode [ 357.215417][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.223115][ T4277] device bridge_slave_0 left promiscuous mode [ 357.229406][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.237438][ T4277] device bridge_slave_1 left promiscuous mode [ 357.243685][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.251286][ T4277] device bridge_slave_0 left promiscuous mode [ 357.257413][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.265737][ T4277] device veth0_vlan left promiscuous mode [ 357.271891][ T4277] device veth1_macvtap left promiscuous mode [ 357.278448][ T4277] device veth0_vlan left promiscuous mode [ 357.284360][ T4277] device veth1_macvtap left promiscuous mode [ 357.290477][ T4277] device veth0_vlan left promiscuous mode [ 360.081020][ T4277] device bridge_slave_1 left promiscuous mode [ 360.087124][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.094559][ T4277] device bridge_slave_0 left promiscuous mode [ 360.100801][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.108419][ T4277] device veth1_macvtap left promiscuous mode [ 360.114462][ T4277] device veth0_vlan left promiscuous mode