last executing test programs: 30m55.297830013s ago: executing program 4 (id=993): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0xc000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000ec0)=0x4, 0x12) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0xaf, 0x5, 0x3}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e8500000007000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x5) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000980)=""/194, 0x2d, 0xc2, 0x1}, 0x20) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 30m53.436207551s ago: executing program 4 (id=997): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 30m46.480741727s ago: executing program 4 (id=999): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0xf}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="03000001040000", @ANYRES32, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 30m45.766577119s ago: executing program 4 (id=1001): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)='%pI4 \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000080000000800000000000000", @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1600000000000000040000000180000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000009013f937de200a0c2b37fa5127286f932983d32abad5c958e760d88a827527d05ecaa11cfa95aa2a549fd6915287928e53c56fc4e2a4d68c6a533efa2426f18561024818c3fb8d7b6f4890f906b65a7e215fd5f2a149904833df619ee6655a9f16b83ca28ebb6405ea5cec8bd1ee0778abaa48501805f09a83a3c64d0c5930486087ab56238056c924551e1000de2ef26fe9f55598aff83ce7a9434e55f449693d3cd751ccb4ebb9e811d94ac4b7f1b6b3e5e17226333316"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000640), 0xffffffff}, 0x38) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 30m45.258734968s ago: executing program 4 (id=1004): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r4, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000040), 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='module_request\x00', r6}, 0x18) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_type(r5, &(0x7f0000000080), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f00000014c0)='\x14\xbe\x19J\xea\xb9*\xf6g\xf2\x84\xbfZ\xb91P9Lv\x92\xaf\x97\"a\x01\x00\x00\x00\x00\x00\x00\x00\xf6\x06\xf2P\x9c^\t\x9fGwI\xb5\x98\xcf/\x13\xc6\x80:\f\xa9\"Rhb\v\xf5`8\xc8\xe8*\xf0\xd0B\x1c\xea\x80\xcb\"\x182\xdb\xfd%MBl\xbd\x840&Tq\xc6\x1f\xd0i\xbf\xef\xfdi\xb9\x1bv\xf4Ii\xca\x01\x00\x00\x80\a\x00\x00\x00\x00\x00\x00\x00\xa5c\xb8S\x9d\xa8\x8f\xc8\xcb\x9e\x89\x00\x00\x00\x00\xbe\xc1\x81\x0e\x81\x19%\xcd\xde\x7f\xce\x06\xa6\xdbD\xf3\xb9rB\xda\x90\xf2\tJn\x9a\x0e[h\xf2Z\xcc\x87\xbdg\\\xcfO\x9e\xd6\xb8\xa0') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x37) 30m43.957556295s ago: executing program 4 (id=1014): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0xd0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 30m28.921037892s ago: executing program 32 (id=1014): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0xd0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14.561476809s ago: executing program 3 (id=7994): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000180)='./cgroup/../file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e7442", 0xaf, 0x0, &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 14.121840124s ago: executing program 3 (id=7996): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) gettid() bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x14, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000002085000000040000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x23, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) perf_event_open(0x0, 0x0, 0x100000000, 0xffffffffffffffff, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x1a, 0x25, &(0x7f0000000a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ringbuf_query, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40000000}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x6b7a, 0xaf, &(0x7f0000000740)=""/175, 0x41000, 0x24, '\x00', 0x0, @fallback=0x37, r5, 0x8, &(0x7f0000000d00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xf, 0x8, 0x3ff}, 0x10, 0x0, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000000dc0)=[{0x3, 0x1, 0x5, 0x1}, {0x5, 0x4, 0xb, 0x5}, {0x2, 0x5, 0x3, 0x5}, {0x5, 0x2, 0x6, 0x3}, {0x5, 0x2, 0x10, 0x5}, {0x4, 0x5, 0xd, 0x9}, {0x1, 0x5, 0x1, 0x6}], 0x10, 0xff}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 13.325047631s ago: executing program 3 (id=7997): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002c40)={r3, 0x0, 0x4, 0xd0, &(0x7f0000001180)="9a0ddd68", &(0x7f00000029c0)=""/208, 0x2, 0x0, 0xce, 0x41, &(0x7f0000002ac0)="095e6638c4bbdc31207dad16bb36910b151ec1d1b6c5b8f0eb1327ba178a76a1f310baa4dc6712ece1cb4bec397b1cd41eb5b1679f322e51e4b9ef06a8e8eb962deda6d3f8c750dbe118bedebeb34c3ca407861d830c1f393eb274273244cbd3764438afd71afd3b39c5bd613cbab92dc5fff526ac2a4c8c8ef9e3fd2f507d9c16ca301bc4434b5ec1c816ea6d4eadd4e68d746d0ea7b8d04161d902dd93d258fe1c01cbd58d4600d74185689207bc2bad4fb5d6111024d9a1966cbab463037fc7d13492c73f0cf041a5e06bd651", &(0x7f0000002bc0)="57ac588c8aee4bb2f821c4b87abd5c1f3b020ff46948a9c47f0d92fdfe94336ccfebaea99718f5d613e46877f4a67269401972cffd468117f89f9feb12373d8f95", 0x0, 0x0, 0x3e}, 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x7, 0x80, 0x93, 0x5, 0x5, 0xf3, 0x0, 0x0, 0x2400, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0x4c7dbfc3, 0x2}, 0x1042, 0xedd0, 0x5e4, 0x1, 0x3, 0x4, 0x3, 0x0, 0x8, 0x0, 0x9a95}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xe) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000007000000000000", @ANYRES16=r0, @ANYRES32=r1, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8d, &(0x7f00000013c0)=""/141, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0xc8, 0xffffffa7, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r11, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12.129532981s ago: executing program 3 (id=8001): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x250, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000080)='syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 6.962798843s ago: executing program 5 (id=8018): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e00000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00', @local}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0}, 0x94) 6.230796166s ago: executing program 5 (id=8022): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x5}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000000000000002000005000000000000000001000000000000000000000001000000183500000000691471a879a6f7"], 0x0, 0x66}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r2, @ANYBLOB="0000010000000000000000000000000000007013", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da2e2e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018e206eca728b1538327cf7d5db557641100008ca7ed88f56000000000000000b2bc33055bbf1c42dd43407dcff3acaaac9302c8cac87a7df7", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.527052157s ago: executing program 2 (id=8026): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x402102, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x33) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$unix(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001ec0800000001000000785360db89602106d1ef7a981278146ac15e79e20b8965a974a9598790edbba4570a12002e2c8c29b1854b335ed63c00000000000000029680ee89bf46683e5f4665757f071abef3e28358e8013d35be8ef1d014bb75e86d874e733267ab1fdfd388fb9eeb514527ca313f3aca9c6607f0d36c1d859bc62ee98a53d4da2283e7bd140ab7f174578525440f046b1e8ac0fd91602751de43e30bf0fbcce7774e53cf41802918668477ef5f60c07e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x50) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5.526258787s ago: executing program 3 (id=8027): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x250, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000080)='syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.232305403s ago: executing program 1 (id=8030): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x2e) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x20, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000"], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200939c939e00000800000001005c008000000031ae9264d2", @ANYRES32=r1, @ANYBLOB="0200"/15, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="03000000030000000500"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1a, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0xe, 0x7f, &(0x7f0000000600)=""/127, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x80000004}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x4, 0xfe, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xb452e779) ioctl$TUNSETOFFLOAD(r6, 0x541b, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x40000000) close(r7) sendmsg$sock(r7, &(0x7f00000004c0)={&(0x7f0000000240)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)="52ac4b48a0c4eca52d9e2e1bfd20b6e1dc3f256f709176ec9265f1e5d40a710ec2e54385ed47c597b4a47acfc5f63b521a86feacc8c7ceddd8d3d95f51ede7b92a122efc4c", 0x45}, {&(0x7f0000000340)="795c75b4cc92f1a9bbbe847be8f20ed7d8b60434a2a03d5a8b9fe1a9199f4534ad0471acc51134445cd0cf9a635fbfca0fb566427123bff0a1fddba0cbe15e0d9461fcc324c4d5d2", 0x48}, {&(0x7f00000001c0)="684bb2489cf7be7a039e5fd2439cad60b27a86c183881ebf15133d222548134552f9fd", 0x23}, {&(0x7f00000003c0)="461d22bf3a6f4595dc53b29a12151376a0666edcb7fa2ac0668e2ae280a2d04e3287a09ebb7fa734bb38f34baa2125c43a708f5ef77153", 0x37}], 0x4, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x48}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.229946253s ago: executing program 0 (id=8040): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000200)=r5, 0x4) sendmsg$sock(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000500)=ANY=[@ANYRESDEC=r7, @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000800000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd30, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r11}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r9) socketpair(0x3, 0x3, 0x80000000, &(0x7f00000000c0)) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r9, 0x40047451, &(0x7f0000000180)) 3.887775063s ago: executing program 2 (id=8031): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100330, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000400)=r2, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r4, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 3.444039449s ago: executing program 0 (id=8032): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001dccaaaaca9365c335383499c139ad9ef44c45d3d8a4df012905ac086855e113c15894454b2d8a584a3d9904a65a0b508ab16312eeec2763f350737560a49bd4ae48afaf65b0885320"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r2}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r4, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2000000000000004, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000600), &(0x7f0000000700), 0x8, 0x8, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@ifindex=r5, 0x22, 0x1, 0x81, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) write$cgroup_freezer_state(r9, &(0x7f0000000400)='FREEZING\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x0, 0x0}, 0xfffffffffffffe4a) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000000c0)="fb", 0x1}], 0x1}, 0xc000) recvmsg(r11, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4083, 0xff3}], 0x1, 0x0, 0x61}, 0x0) 3.331489435s ago: executing program 1 (id=8033): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0), 0x0, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="63b300"/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 2.622593007s ago: executing program 1 (id=8034): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e00000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00', @local}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0}, 0x94) 2.621222296s ago: executing program 2 (id=8035): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="37c4128a9c98510600000004000000080000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000067b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='c(u&\'\'\t|\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000d2000c00000000000000bf91000000000000b7020000000000008500000095000000b700000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x100) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000005000000000000010018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000c8, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x40, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000740)}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.454660957s ago: executing program 5 (id=8036): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x58, &(0x7f0000000480)}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="40bb000c5a8cee7fce5c74000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000020000000400"/28], 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="85000000ae00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd296303406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c126ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a8f27e02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d988c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438a58c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c38680a377f8c26e6e382067f690089f34b13ee0633a171c7918401acd4575f1443815854f775308c083ff4f4046cfca8bca48e6db6b211113c06797722230af92290231a0f02e247cf96876257dac9ff0b8f07ff5916a8ccd3f15b389d34520f074c6f006e0383280bf0b9765c995ef1e696a1da41d9372a1c9d85f1a83b6213b5fb236fbeda8fb90dee70ca3cfc0833741a0e9341ab4dee09669b832840fef5a2bbebd5957503656c445a428efc5711d1c66093b360c63e63e91cb871f8dc43a915ec87be492daec18847de7032d5c97d0296a1fa97d17f8546290c1a325221f36f8d749d4a9aa1883a41d92228c93b60fe677f4f9d51fadbba6dd46222fd11f678d7e9a307024806cc28cba904f8d12870b4528b8d75fd29adacf0a52cdfaf4e43f00e532cfc15f394db7d521339aa980f81bd78a82d84dba575391bee41c95daf3b576feed54d448d36ad0000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x49005a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, @perf_bp={0x0, 0x4}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000340), 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0xf, 0x0, 0x2, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0xf}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) 2.452632097s ago: executing program 0 (id=8037): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x250, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000080)='syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.8873657s ago: executing program 1 (id=8038): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000180)='./cgroup/../file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e7442", 0xaf, 0x0, &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) 1.720174229s ago: executing program 0 (id=8039): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0)=r1, 0x12) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/ipc\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000008000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000700)={0x0, r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r10}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) sendmsg$tipc(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000300)="dd437c18f7e1a183c40ec3b630b18e670ba84cdfb392cecb39be681adc1ad9aeca654abc816bfc8b8e97f4899ba9094902fa188041de47fff088e1ec5ed257c950c54f4d469bc05b48fc4e5e30bf2cf1833bdaf34b8dd9d79ec7e5ed417c8366ddd9e5323e77a7cb6d695b86dff03586163a0e7fcf9c51047a7c694f9c74bab6157d79dabd3bc8cf0ed053c0cc795e57bcf58047de3aea78967dac1241a494d5c06b69c23321c1b4439b", 0xaa}, {&(0x7f00000004c0)="4d30344d0f46f284a38a386fecb2b8ede3c145349ae377fb5063ede768fac283c8198079e8a1cf9e13610f9a06e14f4d08e18a0032c50802e42f570e6a46c6a684c1836ebcff45b19374ae4c24a22ec99db1cb7155fb523f412ea0694b5cbc171c79e645a1edc1cfcb1351a600fb53a81d67c0cfc6b790fd525f1bab2796fa6c6a56", 0x82}, {&(0x7f0000000780)="9d7c3274f009d3fd96ddf7e88c5c8d2c29273e082f0b76b0b6b63f5dd2222c28e4f3e65a3113301ab518f6e08e18acfa87c7389adf0be4d085d5c3a4cdc3441553149b059e96d03d920e383ba0c61445073f78316e4c1a6ff68a590c4b6b43305c5a4d001bfc25991d842de8ff64985da683b35b0612d6a7a96eb276d2b3aca8aaec18cd305113abdfef050da2819bb0816f5c6d061f9da55316c586dd79b00d7a42eecf5c32a14ef5d5b1d343fd012510de6d8f0fee59c928180f0ceee94515cf489d40d3", 0xc5}, {&(0x7f00000003c0)="8b2fa69f02da3533b84371d6ae9dc91e0a35089d841afefabd37452e7de6eb92b09900b05fd015a7701cdc1350dc54f9f867df1dd29b7cc00ab8", 0x3a}, {&(0x7f0000000640)="015302748109d7a35efeab3f77396d3cc018a35157aa7146e41983ac710678f2a7a2f45dc9f7e4f1a8e29891a726081ce656cb524e9b4311c366bb40794bdb24187ad1833dc2a76613f7def8ca10ec698c7d393754910154203ffde7d6de8b92", 0x60}], 0x5, &(0x7f0000000980)="45d762edd56c76f6645c322f720a90dfe42ab2aa82d2555cec3547d0b45efa49d73750289d2401a3fd2c59fbd0ba5f089c06228689c63c9d423e288157c69ea1a6bfe3ed9e4876c50b40402e77ddc8e5ef", 0x51, 0x1}, 0x80c4) 1.678844722s ago: executing program 5 (id=8041): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xfd, 0x0, 0x6f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="895e9bf973204ce598e9e1fa139bee3ba14b0c422e8d848de5f7ff421154320e7c9058522167596833f915a653697ac57ae920d14b01432a4858281a39c91664b1a926fcc3ee7a1d5e182ec166a1bb912bfc3f7ed3116343263b0a0de31e47f0e22d8bd50d32911ac9642409b4d7024521ad49804678f10e7e2149588e03e825e89723e849c886491d66e6e3a2f99a0b30d7028ddc62"], 0x6) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) 1.552494299s ago: executing program 1 (id=8042): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYBLOB="0000000000000000000000cc5c00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000002}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x6a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000a3de0b62bd804e455f8f944d49f1daf73c8fd9c1d9ba1ab2e78817bd", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000440)=0xffc, 0x49) r5 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r6 = syz_clone(0x800000, &(0x7f0000000200)="efd7aa8f4f10e15dabf9436d324d7de031334eda3e39b84297dd410c73903d172c5215e78948a071136f43835515940afbc12c5ffe191227f8626f899be13e2758596af9fc21cfd531c509", 0x4b, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="067a26cb8c51b4e6d3135c5363f0a927cce0edc9c87b4e0e0bd6ca4f24174f67705b9b4b0cc5539c58a16601faf8e694a0b4a200145165568bc74145c2465fd6abee9e75c0bb5667588fe7042c6b66c9f0298627322818b1559e5b0bc7a3956e6232212d8ceb9d2b043138daf095cfb4c84a3636") write$cgroup_pid(r5, &(0x7f0000000480)=r6, 0x12) r7 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) write$cgroup_int(r4, &(0x7f0000000100), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=ANY=[@ANYBLOB="0d00000002000000040000000240000000000000", @ANYRES32=r8, @ANYBLOB="1e000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001100"/28], 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000580)=0x2, 0x12) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@o_path={&(0x7f0000000800)='./file0\x00', 0x0, 0x0, r2}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x8}, 0x18) 1.502299672s ago: executing program 2 (id=8043): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000180)='./cgroup/../file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e7442", 0xaf, 0x0, &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) 979.120723ms ago: executing program 2 (id=8044): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x2e) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x20, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000"], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200939c939e00000800000001005c008000000031ae9264d2", @ANYRES32=r1, @ANYBLOB="0200"/15, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="03000000030000000500"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1a, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0xe, 0x7f, &(0x7f0000000600)=""/127, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x80000004}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x4, 0xfe, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xb452e779) ioctl$TUNSETOFFLOAD(r6, 0x541b, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x40000000) close(r7) sendmsg$sock(r7, &(0x7f00000004c0)={&(0x7f0000000240)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)="52ac4b48a0c4eca52d9e2e1bfd20b6e1dc3f256f709176ec9265f1e5d40a710ec2e54385ed47c597b4a47acfc5f63b521a86feacc8c7ceddd8d3d95f51ede7b92a122efc4c", 0x45}, {&(0x7f0000000340)="795c75b4cc92f1a9bbbe847be8f20ed7d8b60434a2a03d5a8b9fe1a9199f4534ad0471acc51134445cd0cf9a635fbfca0fb566427123bff0a1fddba0cbe15e0d9461fcc324c4d5d2", 0x48}, {&(0x7f00000001c0)="684bb2489cf7be7a039e5fd2439cad60b27a86c183881ebf15133d222548134552f9fd", 0x23}, {&(0x7f00000003c0)="461d22bf3a6f4595dc53b29a12151376a0666edcb7fa2ac0668e2ae280a2d04e3287a09ebb7fa734bb38f34baa2125c43a708f5ef77153", 0x37}], 0x4, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x48}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 977.626883ms ago: executing program 5 (id=8045): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0), 0x0, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="63b300"/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 873.065589ms ago: executing program 0 (id=8046): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e000000ff010000010000000400000003300000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000000000000000004000"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_type(r5, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000280), 0x9) r7 = openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) openat$cgroup(r5, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) 379.430638ms ago: executing program 5 (id=8047): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000340), 0x9) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c040000000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000001010"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 273.024414ms ago: executing program 0 (id=8048): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x5}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000000000000002000005000000000000000001000000000000000000000001000000183500000000691471a879a6f7"], 0x0, 0x66}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r2, @ANYBLOB="0000010000000000000000000000000000007013", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da2e2e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018e206eca728b1538327cf7d5db557641100008ca7ed88f56000000000000000b2bc33055bbf1c42dd43407dcff3acaaac9302c8cac87a7df7", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 146.233661ms ago: executing program 3 (id=8049): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="030000000001fb13", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="05"], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r6}, 0x20) 98.733534ms ago: executing program 2 (id=8050): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x9, 0x3, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x110000, 0x7, 0x9, 0x1, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0xc35b42fd65b6e448) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000005c0)=0x10000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000580)='ext4_writepages_result\x00', r3, 0x0, 0x3649}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x70200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x7}, 0x1002, 0xc8, 0xa, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0x8, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xe) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRES16=r1, @ANYRES16=r2], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r8}, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r8}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x80000001}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 1 (id=8051): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x250, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r6, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): 871.470047][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 871.478821][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 871.486496][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 875.790553][T10428] syz.2.2689[10428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 875.790666][T10428] syz.2.2689[10428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.294909][T10529] device veth0_vlan left promiscuous mode [ 881.465742][T10529] device veth0_vlan entered promiscuous mode [ 881.707128][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 881.721110][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 881.734465][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 883.529905][T10588] device veth0_vlan left promiscuous mode [ 883.569393][T10588] device veth0_vlan entered promiscuous mode [ 883.878123][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 883.893725][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 883.924915][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 883.970665][T10598] device sit0 entered promiscuous mode [ 891.018226][T10692] device veth0_vlan left promiscuous mode [ 891.106166][T10692] device veth0_vlan entered promiscuous mode [ 891.348780][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 891.375205][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 891.394103][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 894.998828][T10754] device veth0_vlan left promiscuous mode [ 895.126750][T10754] device veth0_vlan entered promiscuous mode [ 896.086268][T10766] device veth0_vlan left promiscuous mode [ 896.209155][T10766] device veth0_vlan entered promiscuous mode [ 896.289662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 896.309646][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 896.319246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 897.162134][T10775] device syzkaller0 entered promiscuous mode [ 898.660605][T10802] device wg2 left promiscuous mode [ 903.599376][T10884] device veth0_vlan left promiscuous mode [ 903.959539][T10884] device veth0_vlan entered promiscuous mode [ 904.265504][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.279522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.298545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.433026][T10891] device veth0_vlan left promiscuous mode [ 904.716990][T10891] device veth0_vlan entered promiscuous mode [ 906.917967][T10917] device veth0_vlan left promiscuous mode [ 907.130813][T10917] device veth0_vlan entered promiscuous mode [ 907.360618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 907.388844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 907.448379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 910.305339][T10967] device veth0_vlan left promiscuous mode [ 910.393095][T10967] device veth0_vlan entered promiscuous mode [ 910.516136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 910.548849][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 910.598665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 918.494676][T11069] device veth0_vlan left promiscuous mode [ 918.559649][T11069] device veth0_vlan entered promiscuous mode [ 918.888249][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 918.968240][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 919.107865][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 919.306610][T11088] device veth0_vlan left promiscuous mode [ 919.424849][T11088] device veth0_vlan entered promiscuous mode [ 919.784895][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 919.831160][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 919.850805][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 920.120116][T11097] device veth0_vlan left promiscuous mode [ 920.259633][T11097] device veth0_vlan entered promiscuous mode [ 920.388384][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 920.530740][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 920.678584][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 921.122698][T11125] device veth0_vlan left promiscuous mode [ 921.294962][T11125] device veth0_vlan entered promiscuous mode [ 921.669767][T11133] device veth0_vlan left promiscuous mode [ 921.848933][T11133] device veth0_vlan entered promiscuous mode [ 922.915668][T11153] device veth0_vlan left promiscuous mode [ 923.020657][T11153] device veth0_vlan entered promiscuous mode [ 923.132151][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 923.143919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 923.168536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 925.682518][T11170] device wg2 left promiscuous mode [ 925.879071][T11174] device veth0_vlan left promiscuous mode [ 925.994298][T11174] device veth0_vlan entered promiscuous mode [ 926.409812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 926.419033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 926.427103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 927.370823][T11213] device veth0_vlan left promiscuous mode [ 927.620599][T11213] device veth0_vlan entered promiscuous mode [ 928.054350][T11218] device veth0_vlan left promiscuous mode [ 928.091803][T11218] device veth0_vlan entered promiscuous mode [ 928.499531][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 928.508784][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 928.516849][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 930.064980][T11238] device veth1_macvtap entered promiscuous mode [ 930.238869][T11238] device macsec0 entered promiscuous mode [ 930.348031][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 931.471473][T11259] device veth0_vlan left promiscuous mode [ 931.539942][T11259] device veth0_vlan entered promiscuous mode [ 931.948082][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 931.958879][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 931.967032][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 932.037120][T11263] device veth0_vlan left promiscuous mode [ 932.072046][T11263] device veth0_vlan entered promiscuous mode [ 932.497910][T11268] device veth0_vlan left promiscuous mode [ 932.550638][T11268] device veth0_vlan entered promiscuous mode [ 933.333703][T11282] device veth1_macvtap left promiscuous mode [ 933.340492][T11282] device macsec0 left promiscuous mode [ 933.399183][T11285] device sit0 left promiscuous mode [ 933.632727][T11285] device sit0 entered promiscuous mode [ 936.529600][T11308] device veth0_vlan left promiscuous mode [ 936.535735][T11308] device veth0_vlan entered promiscuous mode [ 936.740753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 936.754357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 936.789508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 937.019235][T11320] device veth0_vlan left promiscuous mode [ 937.138734][T11320] device veth0_vlan entered promiscuous mode [ 939.723478][T11364] device veth0_vlan left promiscuous mode [ 939.768882][T11364] device veth0_vlan entered promiscuous mode [ 939.863208][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 939.872047][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 939.881812][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 940.052616][T11369] device veth0_vlan left promiscuous mode [ 940.177762][T11369] device veth0_vlan entered promiscuous mode [ 941.918509][T11400] device veth1_macvtap entered promiscuous mode [ 941.931487][T11400] device macsec0 entered promiscuous mode [ 941.944995][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 946.533011][T11467] device veth1_macvtap left promiscuous mode [ 946.582177][T11467] device macsec0 left promiscuous mode [ 947.934865][T11500] device veth0_vlan left promiscuous mode [ 948.043054][T11500] device veth0_vlan entered promiscuous mode [ 948.214278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 948.238476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 948.277057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 949.488619][T11513] device veth0_vlan left promiscuous mode [ 949.494855][T11513] device veth0_vlan entered promiscuous mode [ 949.604181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 949.639012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 949.687345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 949.934514][T11526] device veth0_vlan left promiscuous mode [ 950.124258][T11526] device veth0_vlan entered promiscuous mode [ 952.122491][T11548] device veth0_vlan left promiscuous mode [ 952.144000][T11548] device veth0_vlan entered promiscuous mode [ 952.157920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 952.178606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 952.358822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 952.498152][T11559] device sit0 left promiscuous mode [ 953.669276][T11598] device veth0_vlan left promiscuous mode [ 953.837494][T11598] device veth0_vlan entered promiscuous mode [ 953.962136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 953.972974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 953.993568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 954.396180][T11612] device sit0 left promiscuous mode [ 954.553505][T11612] device sit0 entered promiscuous mode [ 957.401921][T11666] device veth0_vlan left promiscuous mode [ 957.526089][T11666] device veth0_vlan entered promiscuous mode [ 957.723798][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 957.746585][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 957.795858][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 957.989021][T11677] device veth0_vlan left promiscuous mode [ 958.061397][T11677] device veth0_vlan entered promiscuous mode [ 961.413526][T11716] device veth0_vlan left promiscuous mode [ 961.470907][T11716] device veth0_vlan entered promiscuous mode [ 961.698950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 961.713676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 961.763734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 965.038355][T11759] device veth0_vlan left promiscuous mode [ 965.304695][T11759] device veth0_vlan entered promiscuous mode [ 965.531105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 965.545906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 965.620265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 968.128380][T11799] device veth0_vlan left promiscuous mode [ 968.287727][T11799] device veth0_vlan entered promiscuous mode [ 968.450907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 968.482655][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 968.568542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 970.311132][T11854] device veth0_vlan left promiscuous mode [ 970.547965][T11854] device veth0_vlan entered promiscuous mode [ 970.807736][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 970.868624][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 970.963904][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 971.278636][T11867] syz.3.3070[11867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 971.278730][T11867] syz.3.3070[11867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 972.679585][T11877] device veth0_vlan left promiscuous mode [ 972.708365][T11877] device veth0_vlan entered promiscuous mode [ 972.901127][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 972.939267][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 973.059076][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 976.901172][T11930] device veth0_vlan left promiscuous mode [ 976.983424][T11930] device veth0_vlan entered promiscuous mode [ 977.099315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 977.134145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 977.159588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 980.698367][T11957] device bridge_slave_1 left promiscuous mode [ 980.883805][T11957] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.082723][T11957] device bridge_slave_0 left promiscuous mode [ 981.147621][T11957] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.690547][T11975] device veth0_vlan left promiscuous mode [ 981.822374][T11975] device veth0_vlan entered promiscuous mode [ 982.015192][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 982.066673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 982.123078][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 982.224726][T11984] device veth0_vlan left promiscuous mode [ 982.410004][T11984] device veth0_vlan entered promiscuous mode [ 982.674745][T11995] device veth0_vlan left promiscuous mode [ 982.754808][T11995] device veth0_vlan entered promiscuous mode [ 983.061486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 983.074942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 983.180193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 983.524016][T11990] device syzkaller0 entered promiscuous mode [ 984.701450][T12033] device sit0 entered promiscuous mode [ 985.157850][T12042] device veth0_vlan left promiscuous mode [ 985.169707][T12042] device veth0_vlan entered promiscuous mode [ 985.223879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 985.232491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 985.242988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 985.330006][T12046] device veth0_vlan left promiscuous mode [ 985.399774][T12046] device veth0_vlan entered promiscuous mode [ 987.470123][T12070] device syzkaller0 entered promiscuous mode [ 987.900521][T12084] device sit0 left promiscuous mode [ 987.914067][T12083] device sit0 entered promiscuous mode [ 988.458477][T12093] device veth0_vlan left promiscuous mode [ 988.651533][T12093] device veth0_vlan entered promiscuous mode [ 988.929317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 988.951719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 989.078522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.169086][T12140] device syzkaller0 entered promiscuous mode [ 993.457662][T12145] device veth0_vlan left promiscuous mode [ 993.647965][T12145] device veth0_vlan entered promiscuous mode [ 994.141867][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 994.201734][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 994.273303][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1002.348901][T12271] device veth0_vlan left promiscuous mode [ 1002.355114][T12271] device veth0_vlan entered promiscuous mode [ 1002.534110][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1002.570524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1002.625049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1008.406802][T12339] device wg2 entered promiscuous mode [ 1009.160674][T12342] device syzkaller0 entered promiscuous mode [ 1009.379310][T12352] device veth0_vlan left promiscuous mode [ 1009.510301][T12352] device veth0_vlan entered promiscuous mode [ 1009.753341][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1009.762971][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1009.777179][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1011.027665][T12371] device veth0_vlan left promiscuous mode [ 1011.259386][T12371] device veth0_vlan entered promiscuous mode [ 1011.485443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1011.530636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1011.622197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1018.358482][T12423] device veth0_vlan left promiscuous mode [ 1018.398502][T12423] device veth0_vlan entered promiscuous mode [ 1018.418259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1018.426746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1018.518835][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1018.745928][T12428] ref_ctr_offset mismatch. inode: 0xd8d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1021.637688][T12458] device veth0_vlan left promiscuous mode [ 1021.810017][T12458] device veth0_vlan entered promiscuous mode [ 1022.084990][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1022.101149][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1022.118255][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1024.575960][T12470] device syzkaller0 entered promiscuous mode [ 1026.059188][T12486] device veth0_vlan left promiscuous mode [ 1026.095705][T12486] device veth0_vlan entered promiscuous mode [ 1026.348996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1026.378822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1026.431867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1030.093124][T12574] device veth0_vlan left promiscuous mode [ 1030.160083][T12574] device veth0_vlan entered promiscuous mode [ 1030.290351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1030.329169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1030.418898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1030.503420][T12584] device veth0_vlan left promiscuous mode [ 1030.829214][T12584] device veth0_vlan entered promiscuous mode [ 1031.453892][T12600] device veth0_vlan left promiscuous mode [ 1031.553471][T12600] device veth0_vlan entered promiscuous mode [ 1031.828078][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.844047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.877649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1032.147110][T12608] device veth0_vlan left promiscuous mode [ 1032.263775][T12608] device veth0_vlan entered promiscuous mode [ 1036.039191][T12637] ref_ctr_offset mismatch. inode: 0xe38 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1039.428092][T12705] ref_ctr_offset mismatch. inode: 0xc6a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1039.685823][T12703] GPL: port 1(erspan0) entered blocking state [ 1039.778380][T12703] GPL: port 1(erspan0) entered disabled state [ 1039.923849][T12703] device erspan0 entered promiscuous mode [ 1039.976864][T12703] GPL: port 1(erspan0) entered blocking state [ 1039.983022][T12703] GPL: port 1(erspan0) entered forwarding state [ 1040.050569][T12715] device veth0_vlan left promiscuous mode [ 1040.132905][T12715] device veth0_vlan entered promiscuous mode [ 1040.262898][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1040.281776][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1040.301822][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1042.235196][T12757] ref_ctr_offset mismatch. inode: 0xd0a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1043.427468][T12776] device veth0_vlan left promiscuous mode [ 1043.504472][T12776] device veth0_vlan entered promiscuous mode [ 1043.569589][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1043.603833][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1043.628715][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1046.103979][T12806] device veth0_vlan left promiscuous mode [ 1046.244558][T12806] device veth0_vlan entered promiscuous mode [ 1046.480959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1046.494536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1046.545639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1049.463831][T12870] device veth0_vlan left promiscuous mode [ 1049.520266][T12870] device veth0_vlan entered promiscuous mode [ 1049.666947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1049.678848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1049.698396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1053.862557][T12908] device veth0_vlan left promiscuous mode [ 1054.030951][T12908] device veth0_vlan entered promiscuous mode [ 1054.260212][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1054.274785][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1054.328516][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1054.393290][T12917] device veth0_vlan left promiscuous mode [ 1054.492474][T12917] device veth0_vlan entered promiscuous mode [ 1057.799366][T12972] device veth0_vlan left promiscuous mode [ 1058.131412][T12972] device veth0_vlan entered promiscuous mode [ 1058.363932][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1058.444744][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1058.483138][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1066.230935][T13104] device veth0_vlan left promiscuous mode [ 1066.280862][T13104] device veth0_vlan entered promiscuous mode [ 1066.498879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1066.542535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1066.574561][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1067.302907][T13127] device veth0_vlan left promiscuous mode [ 1067.389661][T13127] device veth0_vlan entered promiscuous mode [ 1067.859388][T13137] device veth0_vlan left promiscuous mode [ 1068.081446][T13137] device veth0_vlan entered promiscuous mode [ 1070.701109][T13168] syz.3.3430[13168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1070.701234][T13168] syz.3.3430[13168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1072.173868][T13201] device veth0_vlan left promiscuous mode [ 1072.297239][T13201] device veth0_vlan entered promiscuous mode [ 1072.488349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1072.496680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1072.635964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1073.837875][T13236] device veth0_vlan left promiscuous mode [ 1073.911284][T13236] device veth0_vlan entered promiscuous mode [ 1074.247336][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1074.299659][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1074.315838][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1080.528608][T13329] device veth0_vlan left promiscuous mode [ 1080.667687][T13329] device veth0_vlan entered promiscuous mode [ 1082.524714][T13352] device veth0_vlan left promiscuous mode [ 1082.930335][T13352] device veth0_vlan entered promiscuous mode [ 1086.937916][T13417] device veth0_vlan left promiscuous mode [ 1087.150962][T13417] device veth0_vlan entered promiscuous mode [ 1087.356534][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1087.409011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1087.436811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1087.538876][T13434] device veth0_vlan left promiscuous mode [ 1087.667442][T13434] device veth0_vlan entered promiscuous mode [ 1088.010464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1088.040219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1088.142230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1088.215508][T13439] device veth0_vlan left promiscuous mode [ 1088.235131][T13439] device veth0_vlan entered promiscuous mode [ 1088.281204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1088.291818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1088.305521][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1088.384695][T13454] device veth0_vlan left promiscuous mode [ 1088.483322][T13454] device veth0_vlan entered promiscuous mode [ 1089.548111][T13472] device veth0_vlan left promiscuous mode [ 1089.564460][T13472] device veth0_vlan entered promiscuous mode [ 1089.721667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1089.749314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1089.843005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1090.351322][T13488] device veth0_vlan left promiscuous mode [ 1090.421657][T13488] device veth0_vlan entered promiscuous mode [ 1091.411630][T13518] device veth0_vlan left promiscuous mode [ 1091.502161][T13518] device veth0_vlan entered promiscuous mode [ 1092.667616][T13543] device veth0_vlan left promiscuous mode [ 1092.744664][T13543] device veth0_vlan entered promiscuous mode [ 1092.775958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1092.786612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1092.794998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1092.975487][T13556] device veth0_vlan left promiscuous mode [ 1092.981790][T13556] device veth0_vlan entered promiscuous mode [ 1093.045760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1093.109781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1093.180247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1093.295636][T13567] device veth0_vlan left promiscuous mode [ 1093.414588][T13567] device veth0_vlan entered promiscuous mode [ 1095.315327][T13609] device veth0_vlan left promiscuous mode [ 1095.465710][T13609] device veth0_vlan entered promiscuous mode [ 1095.519497][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1095.566685][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1095.673367][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1104.381456][T13746] device veth0_vlan left promiscuous mode [ 1104.750044][T13746] device veth0_vlan entered promiscuous mode [ 1105.048808][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1105.072776][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1105.121194][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1105.607485][T13763] device veth0_vlan left promiscuous mode [ 1105.917521][T13763] device veth0_vlan entered promiscuous mode [ 1106.173700][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1106.183875][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1106.195774][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1106.955372][T13789] device veth0_vlan left promiscuous mode [ 1107.083876][T13789] device veth0_vlan entered promiscuous mode [ 1111.105661][T13812] device veth0_vlan left promiscuous mode [ 1111.142906][T13812] device veth0_vlan entered promiscuous mode [ 1111.287732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1111.300683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1111.311056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1111.327984][T13821] device veth0_vlan left promiscuous mode [ 1111.422221][T13821] device veth0_vlan entered promiscuous mode [ 1111.617066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1111.635601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1111.644327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1111.672147][T13833] device veth0_vlan left promiscuous mode [ 1111.724854][T13833] device veth0_vlan entered promiscuous mode [ 1112.048115][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1112.058798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1112.066990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1116.680801][T13920] device veth0_vlan left promiscuous mode [ 1116.916604][T13920] device veth0_vlan entered promiscuous mode [ 1117.149528][T13925] device veth0_vlan left promiscuous mode [ 1117.175133][T13925] device veth0_vlan entered promiscuous mode [ 1117.327490][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1117.340647][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1117.366127][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1118.605148][T13951] device veth0_vlan left promiscuous mode [ 1118.644444][T13951] device veth0_vlan entered promiscuous mode [ 1118.688998][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1118.719264][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1118.733748][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1118.915459][T13977] device veth0_vlan left promiscuous mode [ 1119.091243][T13977] device veth0_vlan entered promiscuous mode [ 1119.638503][T14002] device veth0_vlan left promiscuous mode [ 1119.770516][T14002] device veth0_vlan entered promiscuous mode [ 1120.045105][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1120.068809][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1120.076905][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1122.181935][T14061] device veth0_vlan left promiscuous mode [ 1122.273773][T14061] device veth0_vlan entered promiscuous mode [ 1122.588511][T14065] cgroup: fork rejected by pids controller in /syz0 [ 1124.474372][T14079] device veth0_vlan left promiscuous mode [ 1124.784775][T14079] device veth0_vlan entered promiscuous mode [ 1125.275860][T14071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1125.333044][T14071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.448869][T14071] device bridge_slave_0 entered promiscuous mode [ 1125.505465][T14071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1125.536662][T14071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.568845][T14071] device bridge_slave_1 entered promiscuous mode [ 1125.837090][T14099] device veth0_vlan left promiscuous mode [ 1125.923957][T14099] device veth0_vlan entered promiscuous mode [ 1126.043031][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1126.059184][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1126.078292][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1126.133950][ T7302] device dummy0 left promiscuous mode [ 1126.140771][ T7302] GPL: port 1(dummy0) entered disabled state [ 1126.171051][ T7302] device veth0_vlan left promiscuous mode [ 1126.708722][T14107] device veth0_vlan left promiscuous mode [ 1126.718409][T14107] device veth0_vlan entered promiscuous mode [ 1127.351933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1127.360233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1127.379099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1127.485697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1127.638191][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.645457][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1127.775281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1127.857187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1127.925275][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 1127.933187][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1128.087999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1128.228542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1128.298615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1128.332956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1128.348615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1128.358455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1128.378577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1128.393336][T14071] device veth0_vlan entered promiscuous mode [ 1128.431884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1128.440753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1128.458892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1128.478879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1128.492974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1128.501581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1128.547814][T14071] device veth1_macvtap entered promiscuous mode [ 1128.625083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1128.638515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1128.657160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1128.684848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1128.696220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1130.755694][T14174] device veth0_vlan left promiscuous mode [ 1131.016773][T14174] device veth0_vlan entered promiscuous mode [ 1131.169302][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1131.183170][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1131.203370][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1131.609490][T14189] device veth0_vlan left promiscuous mode [ 1131.764151][T14189] device veth0_vlan entered promiscuous mode [ 1132.303909][T14204] device veth0_vlan left promiscuous mode [ 1132.357968][T14204] device veth0_vlan entered promiscuous mode [ 1132.575424][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1132.588181][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1132.605262][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1134.102449][T14245] device veth0_vlan left promiscuous mode [ 1134.285873][T14245] device veth0_vlan entered promiscuous mode [ 1137.954239][T14321] device veth0_vlan left promiscuous mode [ 1138.123801][T14321] device veth0_vlan entered promiscuous mode [ 1146.665452][T14411] device veth0_vlan left promiscuous mode [ 1146.689719][T14411] device veth0_vlan entered promiscuous mode [ 1146.697147][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1146.722017][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1146.735018][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1147.366088][T14442] device pim6reg1 entered promiscuous mode [ 1150.161816][T14471] device veth1_macvtap left promiscuous mode [ 1150.368599][T14484] device veth0_vlan left promiscuous mode [ 1150.470304][T14484] device veth0_vlan entered promiscuous mode [ 1150.649493][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1150.679540][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1150.828369][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1152.081063][T14507] device veth0_vlan left promiscuous mode [ 1152.381986][T14507] device veth0_vlan entered promiscuous mode [ 1152.675044][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1152.730256][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1152.787389][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1153.319529][T14534] device veth0_vlan left promiscuous mode [ 1153.345164][T14534] device veth0_vlan entered promiscuous mode [ 1153.701771][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1153.741283][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1153.968550][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1154.280463][T14547] bond_slave_1: mtu less than device minimum [ 1155.418730][T14575] device veth0_vlan left promiscuous mode [ 1155.492790][T14575] device veth0_vlan entered promiscuous mode [ 1159.792080][T14656] device veth0_vlan left promiscuous mode [ 1159.983124][T14656] device veth0_vlan entered promiscuous mode [ 1160.206809][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1160.215481][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1160.296670][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1160.545585][T14667] device veth0_vlan left promiscuous mode [ 1160.629513][T14667] device veth0_vlan entered promiscuous mode [ 1160.977056][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1160.995715][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1161.075197][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1162.823526][T14711] device veth0_vlan left promiscuous mode [ 1162.973936][T14711] device veth0_vlan entered promiscuous mode [ 1163.282918][T14719] device wg2 entered promiscuous mode [ 1163.848012][T14727] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 1164.486244][T14741] device veth0_vlan left promiscuous mode [ 1164.654884][T14741] device veth0_vlan entered promiscuous mode [ 1164.878241][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1164.949966][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1165.059534][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1165.315100][T14753] device veth0_vlan left promiscuous mode [ 1165.369803][T14753] device veth0_vlan entered promiscuous mode [ 1165.426316][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1165.458826][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1165.527694][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1167.761209][T14805] device veth0_vlan left promiscuous mode [ 1167.850097][T14805] device veth0_vlan entered promiscuous mode [ 1168.179329][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1168.299322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1168.307653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1176.423044][T14927] device pim6reg1 entered promiscuous mode [ 1178.129223][T14944] device veth0_vlan left promiscuous mode [ 1178.238921][T14944] device veth0_vlan entered promiscuous mode [ 1178.375016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1178.395958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1178.412175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1178.483012][T14949] device veth0_vlan left promiscuous mode [ 1178.614395][T14949] device veth0_vlan entered promiscuous mode [ 1178.938127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1178.946589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1179.009745][T14955] syz.1.4006[14955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.009840][T14955] syz.1.4006[14955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.050280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1179.116271][T14956] syz.1.4006[14956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.116367][T14956] syz.1.4006[14956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1180.072876][T14982] device veth0_vlan left promiscuous mode [ 1180.287856][T14982] device veth0_vlan entered promiscuous mode [ 1180.460708][T14981] device veth0_vlan left promiscuous mode [ 1180.502961][T14981] device veth0_vlan entered promiscuous mode [ 1180.634413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1180.649282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1180.671826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1182.223157][T15026] bond_slave_1: mtu less than device minimum [ 1182.340348][T15027] device veth0_vlan left promiscuous mode [ 1182.536617][T15027] device veth0_vlan entered promiscuous mode [ 1182.837766][T15030] device veth0_vlan left promiscuous mode [ 1182.923015][T15030] device veth0_vlan entered promiscuous mode [ 1182.980827][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1183.059612][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1183.079043][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1183.377380][T15041] device veth0_vlan left promiscuous mode [ 1183.480992][T15041] device veth0_vlan entered promiscuous mode [ 1184.478300][T15066] device pim6reg1 entered promiscuous mode [ 1185.509087][T15085] device veth0_vlan left promiscuous mode [ 1185.554183][T15085] device veth0_vlan entered promiscuous mode [ 1185.865496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1185.898908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1185.945774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1187.774394][T15127] veth0_macvtap: mtu greater than device maximum [ 1187.796565][T15124] device veth0_vlan left promiscuous mode [ 1187.833290][T15124] device veth0_vlan entered promiscuous mode [ 1188.075416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1188.090096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1188.105334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1189.223199][T15168] device veth0_vlan left promiscuous mode [ 1189.511544][T15168] device veth0_vlan entered promiscuous mode [ 1189.849765][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1189.859197][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1189.930507][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1191.486061][T15193] device macsec0 entered promiscuous mode [ 1194.146433][T15230] device macsec0 left promiscuous mode [ 1194.172818][T15242] device veth0_vlan left promiscuous mode [ 1194.303994][T15242] device veth0_vlan entered promiscuous mode [ 1194.771415][T15252] device veth0_vlan left promiscuous mode [ 1194.920619][T15252] device veth0_vlan entered promiscuous mode [ 1196.996886][T15305] device syzkaller0 entered promiscuous mode [ 1197.925048][T15335] device veth0_vlan left promiscuous mode [ 1198.023190][T15335] device veth0_vlan entered promiscuous mode [ 1198.174670][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1198.192126][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1198.228601][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1200.331646][T15394] device veth0_vlan left promiscuous mode [ 1200.402647][T15394] device veth0_vlan entered promiscuous mode [ 1200.444578][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1200.453491][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1200.471179][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1203.548003][T15446] device veth0_vlan left promiscuous mode [ 1203.699251][T15446] device veth0_vlan entered promiscuous mode [ 1203.706554][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1203.728966][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1203.832389][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1204.164303][T15451] device veth0_vlan left promiscuous mode [ 1204.277582][T15451] device veth0_vlan entered promiscuous mode [ 1204.474015][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1204.515684][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1204.528803][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1209.096751][T15528] device veth0_vlan left promiscuous mode [ 1209.230483][T15528] device veth0_vlan entered promiscuous mode [ 1210.255728][T15552] device veth0_vlan left promiscuous mode [ 1210.330243][T15552] device veth0_vlan entered promiscuous mode [ 1210.458438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1210.469968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1210.528381][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1210.564513][T15554] ip6_vti0: mtu greater than device maximum [ 1210.740880][T15558] device veth0_vlan left promiscuous mode [ 1210.881893][T15558] device veth0_vlan entered promiscuous mode [ 1211.071533][T15569] device wg2 entered promiscuous mode [ 1211.102239][T15575] device veth0_vlan left promiscuous mode [ 1211.122897][T15579] syz.0.4206[15579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1211.122982][T15579] syz.0.4206[15579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1211.210475][T15575] device veth0_vlan entered promiscuous mode [ 1212.144404][T15596] device veth0_vlan left promiscuous mode [ 1212.227908][T15596] device veth0_vlan entered promiscuous mode [ 1212.316492][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1212.339881][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1212.389927][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1212.802829][T15608] device veth0_vlan left promiscuous mode [ 1212.928922][T15608] device veth0_vlan entered promiscuous mode [ 1213.206947][T15615] device veth0_vlan left promiscuous mode [ 1213.318025][T15615] device veth0_vlan entered promiscuous mode [ 1213.436484][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1213.452406][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1213.474796][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1213.536030][T15617] device veth0_vlan left promiscuous mode [ 1213.627205][T15617] device veth0_vlan entered promiscuous mode [ 1214.398446][T15635] device veth0_vlan left promiscuous mode [ 1214.559626][T15635] device veth0_vlan entered promiscuous mode [ 1215.779493][T15659] device veth0_vlan left promiscuous mode [ 1215.916418][T15659] device veth0_vlan entered promiscuous mode [ 1216.551156][T15678] device veth0_vlan left promiscuous mode [ 1216.753282][T15678] device veth0_vlan entered promiscuous mode [ 1216.963898][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1216.989268][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1217.025032][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1217.531469][T15692] device veth0_vlan left promiscuous mode [ 1217.571890][T15692] device veth0_vlan entered promiscuous mode [ 1217.664555][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1217.709237][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1217.791585][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1218.468698][T15704] device veth0_vlan left promiscuous mode [ 1218.600877][T15704] device veth0_vlan entered promiscuous mode [ 1218.906584][T15712] ------------[ cut here ]------------ [ 1218.918724][T15712] trace type BPF program uses run-time allocation [ 1218.968799][T15712] WARNING: CPU: 1 PID: 15712 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 1219.021664][T15712] Modules linked in: [ 1219.111120][T15712] CPU: 1 PID: 15712 Comm: syz.5.4248 Not tainted syzkaller #0 [ 1219.208131][T15712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1219.258138][T15712] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 1219.276489][T15712] Code: ee ff 48 c7 c6 20 41 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 a6 1c ee ff c6 05 34 73 6a 05 01 48 c7 c7 80 3d 48 85 e8 23 d1 2e 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 1219.337623][T15712] RSP: 0018:ffffc90000bb7428 EFLAGS: 00010246 [ 1219.369124][T15712] RAX: 86f3cf3d95708700 RBX: 0000000000000001 RCX: 0000000000080000 [ 1219.394116][T15712] RDX: ffffc90009bab000 RSI: 0000000000003a26 RDI: 0000000000003a27 [ 1219.422984][T15712] RBP: ffffc90000bb7470 R08: ffff8881f7132f3f R09: 1ffff1103ee265e7 [ 1219.438377][T15712] R10: dffffc0000000000 R11: ffffed103ee265e8 R12: ffff8881160ac000 [ 1219.454390][T15712] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888128168000 [ 1219.489703][T15712] FS: 00007fe975d6b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1219.538506][T15712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1219.545597][T15712] CR2: 0000000100000000 CR3: 000000012945b000 CR4: 00000000003506a0 [ 1219.560838][T15712] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1219.574820][T15712] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1219.606880][T15712] Call Trace: [ 1219.619333][T15725] device syzkaller0 entered promiscuous mode [ 1219.624615][T15712] [ 1219.631460][T15712] resolve_pseudo_ldimm64+0x656/0x1180 [ 1219.637138][T15712] ? check_attach_btf_id+0xd70/0xd70 [ 1219.642755][T15712] ? __mark_reg_known+0x1b0/0x1b0 [ 1219.648062][T15712] ? security_capable+0x87/0xb0 [ 1219.653244][T15712] bpf_check+0x32c7/0xf370 [ 1219.657762][T15712] ? 0xffffffffa002abb8 [ 1219.662539][T15712] ? is_bpf_text_address+0x177/0x190 [ 1219.668130][T15712] ? bpf_get_btf_vmlinux+0x60/0x60 [ 1219.697713][T15712] ? unwind_get_return_address+0x4d/0x90 [ 1219.708339][T15712] ? stack_trace_save+0xf0/0xf0 [ 1219.713424][T15712] ? arch_stack_walk+0xee/0x140 [ 1219.718600][T15712] ? stack_trace_save+0xa6/0xf0 [ 1219.723669][T15712] ? __stack_depot_save+0x34/0x480 [ 1219.729030][T15712] ? __kasan_slab_alloc+0x69/0xf0 [ 1219.734275][T15712] ? __kasan_kmalloc+0xec/0x110 [ 1219.739326][T15712] ? __kasan_kmalloc+0xda/0x110 [ 1219.744198][T15712] ? kmem_cache_alloc_trace+0x119/0x270 [ 1219.749983][T15712] ? selinux_bpf_prog_alloc+0x51/0x140 [ 1219.755545][T15712] ? security_bpf_prog_alloc+0x62/0x90 [ 1219.761205][T15712] ? bpf_prog_load+0x9f4/0x1640 [ 1219.766128][T15712] ? __sys_bpf+0x51d/0x7d0 [ 1219.788057][T15712] ? __x64_sys_bpf+0x7c/0x90 [ 1219.793049][T15712] ? x64_sys_call+0x4b9/0x9a0 [ 1219.798139][T15712] ? do_syscall_64+0x4c/0xa0 [ 1219.802936][T15712] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1219.809540][T15712] ? check_stack_object+0x81/0x140 [ 1219.815754][T15712] ? memset+0x35/0x40 [ 1219.819989][T15712] ? bpf_obj_name_cpy+0x193/0x1e0 [ 1219.825129][T15712] bpf_prog_load+0x10c4/0x1640 [ 1219.830365][T15712] ? __anon_inode_getfd+0x35c/0x3d0 [ 1219.836005][T15712] ? map_freeze+0x360/0x360 [ 1219.840706][T15712] ? selinux_bpf+0xc7/0xf0 [ 1219.845209][T15712] ? security_bpf+0x82/0xa0 [ 1219.849944][T15712] __sys_bpf+0x51d/0x7d0 [ 1219.854507][T15712] ? bpf_link_show_fdinfo+0x330/0x330 [ 1219.860075][T15712] ? __kasan_check_write+0x14/0x20 [ 1219.865554][T15712] ? switch_fpu_return+0x15d/0x2c0 [ 1219.870968][T15712] __x64_sys_bpf+0x7c/0x90 [ 1219.881373][T15712] x64_sys_call+0x4b9/0x9a0 [ 1219.887257][T15712] do_syscall_64+0x4c/0xa0 [ 1219.891891][T15712] ? clear_bhb_loop+0x50/0xa0 [ 1219.896733][T15712] ? clear_bhb_loop+0x50/0xa0 [ 1219.901855][T15712] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1219.907919][T15712] RIP: 0033:0x7fe97730ecb9 [ 1219.924160][T15712] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1219.946619][T15712] RSP: 002b:00007fe975d6b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1219.961164][T15712] RAX: ffffffffffffffda RBX: 00007fe977589fa0 RCX: 00007fe97730ecb9 [ 1219.970179][T15712] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1219.981819][T15712] RBP: 00007fe97737cbf7 R08: 0000000000000000 R09: 0000000000000000 [ 1219.990244][T15712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1219.998756][T15712] R13: 00007fe97758a038 R14: 00007fe977589fa0 R15: 00007ffcedcc3a78 [ 1220.006972][T15712] [ 1220.010191][T15712] ---[ end trace f57ecf2dfaee8f9a ]--- [ 1220.197920][T15745] device pim6reg1 entered promiscuous mode [ 1220.394380][T15747] device veth0_vlan left promiscuous mode [ 1220.403894][T15747] device veth0_vlan entered promiscuous mode [ 1220.445013][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1220.456064][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1220.464077][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1221.222540][T15768] device pim6reg1 entered promiscuous mode [ 1224.911175][T15859] syz.1.4294[15859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1224.911256][T15859] syz.1.4294[15859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1233.604597][T15962] device syzkaller0 entered promiscuous mode [ 1235.285357][T15999] device wg2 left promiscuous mode [ 1235.444573][T15999] device wg2 entered promiscuous mode [ 1235.929241][T16018] device pim6reg1 entered promiscuous mode [ 1236.750414][T16032] device pim6reg1 entered promiscuous mode [ 1237.240454][T16038] syz.3.4362[16038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.240586][T16038] syz.3.4362[16038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.787211][T16050] syz.3.4367[16050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.808176][T16050] syz.3.4367[16050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1238.525530][T16066] device pim6reg1 left promiscuous mode [ 1239.911099][T16093] device pim6reg1 entered promiscuous mode [ 1240.202282][T16095] device syzkaller0 entered promiscuous mode [ 1240.916118][T16124] device veth0_vlan left promiscuous mode [ 1241.208512][T16124] device veth0_vlan entered promiscuous mode [ 1241.215848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1241.248830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1241.338618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1250.363389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1251.108645][T16180] device pim6reg1 entered promiscuous mode [ 1254.311361][T16241] device syzkaller0 entered promiscuous mode [ 1254.678595][T16248] device syzkaller0 entered promiscuous mode [ 1259.450263][T16332] device veth0_vlan left promiscuous mode [ 1259.516005][T16332] device veth0_vlan entered promiscuous mode [ 1259.631790][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1259.644617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1259.662968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1259.880704][T16343] device veth0_vlan left promiscuous mode [ 1260.023555][T16343] device veth0_vlan entered promiscuous mode [ 1260.189364][T16341] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1260.200912][T16339] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1260.698452][T16367] device veth0_vlan left promiscuous mode [ 1260.858737][T16367] device veth0_vlan entered promiscuous mode [ 1264.228684][T16401] device veth0_vlan left promiscuous mode [ 1264.363025][T16401] device veth0_vlan entered promiscuous mode [ 1264.769123][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1264.784017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1264.832954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1265.461649][T16424] ip6_vti0: mtu greater than device maximum [ 1265.537560][T16431] device syzkaller0 entered promiscuous mode [ 1265.636009][T16435] device veth0_vlan left promiscuous mode [ 1265.766885][T16435] device veth0_vlan entered promiscuous mode [ 1266.152999][T16457] device syzkaller0 entered promiscuous mode [ 1266.664990][T16476] syz.0.4515[16476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1266.665259][T16476] syz.0.4515[16476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1266.679590][T16476] syz.0.4515[16476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1266.691209][T16476] syz.0.4515[16476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1266.864888][T16480] device syzkaller0 entered promiscuous mode [ 1267.047481][T16491] device syzkaller0 entered promiscuous mode [ 1267.378952][T16491] syz.5.4521 (16491) used greatest stack depth: 20384 bytes left [ 1267.514996][T16499] device veth0_vlan left promiscuous mode [ 1267.531868][T16499] device veth0_vlan entered promiscuous mode [ 1267.564742][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1267.575638][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1267.585851][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1267.935847][T16506] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1268.046039][T16517] device veth0_vlan left promiscuous mode [ 1268.099219][T16517] device veth0_vlan entered promiscuous mode [ 1268.126290][T16503] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1268.152988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1268.165603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1268.173940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1268.340105][T16524] device veth0_vlan left promiscuous mode [ 1268.414655][T16524] device veth0_vlan entered promiscuous mode [ 1269.831746][T16550] device veth0_vlan left promiscuous mode [ 1270.010068][T16550] device veth0_vlan entered promiscuous mode [ 1270.509948][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1270.540682][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1270.601304][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1271.510922][T16578] device veth0_vlan left promiscuous mode [ 1271.541451][T16578] device veth0_vlan entered promiscuous mode [ 1271.739618][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1271.759047][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1271.766941][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1271.844643][T16586] device syzkaller0 entered promiscuous mode [ 1274.636655][T16618] device veth0_vlan left promiscuous mode [ 1274.679391][T16618] device veth0_vlan entered promiscuous mode [ 1274.875326][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1274.937618][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1274.946920][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1276.206420][T16646] device syzkaller0 entered promiscuous mode [ 1276.230527][T16645] device syzkaller0 entered promiscuous mode [ 1276.979993][T16657] device veth0_vlan left promiscuous mode [ 1277.204686][T16657] device veth0_vlan entered promiscuous mode [ 1277.356109][T16662] device veth0_vlan left promiscuous mode [ 1277.371054][T16662] device veth0_vlan entered promiscuous mode [ 1278.817767][T16686] device syzkaller0 entered promiscuous mode [ 1279.638423][T16706] device veth0_vlan left promiscuous mode [ 1279.769058][T16706] device veth0_vlan entered promiscuous mode [ 1279.891499][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1279.901190][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1279.909727][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1279.924813][T16704] device veth0_vlan left promiscuous mode [ 1280.011782][T16704] device veth0_vlan entered promiscuous mode [ 1280.098235][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1280.167719][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1280.251338][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1281.609232][T16733] device veth1_macvtap entered promiscuous mode [ 1281.625955][T16733] device macsec0 entered promiscuous mode [ 1281.633134][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1283.952673][T16765] bond_slave_1: mtu less than device minimum [ 1289.650316][T16863] device wg2 left promiscuous mode [ 1289.815147][T16866] ÿÿÿÿÿÿ: renamed from vlan1 [ 1290.567761][T16875] device veth0_vlan left promiscuous mode [ 1290.779832][T16875] device veth0_vlan entered promiscuous mode [ 1306.640851][T17054] device veth0_vlan left promiscuous mode [ 1306.675193][T17054] device veth0_vlan entered promiscuous mode [ 1306.723962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1306.732912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1306.741199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1306.936333][T17057] device veth0_vlan left promiscuous mode [ 1307.063177][T17057] device veth0_vlan entered promiscuous mode [ 1309.431859][T17107] device veth0_vlan left promiscuous mode [ 1309.460110][T17107] device veth0_vlan entered promiscuous mode [ 1309.603951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1309.621102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1309.658684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1310.596286][T17138] device pim6reg1 entered promiscuous mode [ 1311.630530][T17151] device veth0_vlan left promiscuous mode [ 1311.779407][T17151] device veth0_vlan entered promiscuous mode [ 1311.917927][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1311.960320][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1312.113815][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1317.768557][ T30] audit: type=1400 audit(1768913701.104:150): avc: denied { create } for pid=17271 comm="syz.3.4759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1318.739879][T17286] device veth0_vlan left promiscuous mode [ 1318.919579][T17286] device veth0_vlan entered promiscuous mode [ 1319.287009][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1319.326979][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1319.375059][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1320.119871][T17298] device veth0_vlan left promiscuous mode [ 1320.332519][T17298] device veth0_vlan entered promiscuous mode [ 1320.628521][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1320.655071][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1320.667292][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1322.117336][T17319] device veth0_vlan left promiscuous mode [ 1322.291783][T17319] device veth0_vlan entered promiscuous mode [ 1322.412725][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1322.424953][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1322.439219][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1323.430362][T17343] device veth0_vlan left promiscuous mode [ 1323.540003][T17343] device veth0_vlan entered promiscuous mode [ 1323.768974][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1323.807722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1323.839113][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1325.200761][T17364] device veth0_vlan left promiscuous mode [ 1325.368312][T17364] device veth0_vlan entered promiscuous mode [ 1325.518044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1325.528557][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1325.536345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1325.875734][T17370] device sit0 left promiscuous mode [ 1328.289101][T17410] device veth0_vlan left promiscuous mode [ 1328.348805][T17410] device veth0_vlan entered promiscuous mode [ 1328.525477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1328.572526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1328.597110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1330.852794][T17458] device veth0_vlan left promiscuous mode [ 1330.912684][T17458] device veth0_vlan entered promiscuous mode [ 1331.106825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1331.176948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1331.245559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1331.323284][T17471] device veth0_vlan left promiscuous mode [ 1331.463549][T17471] device veth0_vlan entered promiscuous mode [ 1331.785485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1331.796209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1331.895067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1332.028474][T17483] syz.5.4820[17483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1332.028566][T17483] syz.5.4820[17483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.124165][T17490] device veth0_vlan left promiscuous mode [ 1333.162219][T17490] device veth0_vlan entered promiscuous mode [ 1333.270606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1333.289077][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1333.301117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1334.473086][T17511] device veth0_vlan left promiscuous mode [ 1334.559484][T17511] device veth0_vlan entered promiscuous mode [ 1334.826579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1334.856086][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1334.963051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1338.919527][T17535] device veth0_vlan left promiscuous mode [ 1339.175460][T17535] device veth0_vlan entered promiscuous mode [ 1339.455588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1339.542568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1339.665469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1340.566541][T17554] device syzkaller0 entered promiscuous mode [ 1341.018103][T17568] device veth0_vlan left promiscuous mode [ 1341.234812][T17568] device veth0_vlan entered promiscuous mode [ 1342.228927][T17590] device veth0_vlan left promiscuous mode [ 1342.505412][T17590] device veth0_vlan entered promiscuous mode [ 1342.847898][T17598] device wg2 left promiscuous mode [ 1343.565305][T17612] device veth0_vlan left promiscuous mode [ 1343.865136][T17612] device veth0_vlan entered promiscuous mode [ 1344.283630][T17620] device veth1_macvtap entered promiscuous mode [ 1344.290477][T17620] device macsec0 entered promiscuous mode [ 1344.297602][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1349.579519][T17662] device veth0_vlan left promiscuous mode [ 1349.769798][T17662] device veth0_vlan entered promiscuous mode [ 1350.046659][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1350.071373][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1350.168353][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1350.352229][T17681] device veth0_vlan left promiscuous mode [ 1350.640062][T17681] device veth0_vlan entered promiscuous mode [ 1350.942414][T17686] device veth0_vlan left promiscuous mode [ 1351.047971][T17686] device veth0_vlan entered promiscuous mode [ 1351.130868][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1351.153053][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1351.181789][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1360.592384][T17758] device veth0_vlan left promiscuous mode [ 1360.767648][T17758] device veth0_vlan entered promiscuous mode [ 1361.002463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1361.012946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1361.020840][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1366.268909][T17829] device veth0_vlan left promiscuous mode [ 1366.335106][T17829] device veth0_vlan entered promiscuous mode [ 1366.742645][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1366.752615][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1366.761344][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1368.384963][T17855] device veth0_vlan left promiscuous mode [ 1368.579020][T17855] device veth0_vlan entered promiscuous mode [ 1368.586185][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1368.620421][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1368.728512][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1372.193240][T17933] device veth0_vlan left promiscuous mode [ 1372.715654][T17933] device veth0_vlan entered promiscuous mode [ 1372.739635][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1372.763248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1372.778509][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1376.490249][T17946] device veth0_vlan left promiscuous mode [ 1376.496352][T17946] device veth0_vlan entered promiscuous mode [ 1376.600070][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1376.698788][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1376.898782][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1379.526222][T17986] device veth0_vlan left promiscuous mode [ 1379.576982][T17986] device veth0_vlan entered promiscuous mode [ 1379.781271][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1379.790236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1379.798347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1379.848595][T17992] device veth0_vlan left promiscuous mode [ 1379.987415][T17992] device veth0_vlan entered promiscuous mode [ 1380.070679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1380.083417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1380.091665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1380.192260][T17998] device veth0_vlan left promiscuous mode [ 1380.322973][T17998] device veth0_vlan entered promiscuous mode [ 1380.559255][T18013] device veth0_vlan left promiscuous mode [ 1380.781478][T18013] device veth0_vlan entered promiscuous mode [ 1385.240182][T18056] device veth0_vlan left promiscuous mode [ 1385.368349][T18056] device veth0_vlan entered promiscuous mode [ 1385.682823][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1385.786614][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1385.831359][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1394.892882][T18179] device veth0_vlan left promiscuous mode [ 1395.063454][T18179] device veth0_vlan entered promiscuous mode [ 1398.938140][ T30] audit: type=1400 audit(1768913782.244:151): avc: denied { create } for pid=18229 comm="syz.2.5042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1400.391818][T18250] device pim6reg1 entered promiscuous mode [ 1401.975909][T18273] device veth0_vlan left promiscuous mode [ 1402.018151][T18273] device veth0_vlan entered promiscuous mode [ 1402.095212][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1402.104850][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1402.119793][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1405.661743][T18317] device veth0_vlan left promiscuous mode [ 1405.840600][T18317] device veth0_vlan entered promiscuous mode [ 1412.342331][T18350] device veth0_vlan left promiscuous mode [ 1412.474982][T18350] device veth0_vlan entered promiscuous mode [ 1412.800007][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1412.851116][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1412.966542][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1415.479654][T18389] device sit0 left promiscuous mode [ 1415.633070][T18389] device sit0 entered promiscuous mode [ 1416.435574][T18404] device veth0_vlan left promiscuous mode [ 1416.806972][T18404] device veth0_vlan entered promiscuous mode [ 1418.156477][T18423] device veth0_vlan left promiscuous mode [ 1418.241437][T18423] device veth0_vlan entered promiscuous mode [ 1418.998230][T18436] device sit0 left promiscuous mode [ 1419.248469][T18436] device sit0 entered promiscuous mode [ 1419.893544][T18443] device sit0 left promiscuous mode [ 1422.309903][T18465] device veth0_vlan left promiscuous mode [ 1422.428501][T18465] device veth0_vlan entered promiscuous mode [ 1422.717400][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1422.727742][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1422.738568][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1425.788405][T18522] device veth0_vlan left promiscuous mode [ 1425.976303][T18522] device veth0_vlan entered promiscuous mode [ 1426.213364][T18535] syz.3.5131 uses obsolete (PF_INET,SOCK_PACKET) [ 1426.272001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1426.288378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1426.299730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1426.314049][T18531] device sit0 entered promiscuous mode [ 1426.722135][T18542] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1431.357885][T18617] device veth0_vlan left promiscuous mode [ 1431.474342][T18617] device veth0_vlan entered promiscuous mode [ 1431.626470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1431.672408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1431.789915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1432.146872][T18632] device wg2 left promiscuous mode [ 1432.420855][T18644] device sit0 left promiscuous mode [ 1432.499119][T18648] device sit0 entered promiscuous mode [ 1433.368652][T18653] device sit0 left promiscuous mode [ 1433.502247][T18659] device veth0_vlan left promiscuous mode [ 1433.670660][T18659] device veth0_vlan entered promiscuous mode [ 1433.866162][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1433.878296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1433.890204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1433.906316][T18662] device veth0_vlan left promiscuous mode [ 1434.105999][T18662] device veth0_vlan entered promiscuous mode [ 1437.393699][T18719] device veth0_vlan left promiscuous mode [ 1437.600593][T18719] device veth0_vlan entered promiscuous mode [ 1439.234561][T18739] device sit0 entered promiscuous mode [ 1439.569567][T18746] device veth0_vlan left promiscuous mode [ 1439.596451][T18746] device veth0_vlan entered promiscuous mode [ 1439.613771][ T30] audit: type=1400 audit(1768913822.954:152): avc: denied { create } for pid=18747 comm="syz.1.5198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 1439.826633][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1439.855831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1439.918336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1442.424889][T18797] device wg2 entered promiscuous mode [ 1443.972699][T18810] device wg2 left promiscuous mode [ 1444.954604][T18826] device wg2 entered promiscuous mode [ 1448.119271][T18898] device sit0 left promiscuous mode [ 1448.143691][T18898] device sit0 entered promiscuous mode [ 1450.032700][T18917] device veth0_vlan left promiscuous mode [ 1450.286354][T18917] device veth0_vlan entered promiscuous mode [ 1450.509068][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1450.527090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1450.536968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1450.557707][T18921] device veth0_vlan left promiscuous mode [ 1450.569888][T18921] device veth0_vlan entered promiscuous mode [ 1450.668963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1450.694441][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1450.711627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1458.713924][T18973] device veth0_vlan left promiscuous mode [ 1458.745134][T18973] device veth0_vlan entered promiscuous mode [ 1458.895263][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1458.919471][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1459.058859][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1460.317391][T19000] device veth0_vlan left promiscuous mode [ 1460.378615][T19000] device veth0_vlan entered promiscuous mode [ 1460.564587][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1460.573123][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1460.581284][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1460.760643][T19007] veth0_macvtap: mtu greater than device maximum [ 1465.378678][T19033] device sit0 left promiscuous mode [ 1465.741639][T19033] device sit0 entered promiscuous mode [ 1470.247239][T19071] device veth0_vlan left promiscuous mode [ 1470.329147][T19071] device veth0_vlan entered promiscuous mode [ 1470.433164][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1470.483154][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1470.556781][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1474.510333][T19108] device sit0 left promiscuous mode [ 1474.941761][T19108] device sit0 entered promiscuous mode [ 1476.993072][T19128] device syzkaller0 entered promiscuous mode [ 1477.271628][T19141] device pim6reg1 left promiscuous mode [ 1478.276237][T19162] device veth0_vlan left promiscuous mode [ 1478.355476][T19162] device veth0_vlan entered promiscuous mode [ 1478.455866][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1478.478970][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1478.487235][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1479.219956][T19184] device veth0_vlan left promiscuous mode [ 1479.252544][T19184] device veth0_vlan entered promiscuous mode [ 1479.306443][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1479.319806][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1479.329814][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1479.402490][T19187] device wg2 entered promiscuous mode [ 1480.704585][T19210] device veth0_vlan left promiscuous mode [ 1480.847448][T19210] device veth0_vlan entered promiscuous mode [ 1481.167560][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1481.207519][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1481.314598][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1481.412683][T19215] device veth0_vlan left promiscuous mode [ 1481.430375][T19215] device veth0_vlan entered promiscuous mode [ 1483.236194][T19233] device wg2 entered promiscuous mode [ 1487.574858][T19280] device veth0_vlan left promiscuous mode [ 1487.682907][T19280] device veth0_vlan entered promiscuous mode [ 1487.814590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1487.828749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1487.846924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1488.303861][T19292] device veth0_vlan left promiscuous mode [ 1488.430126][T19292] device veth0_vlan entered promiscuous mode [ 1490.680680][T19321] device veth0_vlan left promiscuous mode [ 1490.992090][T19321] device veth0_vlan entered promiscuous mode [ 1493.919453][T19352] device wg2 entered promiscuous mode [ 1494.853592][T19364] device veth0_vlan left promiscuous mode [ 1495.046853][T19364] device veth0_vlan entered promiscuous mode [ 1495.152958][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1495.181684][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1495.288632][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1497.403549][T19377] device wg2 left promiscuous mode [ 1497.591956][T19378] device wg2 entered promiscuous mode [ 1500.003598][T19418] device veth1_macvtap left promiscuous mode [ 1500.041769][T19418] device macsec0 left promiscuous mode [ 1500.760117][T19431] device syzkaller0 entered promiscuous mode [ 1512.971346][T19522] device sit0 left promiscuous mode [ 1513.209812][T19531] device veth0_vlan left promiscuous mode [ 1513.233431][T19531] device veth0_vlan entered promiscuous mode [ 1513.387263][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1513.395948][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1513.403959][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1523.648775][T19612] device veth0_vlan left promiscuous mode [ 1523.879400][T19612] device veth0_vlan entered promiscuous mode [ 1523.886727][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1523.908961][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1523.926335][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1524.084742][T19624] device veth0_vlan left promiscuous mode [ 1524.091385][T19624] device veth0_vlan entered promiscuous mode [ 1526.879220][T19664] device veth1_macvtap left promiscuous mode [ 1526.885479][T19664] device macsec0 left promiscuous mode [ 1527.058793][T19662] device wg2 left promiscuous mode [ 1527.662221][T19664] device wg2 entered promiscuous mode [ 1530.933424][T19713] device veth0_vlan left promiscuous mode [ 1531.113526][T19713] device veth0_vlan entered promiscuous mode [ 1531.430968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1531.502894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1531.574073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1540.327910][T19823] device veth0_vlan left promiscuous mode [ 1540.334328][T19823] device veth0_vlan entered promiscuous mode [ 1540.344260][T19827] device veth1_macvtap entered promiscuous mode [ 1540.420069][T19827] device macsec0 entered promiscuous mode [ 1540.555127][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1540.612055][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1540.728851][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1540.777856][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1541.981439][T19846] device veth0_vlan left promiscuous mode [ 1541.984736][T19850] ref_ctr_offset mismatch. inode: 0x6c1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1542.179996][T19846] device veth0_vlan entered promiscuous mode [ 1542.429685][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1542.459965][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1542.482181][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1543.060999][T19858] device syzkaller0 entered promiscuous mode [ 1543.907542][T19862] device wg2 left promiscuous mode [ 1545.462323][T19898] device veth0_vlan left promiscuous mode [ 1545.766217][T19898] device veth0_vlan entered promiscuous mode [ 1546.195881][T19907] syz.2.5514[19907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1546.195995][T19907] syz.2.5514[19907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1548.340111][T19942] ref_ctr_offset mismatch. inode: 0x1584 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1548.617283][T19947] device veth0_vlan left promiscuous mode [ 1548.625854][T19947] device veth0_vlan entered promiscuous mode [ 1548.654387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1548.666492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1548.688488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1548.829942][T19951] device veth0_vlan left promiscuous mode [ 1548.928865][T19951] device veth0_vlan entered promiscuous mode [ 1551.706934][T19987] device veth0_vlan left promiscuous mode [ 1551.746545][T19987] device veth0_vlan entered promiscuous mode [ 1551.758929][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1551.773636][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1551.868889][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1553.438632][T20004] device veth0_vlan left promiscuous mode [ 1553.486426][T20004] device veth0_vlan entered promiscuous mode [ 1553.768920][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1553.789850][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1553.959104][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1554.161977][T20008] device pim6reg1 entered promiscuous mode [ 1554.877634][T20019] device veth0_vlan left promiscuous mode [ 1554.885274][T20019] device veth0_vlan entered promiscuous mode [ 1555.008108][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1555.037839][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1555.045841][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1556.082951][T20032] device veth0_vlan left promiscuous mode [ 1556.291012][T20032] device veth0_vlan entered promiscuous mode [ 1556.410559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1556.420864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1556.428867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1557.608576][T20064] syz.5.5557[20064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1557.608701][T20064] syz.5.5557[20064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1557.744121][T20062] device veth0_vlan left promiscuous mode [ 1557.962379][T20062] device veth0_vlan entered promiscuous mode [ 1558.135858][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1558.153676][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1558.178707][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1559.027175][T20079] device veth0_vlan left promiscuous mode [ 1559.239855][T20079] device veth0_vlan entered promiscuous mode [ 1560.364153][T20094] device sit0 left promiscuous mode [ 1560.689056][T20097] device sit0 entered promiscuous mode [ 1561.180059][T20106] ref_ctr_offset mismatch. inode: 0x15ba offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1562.988766][T20142] device veth0_vlan left promiscuous mode [ 1563.200425][T20142] device veth0_vlan entered promiscuous mode [ 1563.397584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1563.413750][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1563.433267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1563.526243][T20153] device veth0_vlan left promiscuous mode [ 1563.535312][T20153] device veth0_vlan entered promiscuous mode [ 1563.842119][T20157] device veth0_vlan left promiscuous mode [ 1564.037474][T20157] device veth0_vlan entered promiscuous mode [ 1565.251073][T20191] device veth0_vlan left promiscuous mode [ 1565.533506][T20191] device veth0_vlan entered promiscuous mode [ 1571.305306][T20232] device veth0_vlan left promiscuous mode [ 1571.485069][T20232] device veth0_vlan entered promiscuous mode [ 1571.791275][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1571.871408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1571.969135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1572.019102][T20234] device veth0_vlan left promiscuous mode [ 1572.029027][T20234] device veth0_vlan entered promiscuous mode [ 1572.344625][T20244] device veth0_vlan left promiscuous mode [ 1572.591807][T20244] device veth0_vlan entered promiscuous mode [ 1573.771112][T20259] device veth0_vlan left promiscuous mode [ 1573.903549][T20259] device veth0_vlan entered promiscuous mode [ 1574.293100][T20268] device veth0_vlan left promiscuous mode [ 1574.443071][T20268] device veth0_vlan entered promiscuous mode [ 1574.565586][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1574.580481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1574.634373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1574.779378][T20276] device veth0_vlan left promiscuous mode [ 1574.973427][T20276] device veth0_vlan entered promiscuous mode [ 1575.295888][T20282] device sit0 left promiscuous mode [ 1576.290901][T20317] device veth0_vlan left promiscuous mode [ 1576.611757][T20317] device veth0_vlan entered promiscuous mode [ 1576.865628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1576.923712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1577.105387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1578.178612][T20333] device veth0_vlan left promiscuous mode [ 1578.306858][T20333] device veth0_vlan entered promiscuous mode [ 1578.536567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1578.549477][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1578.558047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1578.567120][T20334] device wg2 left promiscuous mode [ 1579.867959][T20351] device sit0 entered promiscuous mode [ 1581.048831][T20361] device veth0_vlan left promiscuous mode [ 1581.268787][T20361] device veth0_vlan entered promiscuous mode [ 1581.647846][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1581.657997][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1581.792774][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1583.975936][T20387] device sit0 left promiscuous mode [ 1584.328114][T20396] device sit0 entered promiscuous mode [ 1586.690516][T20458] device veth0_vlan left promiscuous mode [ 1586.760128][T20458] device veth0_vlan entered promiscuous mode [ 1586.887463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1586.909210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1586.990938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1589.287412][T20500] device veth0_vlan left promiscuous mode [ 1589.453223][T20500] device veth0_vlan entered promiscuous mode [ 1589.555585][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1589.575684][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1589.628357][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1589.978214][T20516] bridge0: port 2(bridge_slave_1) entered disabled state [ 1589.985601][T20516] bridge0: port 1(bridge_slave_0) entered disabled state [ 1591.050931][T20519] device pim6reg1 entered promiscuous mode [ 1591.318982][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1591.720538][T20541] device sit0 entered promiscuous mode [ 1592.228278][T20550] device veth0_vlan left promiscuous mode [ 1592.449486][T20550] device veth0_vlan entered promiscuous mode [ 1593.410837][T20574] device veth0_vlan left promiscuous mode [ 1593.544308][T20574] device veth0_vlan entered promiscuous mode [ 1593.786356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1593.799458][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1593.815327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1594.503337][T20591] syz.2.5705[20591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1594.503458][T20591] syz.2.5705[20591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1595.241368][T20595] device syzkaller0 entered promiscuous mode [ 1595.479819][T20609] device veth0_vlan left promiscuous mode [ 1595.540821][T20609] device veth0_vlan entered promiscuous mode [ 1595.752397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1595.792428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1595.850022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1598.093282][T20661] device sit0 entered promiscuous mode [ 1599.462695][T20692] device veth0_vlan left promiscuous mode [ 1599.520566][T20692] device veth0_vlan entered promiscuous mode [ 1599.542323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1599.551979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1599.561152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1601.175123][T20725] device veth0_vlan left promiscuous mode [ 1601.205215][T20725] device veth0_vlan entered promiscuous mode [ 1601.496302][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1601.515343][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1601.555650][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1601.624505][T20728] device sit0 left promiscuous mode [ 1601.972877][T20738] device sit0 entered promiscuous mode [ 1602.031216][T20741] device veth0_vlan left promiscuous mode [ 1602.184304][T20741] device veth0_vlan entered promiscuous mode [ 1602.394549][T20748] device sit0 entered promiscuous mode [ 1608.091263][T20865] ref_ctr_offset mismatch. inode: 0x13c3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1612.379171][T20907] device veth0_vlan left promiscuous mode [ 1612.539555][T20907] device veth0_vlan entered promiscuous mode [ 1612.935792][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1612.970938][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1613.038628][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1613.779025][T20927] device veth0_vlan left promiscuous mode [ 1613.814721][T20927] device veth0_vlan entered promiscuous mode [ 1613.991017][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1613.999906][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1614.048362][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1615.576221][T20951] device veth0_vlan left promiscuous mode [ 1615.661546][T20951] device veth0_vlan entered promiscuous mode [ 1615.834144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1615.844032][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1615.852909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1617.225784][T20980] device syzkaller0 entered promiscuous mode [ 1618.777674][T21006] device veth0_vlan left promiscuous mode [ 1618.813510][T21006] device veth0_vlan entered promiscuous mode [ 1618.928046][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1618.975839][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1619.084425][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1619.963034][T21023] device veth0_vlan left promiscuous mode [ 1620.136857][T21023] device veth0_vlan entered promiscuous mode [ 1620.306303][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1620.315472][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1620.325115][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1620.390913][T21033] syz.1.5831[21033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1620.391103][T21033] syz.1.5831[21033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1622.341964][T21063] device sit0 left promiscuous mode [ 1623.149840][T21065] device veth0_vlan left promiscuous mode [ 1623.181259][T21065] device veth0_vlan entered promiscuous mode [ 1625.185112][T21116] device veth0_vlan left promiscuous mode [ 1625.316816][T21116] device veth0_vlan entered promiscuous mode [ 1625.521218][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1625.533778][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1625.550755][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1630.698762][T21155] ref_ctr_offset mismatch. inode: 0x182b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1633.150840][T21187] device veth0_vlan left promiscuous mode [ 1633.186538][T21187] device veth0_vlan entered promiscuous mode [ 1633.521820][T21196] device sit0 entered promiscuous mode [ 1634.310820][T21205] device syzkaller0 entered promiscuous mode [ 1634.511710][T21208] device veth0_vlan left promiscuous mode [ 1634.567105][T21208] device veth0_vlan entered promiscuous mode [ 1634.914348][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1634.923090][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1634.931521][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1636.595594][T21231] device veth0_vlan left promiscuous mode [ 1636.748130][T21231] device veth0_vlan entered promiscuous mode [ 1638.647202][T21263] device syzkaller0 entered promiscuous mode [ 1638.679256][T21273] device sit0 left promiscuous mode [ 1638.736961][T21274] device sit0 entered promiscuous mode [ 1639.067129][T21277] device veth0_vlan left promiscuous mode [ 1639.114654][T21277] device veth0_vlan entered promiscuous mode [ 1639.216814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1639.246374][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1639.295123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1639.336327][T21289] device veth0_vlan left promiscuous mode [ 1639.353500][T21289] device veth0_vlan entered promiscuous mode [ 1639.721389][T21300] device veth0_vlan left promiscuous mode [ 1639.758639][T21300] device veth0_vlan entered promiscuous mode [ 1639.766101][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1639.792610][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1639.817710][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1640.161172][T21311] device veth0_vlan left promiscuous mode [ 1640.282977][T21311] device veth0_vlan entered promiscuous mode [ 1640.586881][T21320] device veth0_vlan left promiscuous mode [ 1640.969821][T21320] device veth0_vlan entered promiscuous mode [ 1641.465663][T21345] device veth0_vlan left promiscuous mode [ 1641.733330][T21345] device veth0_vlan entered promiscuous mode [ 1641.993030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1642.007538][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1642.024323][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1642.049948][T21359] device veth0_vlan left promiscuous mode [ 1642.057575][T21359] device veth0_vlan entered promiscuous mode [ 1642.098662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1642.169663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1642.221937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1642.529951][T21370] GPL: port 1(erspan0) entered disabled state [ 1642.697636][T21379] device sit0 left promiscuous mode [ 1645.298966][T21401] device veth0_vlan left promiscuous mode [ 1645.335739][T21401] device veth0_vlan entered promiscuous mode [ 1645.524177][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1645.533964][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1645.541609][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1650.813217][T21435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1650.825827][T21435] bridge0: port 1(bridge_slave_0) entered disabled state [ 1651.065413][T21436] device bridge_slave_1 left promiscuous mode [ 1651.135281][T21436] bridge0: port 2(bridge_slave_1) entered disabled state [ 1651.166479][T21436] device bridge_slave_0 left promiscuous mode [ 1651.173396][T21436] bridge0: port 1(bridge_slave_0) entered disabled state [ 1651.245217][T21447] device veth0_vlan left promiscuous mode [ 1651.256200][T21447] device veth0_vlan entered promiscuous mode [ 1651.279460][T21450] device veth0_vlan left promiscuous mode [ 1651.296247][T21450] device veth0_vlan entered promiscuous mode [ 1654.823747][ T30] audit: type=1400 audit(1768914038.164:153): avc: denied { create } for pid=21495 comm="syz.2.5965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1657.114867][T21531] device sit0 left promiscuous mode [ 1657.981358][T21546] device sit0 entered promiscuous mode [ 1658.124620][T21549] device veth0_vlan left promiscuous mode [ 1658.290250][T21549] device veth0_vlan entered promiscuous mode [ 1658.326503][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1658.341719][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1658.457577][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1659.044167][T21579] GPL: port 1(erspan0) entered disabled state [ 1661.279032][T21615] device veth0_vlan left promiscuous mode [ 1661.336098][T21615] device veth0_vlan entered promiscuous mode [ 1661.549993][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1661.559925][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1661.567928][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1667.229619][T21701] syz.3.6020[21701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1667.229703][T21701] syz.3.6020[21701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1667.367082][T21704] device veth0_vlan left promiscuous mode [ 1667.550550][T21704] device veth0_vlan entered promiscuous mode [ 1667.679973][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1667.705282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1667.779426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1667.902438][T21711] device veth0_vlan left promiscuous mode [ 1668.078178][T21711] device veth0_vlan entered promiscuous mode [ 1668.409072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1668.468027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1668.529233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1669.795173][T21728] device syzkaller0 entered promiscuous mode [ 1670.118241][T21740] device veth0_vlan left promiscuous mode [ 1670.174254][T21740] device veth0_vlan entered promiscuous mode [ 1670.374025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1670.388790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1670.399153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1670.766714][T21750] device sit0 left promiscuous mode [ 1670.949466][T21756] device veth0_vlan left promiscuous mode [ 1671.055330][T21756] device veth0_vlan entered promiscuous mode [ 1671.163898][T21757] device sit0 entered promiscuous mode [ 1671.557567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1671.566607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1671.576719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1671.716285][T21768] device veth0_vlan left promiscuous mode [ 1671.734058][T21768] device veth0_vlan entered promiscuous mode [ 1672.502201][T21782] device veth1_macvtap left promiscuous mode [ 1672.604588][T21782] device macsec0 left promiscuous mode [ 1674.432301][T21805] syz.2.6051[21805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1674.432408][T21805] syz.2.6051[21805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1674.995085][T21815] device veth0_vlan left promiscuous mode [ 1675.328135][T21815] device veth0_vlan entered promiscuous mode [ 1675.335689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1675.387618][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1675.514507][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1675.969563][T21833] device sit0 left promiscuous mode [ 1676.292480][T21831] device sit0 entered promiscuous mode [ 1677.032483][T21849] device sit0 left promiscuous mode [ 1677.418284][T21844] device sit0 entered promiscuous mode [ 1678.582239][T21870] device veth0_vlan left promiscuous mode [ 1678.639651][T21870] device veth0_vlan entered promiscuous mode [ 1678.673938][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1678.686955][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1678.698301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1679.439802][T21876] device syzkaller0 entered promiscuous mode [ 1681.577997][T21906] syz.5.6077[21906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1681.578075][T21906] syz.5.6077[21906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1681.813493][T21908] device veth0_vlan left promiscuous mode [ 1681.948737][T21908] device veth0_vlan entered promiscuous mode [ 1682.470002][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1682.500338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1682.611348][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1688.886390][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1693.234203][T22018] device syzkaller0 entered promiscuous mode [ 1695.165477][T22041] device sit0 left promiscuous mode [ 1695.369683][T22040] device sit0 entered promiscuous mode [ 1696.645501][T22062] device sit0 entered promiscuous mode [ 1697.604843][T22079] device veth0_vlan left promiscuous mode [ 1697.685544][T22079] device veth0_vlan entered promiscuous mode [ 1697.926843][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1697.946446][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1697.977062][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1703.126067][T22191] device sit0 left promiscuous mode [ 1703.450405][T22200] device wg2 entered promiscuous mode [ 1706.099406][T22221] device sit0 entered promiscuous mode [ 1706.521860][T22229] ref_ctr_offset mismatch. inode: 0x1985 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1706.784138][T22230] GPL: port 1(erspan0) entered blocking state [ 1706.790282][T22230] GPL: port 1(erspan0) entered forwarding state [ 1706.965383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 1707.959261][T22236] device sit0 left promiscuous mode [ 1709.367249][T22256] device wg2 left promiscuous mode [ 1711.392340][T22288] device sit0 entered promiscuous mode [ 1713.303527][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1728.903416][T22449] ref_ctr_offset mismatch. inode: 0x19ea offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1729.750273][ T30] audit: type=1400 audit(1768914113.084:154): avc: denied { create } for pid=22465 comm="syz.2.6242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 1729.863138][T22466] ref_ctr_offset mismatch. inode: 0x19f6 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1731.303645][T22491] device veth0_vlan left promiscuous mode [ 1731.443773][T22491] device veth0_vlan entered promiscuous mode [ 1731.678054][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1731.719697][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1731.791539][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1734.883359][T22531] ref_ctr_offset mismatch. inode: 0x1840 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1735.020299][T22531] GPL: port 1(erspan0) entered blocking state [ 1735.026659][T22531] GPL: port 1(erspan0) entered forwarding state [ 1735.098144][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 1735.186662][T22539] device veth0_vlan left promiscuous mode [ 1735.280221][T22539] device veth0_vlan entered promiscuous mode [ 1735.421448][T22540] device veth0_vlan left promiscuous mode [ 1735.458477][T22540] device veth0_vlan entered promiscuous mode [ 1736.928204][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1736.962191][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1737.039224][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1737.472970][T22559] ref_ctr_offset mismatch. inode: 0xab0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1737.932074][T22559] device wg2 left promiscuous mode [ 1739.797504][T22593] device wg2 entered promiscuous mode [ 1740.598510][T22602] ref_ctr_offset mismatch. inode: 0xac1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1741.182097][T22602] GPL: port 1(erspan0) entered blocking state [ 1741.239102][T22602] GPL: port 1(erspan0) entered disabled state [ 1741.278569][T22602] device erspan0 entered promiscuous mode [ 1741.284699][T22602] GPL: port 1(erspan0) entered blocking state [ 1741.291124][T22602] GPL: port 1(erspan0) entered forwarding state [ 1743.065019][T22620] ref_ctr_offset mismatch. inode: 0x1851 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1745.918916][T22651] GPL: port 1(erspan0) entered disabled state [ 1749.570036][T22680] ref_ctr_offset mismatch. inode: 0x15b8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1750.903318][T22698] device veth1_macvtap entered promiscuous mode [ 1751.044581][T22698] device macsec0 entered promiscuous mode [ 1751.178429][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1752.831258][T22721] device pim6reg1 entered promiscuous mode [ 1755.909997][T22738] ref_ctr_offset mismatch. inode: 0x1873 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 1758.917086][T22779] device veth0_vlan left promiscuous mode [ 1758.934846][T22779] device veth0_vlan entered promiscuous mode [ 1758.997216][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1759.006085][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1759.014089][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1759.973064][T22792] device sit0 left promiscuous mode [ 1759.984323][T22793] device sit0 entered promiscuous mode [ 1762.149309][T22808] GPL: port 1(erspan0) entered disabled state [ 1765.201192][T22829] device veth0_vlan left promiscuous mode [ 1765.304163][T22829] device veth0_vlan entered promiscuous mode [ 1765.689423][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1765.728648][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1765.829636][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 1768.355451][T22868] bridge0: port 2(bridge_slave_1) entered disabled state [ 1768.362959][T22868] bridge0: port 1(bridge_slave_0) entered disabled state [ 1768.990723][T22868] device veth0 left promiscuous mode [ 1768.996493][T22868] bridge0: port 3(veth0) entered disabled state [ 1769.163686][T22868] device bridge_slave_1 left promiscuous mode [ 1769.262869][T22868] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.341801][T22868] device bridge_slave_0 left promiscuous mode [ 1769.424424][T22868] bridge0: port 1(bridge_slave_0) entered disabled state [ 1770.665172][T22903] device sit0 left promiscuous mode [ 1770.912553][T22903] device sit0 entered promiscuous mode [ 1771.067575][T22912] device wg2 left promiscuous mode [ 1771.208623][T22907] ref_ctr_offset mismatch. inode: 0xb0e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1771.881925][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1774.560792][T22965] device sit0 left promiscuous mode [ 1774.789697][T22967] device syzkaller0 entered promiscuous mode [ 1774.802438][T22965] device sit0 entered promiscuous mode [ 1775.644026][T22971] device veth1_macvtap left promiscuous mode [ 1775.657999][T22971] device macsec0 left promiscuous mode [ 1775.680106][T22974] device veth1_macvtap entered promiscuous mode [ 1775.686512][T22974] device macsec0 entered promiscuous mode [ 1775.942449][T22982] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1776.093647][T22982] device syzkaller0 entered promiscuous mode [ 1778.595381][T23019] device sit0 left promiscuous mode [ 1778.926535][T23019] device sit0 entered promiscuous mode [ 1779.396984][T23038] GPL: port 1(erspan0) entered disabled state [ 1801.024264][T23333] device sit0 left promiscuous mode [ 1802.552763][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1805.506306][T23394] device sit0 left promiscuous mode [ 1805.760570][T23394] device sit0 entered promiscuous mode [ 1815.309243][T23530] ref_ctr_offset mismatch. inode: 0x1b12 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1819.165059][T23576] device sit0 entered promiscuous mode [ 1844.501515][T23894] @ÿ: renamed from bond_slave_0 [ 1889.386561][T24513] syz.1.6875[24513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1889.386657][T24513] syz.1.6875[24513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1891.728656][T24540] syz.1.6884[24540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1891.905371][T24540] syz.1.6884[24540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1896.265039][T24591] bond_slave_1: mtu less than device minimum [ 1896.604407][T24598] syz.2.6904[24598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1896.604494][T24598] syz.2.6904[24598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1908.586827][T24756] device pim6reg1 entered promiscuous mode [ 1920.832126][T24964] device sit0 left promiscuous mode [ 1921.036853][T24964] device sit0 entered promiscuous mode [ 1928.668812][T25045] syz.5.7060[25045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1928.668910][T25045] syz.5.7060[25045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1928.849885][T25046] syz.5.7060[25046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1928.943322][T25046] syz.5.7060[25046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1929.347621][T25056] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1929.378367][T25056] syzkaller0: Linktype set failed because interface is up [ 1934.396346][T25169] bond_slave_1: mtu less than device minimum [ 1941.100842][T25224] device pim6reg1 entered promiscuous mode [ 1941.665930][T25227] device syzkaller0 entered promiscuous mode [ 1941.802909][T25235] bond_slave_1: mtu less than device minimum [ 1942.825988][T25249] syz.2.7135[25249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1942.826082][T25249] syz.2.7135[25249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1942.932455][T25249] device pim6reg1 entered promiscuous mode [ 1943.156713][T25256] device syzkaller0 entered promiscuous mode [ 1944.064080][T25276] device pim6reg1 entered promiscuous mode [ 1945.342258][T25303] ip6_vti0: mtu greater than device maximum [ 1945.562689][T25312] bond_slave_1: mtu less than device minimum [ 1946.550367][T25349] device wg2 entered promiscuous mode [ 1947.505828][T25368] device pim6reg1 entered promiscuous mode [ 1948.655353][T25384] device pim6reg1 entered promiscuous mode [ 1953.081762][T25403] device wg2 entered promiscuous mode [ 1954.204022][T25430] device pim6reg1 entered promiscuous mode [ 1955.490921][T25449] device pim6reg1 entered promiscuous mode [ 1955.726097][T25459] device syzkaller0 left promiscuous mode [ 1955.810513][T25465] device pim6reg1 entered promiscuous mode [ 1956.205628][T25475] device pim6reg1 entered promiscuous mode [ 1956.832420][T25484] device pim6reg1 left promiscuous mode [ 1957.180903][T25502] device pim6reg1 entered promiscuous mode [ 1963.216694][T25567] device pim6reg1 entered promiscuous mode [ 1964.805227][T25580] device syzkaller0 entered promiscuous mode [ 1965.285988][T25597] device veth0_vlan left promiscuous mode [ 1965.297861][T25597] device veth0_vlan entered promiscuous mode [ 1965.458769][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1965.478215][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1965.500268][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1967.581418][T25630] device pim6reg1 entered promiscuous mode [ 1969.637344][T25638] @0Ù: renamed from bond_slave_1 [ 1976.619060][T25718] syz.2.7302[25718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1976.619145][T25718] syz.2.7302[25718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1976.713191][T25721] device syzkaller0 entered promiscuous mode [ 1977.079586][T25729] device wg2 left promiscuous mode [ 1978.510421][T25760] device syzkaller0 entered promiscuous mode [ 1979.791113][T25773] device syzkaller0 entered promiscuous mode [ 1981.720766][T25792] device veth1_macvtap entered promiscuous mode [ 1981.748053][T25792] device macsec0 entered promiscuous mode [ 1981.758182][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1984.939802][T25831] device syzkaller0 entered promiscuous mode [ 1986.521171][T25857] device wg2 left promiscuous mode [ 1988.191358][T25890] device veth1_macvtap entered promiscuous mode [ 1988.254972][T25890] device macsec0 entered promiscuous mode [ 1988.309845][T25896] GPL: port 1(erspan0) entered disabled state [ 1988.359770][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1990.745748][T25927] device sit0 left promiscuous mode [ 1990.938092][T25931] device sit0 entered promiscuous mode [ 1994.199395][ T30] audit: type=1400 audit(1768914377.544:155): avc: denied { attach_queue } for pid=25991 comm="syz.3.7389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2000.909958][T26038] GPL: port 1(erspan0) entered blocking state [ 2000.916089][T26038] GPL: port 1(erspan0) entered forwarding state [ 2001.118599][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 2001.631750][T26050] bond_slave_1: mtu less than device minimum [ 2003.334874][T26073] device syzkaller0 entered promiscuous mode [ 2019.469912][T26284] device veth1_to_bond entered promiscuous mode [ 2023.107705][T26334] device veth1_to_bond entered promiscuous mode [ 2023.139207][T26331] device erspan0 left promiscuous mode [ 2023.148996][T26331] GPL: port 1(erspan0) entered disabled state [ 2029.152331][T26387] device veth1_to_bond entered promiscuous mode [ 2029.316080][T26384] device erspan0 left promiscuous mode [ 2029.321950][T26384] GPL: port 1(erspan0) entered disabled state [ 2029.620463][T26398] syz.0.7512[26398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2029.620529][T26398] syz.0.7512[26398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2032.667172][T26432] device veth1_to_bond entered promiscuous mode [ 2036.090274][T26480] device syzkaller0 entered promiscuous mode [ 2045.210863][T26552] device pim6reg1 entered promiscuous mode [ 2083.944889][T26858] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 2090.794670][T26907] ªªªªªª: renamed from vlan0 [ 2093.145171][T26939] veth0_macvtap: mtu greater than device maximum [ 2099.820370][T26984] device veth0_vlan left promiscuous mode [ 2099.826549][T26984] device veth0_vlan entered promiscuous mode [ 2100.039403][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2100.089088][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2100.258502][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2101.513846][T26996] device veth0_vlan left promiscuous mode [ 2101.763709][T26996] device veth0_vlan entered promiscuous mode [ 2112.386986][T27120] device sit0 left promiscuous mode [ 2112.461843][T27122] device sit0 entered promiscuous mode [ 2112.721509][T27118] ref_ctr_offset mismatch. inode: 0x1b1b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2113.006685][T27130] ref_ctr_offset mismatch. inode: 0x1ff2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2116.382776][T27161] device syzkaller0 entered promiscuous mode [ 2117.858505][T27175] ref_ctr_offset mismatch. inode: 0x1b3e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2117.859328][T27176] GPL: port 1(erspan0) entered blocking state [ 2118.081976][T27176] GPL: port 1(erspan0) entered disabled state [ 2118.089934][T27176] device erspan0 entered promiscuous mode [ 2130.981911][T27287] syz.3.7774[27287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2130.981989][T27287] syz.3.7774[27287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2137.696249][T27378] device veth0_vlan left promiscuous mode [ 2137.723084][T27378] device veth0_vlan entered promiscuous mode [ 2137.888677][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2137.897617][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2137.906161][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 2138.225999][T27386] syz.5.7800[27386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2138.226518][T27386] syz.5.7800[27386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2139.384447][T27410] device veth0_vlan left promiscuous mode [ 2139.403282][T27410] device veth0_vlan entered promiscuous mode [ 2139.425408][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2139.441605][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2139.454776][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 2140.034465][T27424] syz.1.7815[27424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2140.034544][T27424] syz.1.7815[27424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2151.015557][T27541] ref_ctr_offset mismatch. inode: 0x20a4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2151.367182][T27539] GPL: port 1(erspan0) entered blocking state [ 2151.374413][T27539] GPL: port 1(erspan0) entered forwarding state [ 2152.340807][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 2153.319434][T27576] GPL: port 2(veth0_to_team) entered blocking state [ 2153.368863][T27576] GPL: port 2(veth0_to_team) entered disabled state [ 2153.376046][T27576] device veth0_to_team entered promiscuous mode [ 2156.646866][T27592] device sit0 left promiscuous mode [ 2158.566393][T27622] device sit0 entered promiscuous mode [ 2161.340959][T27642] device sit0 left promiscuous mode [ 2161.572708][T27642] device sit0 entered promiscuous mode [ 2163.299437][T27659] device veth0_vlan left promiscuous mode [ 2163.379915][T27659] device veth0_vlan entered promiscuous mode [ 2163.560113][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2163.593688][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2163.656399][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 2163.858599][T27663] device veth0_vlan left promiscuous mode [ 2163.864742][T27663] device veth0_vlan entered promiscuous mode [ 2163.981338][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2164.049232][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2164.165580][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2166.498926][T27700] syz.3.7894[27700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2166.499052][T27700] syz.3.7894[27700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2166.658288][T27700] syz.3.7894[27700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2166.781980][T27700] syz.3.7894[27700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2169.171731][T27738] device sit0 left promiscuous mode [ 2169.256619][T27738] device sit0 entered promiscuous mode [ 2171.940797][T27771] syz.1.7913[27771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2171.940884][T27771] syz.1.7913[27771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2178.485676][T27849] device sit0 left promiscuous mode [ 2178.621489][T27849] device sit0 entered promiscuous mode [ 2180.646304][T27880] device veth0_vlan left promiscuous mode [ 2180.733613][T27880] device veth0_vlan entered promiscuous mode [ 2187.085253][T27953] bridge0: port 3(veth0) entered blocking state [ 2187.095042][T27953] bridge0: port 3(veth0) entered disabled state [ 2187.102585][T27953] device veth0 entered promiscuous mode [ 2187.216050][T27956] device veth0 left promiscuous mode [ 2187.228173][T27956] bridge0: port 3(veth0) entered disabled state [ 2188.954262][T27982] device sit0 left promiscuous mode [ 2189.239284][T27983] device sit0 entered promiscuous mode [ 2190.389081][T27998] device pim6reg1 entered promiscuous mode [ 2193.989739][T28034] device veth0_vlan left promiscuous mode [ 2193.996113][T28034] device veth0_vlan entered promiscuous mode [ 2194.239291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2194.278664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2194.371448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 2196.929457][T28078] device sit0 left promiscuous mode [ 2197.033521][T28074] device sit0 entered promiscuous mode [ 2200.639821][T28105] device sit0 left promiscuous mode [ 2200.698665][T28104] device sit0 entered promiscuous mode [ 2203.540517][T28138] device wg2 entered promiscuous mode [ 2207.958399][T28214] device wg2 entered promiscuous mode [ 2210.648159][T28256] general protection fault, probably for non-canonical address 0xdffffc0000000018: 0000 [#1] PREEMPT SMP KASAN [ 2210.659934][T28256] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 2210.668545][T28256] CPU: 0 PID: 28256 Comm: syz.3.8049 Tainted: G W syzkaller #0 [ 2210.677404][T28256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 2210.687998][T28256] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 2210.694767][T28256] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 2210.714670][T28256] RSP: 0018:ffffc90000af77e0 EFLAGS: 00010206 [ 2210.720754][T28256] RAX: 0000000000000018 RBX: 1ffff9200015ef00 RCX: 0000000000080000 [ 2210.728891][T28256] RDX: ffffc9000234f000 RSI: 000000000000cbd1 RDI: 000000000000cbd2 [ 2210.737033][T28256] RBP: ffffc90000af78b0 R08: ffffc90000af783f R09: ffffc90000af7820 [ 2210.745646][T28256] R10: dffffc0000000000 R11: fffff5200015ef08 R12: 00000000000000c0 [ 2210.753624][T28256] R13: dffffc0000000000 R14: 1ffff11025256904 R15: ffff8881292b4820 [ 2210.761791][T28256] FS: 00007f309573f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 2210.770914][T28256] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2210.777680][T28256] CR2: 0000001b2e915ff8 CR3: 000000011932b000 CR4: 00000000003506b0 [ 2210.786031][T28256] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2210.794211][T28256] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2210.802207][T28256] Call Trace: [ 2210.805580][T28256] [ 2210.808597][T28256] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2210.814780][T28256] ? sk_psock_start_verdict+0xc0/0xc0 [ 2210.820345][T28256] unix_stream_sendmsg+0x7d1/0xc90 [ 2210.825657][T28256] ? unix_stream_sendmsg+0x721/0xc90 [ 2210.831139][T28256] ? unix_show_fdinfo+0xa0/0xa0 [ 2210.836172][T28256] ? security_socket_sendmsg+0x82/0xa0 [ 2210.841754][T28256] ? unix_show_fdinfo+0xa0/0xa0 [ 2210.846883][T28256] ____sys_sendmsg+0x5b7/0x8f0 [ 2210.851989][T28256] ? __sys_sendmsg_sock+0x40/0x40 [ 2210.857384][T28256] ? import_iovec+0x7c/0xb0 [ 2210.862029][T28256] ___sys_sendmsg+0x236/0x2e0 [ 2210.867296][T28256] ? __sys_sendmsg+0x280/0x280 [ 2210.872122][T28256] ? __fdget+0x1a1/0x230 [ 2210.876428][T28256] __x64_sys_sendmsg+0x206/0x2f0 [ 2210.881984][T28256] ? ___sys_sendmsg+0x2e0/0x2e0 [ 2210.886922][T28256] ? __kasan_check_write+0x14/0x20 [ 2210.892079][T28256] ? switch_fpu_return+0x15d/0x2c0 [ 2210.897186][T28256] x64_sys_call+0x4b/0x9a0 [ 2210.901997][T28256] do_syscall_64+0x4c/0xa0 [ 2210.906434][T28256] ? clear_bhb_loop+0x50/0xa0 [ 2210.911123][T28256] ? clear_bhb_loop+0x50/0xa0 [ 2210.915804][T28256] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2210.921898][T28256] RIP: 0033:0x7f3096ce2cb9 [ 2210.927093][T28256] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2210.947772][T28256] RSP: 002b:00007f309573f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2210.956404][T28256] RAX: ffffffffffffffda RBX: 00007f3096f5dfa0 RCX: 00007f3096ce2cb9 [ 2210.964371][T28256] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000008 [ 2210.972428][T28256] RBP: 00007f3096d50bf7 R08: 0000000000000000 R09: 0000000000000000 [ 2210.980662][T28256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2210.988722][T28256] R13: 00007f3096f5e038 R14: 00007f3096f5dfa0 R15: 00007ffd0551b5b8 [ 2210.996695][T28256] [ 2210.999716][T28256] Modules linked in: [ 2211.008087][T28256] ---[ end trace f57ecf2dfaee8f9b ]--- [ 2211.013703][T28256] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 2211.016431][ T30] audit: type=1400 audit(1768914594.354:156): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2211.038426][T28256] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 2211.063231][T28256] RSP: 0018:ffffc90000af77e0 EFLAGS: 00010206 [ 2211.069898][T28256] RAX: 0000000000000018 RBX: 1ffff9200015ef00 RCX: 0000000000080000 [ 2211.078540][T28256] RDX: ffffc9000234f000 RSI: 000000000000cbd1 RDI: 000000000000cbd2 [ 2211.086525][T28256] RBP: ffffc90000af78b0 R08: ffffc90000af783f R09: ffffc90000af7820 [ 2211.094696][T28256] R10: dffffc0000000000 R11: fffff5200015ef08 R12: 00000000000000c0 [ 2211.102939][T28256] R13: dffffc0000000000 R14: 1ffff11025256904 R15: ffff8881292b4820 [ 2211.111273][T28256] FS: 00007f309573f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 2211.122789][T28256] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2211.129538][T28256] CR2: 000000110c2c026a CR3: 000000011932b000 CR4: 00000000003506a0 [ 2211.142736][T28256] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 2211.158070][T28256] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2211.176741][T28256] Kernel panic - not syncing: Fatal exception [ 2211.183373][T28256] Kernel Offset: disabled [ 2211.188072][T28256] Rebooting in 86400 seconds..