last executing test programs: 18m12.546196796s ago: executing program 32 (id=7995): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400006b000000850000000100000095eaf9828a2678628a6180f85cb2ad229ff2ba19394e8c7ef116d47aec8493b7615c7674c7ba89895f6bd04450fe08e50915a2dfdc38f9f92c5c951d70a06f62e9865279cfbe39ae17e70bfc5f3b5e95ed97fe", @ANYBLOB="7e147169e89ee7393b323419f2cdcce570383ef9d06e612bec0ba001d06ee0773e53ebd76a2f220e46d4861d2f87f08e2a436ce25dd699202403e1e9abf99623d0be48d91e6854d052348fc5f32d92988ee75d57b69ed6fc3aa25c613eecdf4eb22f33b826cef862032e89e576d09271891ecce1cf77cd16"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000180), &(0x7f0000000200)='%pS \x00'}, 0x20) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRESOCT, @ANYRES64=r3, @ANYRES16, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) 18m12.529236407s ago: executing program 33 (id=8006): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r7) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 18m12.48966777s ago: executing program 34 (id=8005): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000009955cbd76d2fa9b85ab62b31b3f1ed831e8c3bf74cb8bbd1f978c32eac8aa0a614985eabc3921aeaa04a78d3f886f45f99d2c39cdf272286eb9930451bd6dd60e75b786a6404da2cbde3f9a7bfb500"/106], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 18m12.48913164s ago: executing program 35 (id=8000): socketpair(0x2c, 0x5, 0x56, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xc, 0x1, 0x8, 0x2, 0x240a0, r3, 0x6, '\x00', r4, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) sendmsg$unix(r1, &(0x7f00000005c0)={&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000002c0)="bafffc422d7952ffde451e682f6be6b564edb3039079baaad3b08bda1836b002e682dbd005e6bcff08101120dd05a16d1c2760bc619efad6dd8a0af9397e4bd3af58fcbbecc0b0c177290cee57d0f02eb5ebe3740a42e1e067801fafcd1074f328808cdbaa54ce47453c5f508b10f5ddc9d094f0a20e5c15d3ea99d8bf0b38b4a7cd24a367c73aab8e997103740c1cfe7879a942b9831e03e528f9e333eb646ed182c3045ef0787786f73af1fe017494428a1e2de8ac4c8488bea0f8200fe3237d49551a76e1bb7754953b8d0820855696694d90c5ae7baecc946a1229bffb", 0xdf}, {&(0x7f00000003c0)="8c9021f3d7d9488f920f65a79bb79891ddd4e16c09f187dda6e743def74029b4d157ddb2e35fa5590204cde33cdd8467ce7ac3504c4dfa57ee999c55b725005b999619838f67b724a8413880a5b90a0a1b2079ddb8cd0d06586b9487bcce01d8bdad50417eb978aeab617e9de91874910d5c3407c638643e065c42313721b8b863fe51150d7d22cc8cdc6b8e51721a8abd7c747991d292ea29ef4b5a438fcde4699edad3c19c89856bb0198bd91c8bc71d4d7cac434555f6d09995276647a493e423bb0206fd24", 0xc7}, {&(0x7f00000004c0)="f9bbf8de34148ea92edfb2c4ab7596eccb9661aba43aecad022eeeee4f903fc2b8b559d675258cae88d71885de6291", 0x2f}, {&(0x7f0000000500)="1879ac47b5b49e637a3fab8021fd3b19ce68adb096edb20e7ef2a56d6cc93ff1740390c6730cdfca4b381a4daa", 0x2d}], 0x4, &(0x7f0000000580), 0x0, 0x20040000}, 0x81) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x2840, 0x0) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000640)) recvmsg(r1, &(0x7f00000019c0)={&(0x7f0000000680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000700)=""/44, 0x2c}, {&(0x7f0000000740)=""/67, 0x43}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/24, 0x18}, {&(0x7f0000001800)=""/59, 0x3b}, {&(0x7f0000001840)}], 0x6, &(0x7f0000001900)=""/166, 0xa6}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001a00)=r2, 0x4) socketpair(0x2, 0x80000, 0x5, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000002c00)={&(0x7f0000001a80)=@tipc, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001b00)=""/45, 0x2d}, {&(0x7f0000001b40)=""/4096, 0x1000}], 0x2, &(0x7f0000002b80)=""/106, 0x6a}, 0x40000020) recvmsg$unix(r8, &(0x7f0000003ec0)={&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/10, 0xa}, {&(0x7f0000002d00)=""/252, 0xfc}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/43, 0x2b}], 0x4, &(0x7f0000003e80)}, 0x21) sendmsg$inet(r0, &(0x7f00000043c0)={0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000003f00)="9f87a0ea71b5f4de2a8505eadf5e6acbb485b68eaef35bb92b4ed4f6bb45ca59e179e198825b19f0ae47542748f4a324295d4ef518cef3eb1757da26fec7a8c8cc7b828e99d593d5b48889f21c0c703909667db2311cf97fa6821b69371f8bfcf0977d340bba8bf25464748617a31010b488010be7eb978b22d301fc6c1c428b7f4ee7f8a802d57708737705d6eede26b9d59b421016d3a01cfd859f3c0f9e8eb2bcc93775dcf10dbb8e224dd2f4fd42197dd31a83e4b811d465d2fa76be2759a2a60ed495855904721a043a0a20f28a92e0c8aa1c3e63b18ecfb9e12afa117c3f50410fe6d706617d", 0xe9}, {&(0x7f0000004000)="4599828aa80df4c8c1e645a0b908d89eefe8fb2d44e0d023d67945713eb98b3796d45d0fe17ebbb4791ae3d490ef317a81cc2a012c5f29f17b5cf689a81a9e65357dfe7fb2b8ef", 0x47}, {&(0x7f0000004080)="e4f1093426b7b81970d03ca20995abcc6c566556035b47fc02c197342933248687a254a72ef65ee64c61ad0df743253dfc", 0x31}, {&(0x7f00000040c0)="9d6813811ee1603fc5bed719ad5bf3e671db211b4717c740523f392486409ab367b67a75ed6044465a2b6b8be084b76bfd7410685c8e0bda2ae35b23b26434a88ebee85a08f6e132f52ce5b64cf6dce8a3c190fe6ca8bfbd9644eebeba3f1878e356a1ad86513f3fb57a908afe65c45349b2e1b0340e1bcad5bd04dfa1942a27b35deb30f0fe449f0870b0b214db0c1d2161c6eac8e7e931837b4ccbf4730e75783b83175381835f12572bc5dee254ac37cfbe9314cbbd01de7ca4b117e0fb87f03c40a4c8eb7557dc621c091955ce6af486ce344cefe8b35c88cf19a7a7", 0xde}, {&(0x7f00000041c0)="751ebdf709fccc945e1f1a0429bcc4bea7bf9ce5a249381f9ae81964b22759920d55c8b100e7639ca63781f628129fd558aededa005b41d8481af10a5ca3470dbad0c540717415356a0d2c109e9875da667d22", 0x53}, {&(0x7f0000004240)="c6d4f401fe60950d415d1a8180a166f4898d5bff55a259e75011c6de7356f98d5e6700e670a8a15b516fbb65a10e2030c0c97e2f8549dd121a754f73e43906a026375e7d650106d83b591fa0c0d6ede4b70de6d4d87fbd92b0c6ef6c8abea2bb0ed67d4ca1bfd0692e6af356c42de265bd4c065f04dcc8d8e170eef9ab71f5279133a8dd85ca51fd59e741f0b11ea7ac86abfabb0862a5afb4691a365120083cb767c239226b96509bb1392050bff4fcdc7c1e6f15ba60af4d4f425e19ea3be9ccf06bd7648c42e248fc557b1dacc62105ed98b4ccedf5a159d313", 0xdb}], 0x6}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000045c0)={&(0x7f0000004400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x7, [@type_tag={0x1, 0x0, 0x0, 0x12, 0x5}, @enum={0xc, 0x8, 0x0, 0x6, 0x4, [{0x4, 0xf983}, {0xc, 0x101}, {0xa, 0x4032}, {0x10, 0x6}, {0x10, 0x6}, {0x5, 0x8}, {0x9, 0xbe}, {0x5, 0x7f}]}, @float={0xb, 0x0, 0x0, 0x10, 0x2}]}, {0x0, [0x2e, 0x30, 0x61, 0x0, 0x2e]}}, &(0x7f00000044c0)=""/233, 0x83, 0xe9, 0x1, 0x8, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000004600)=@bloom_filter={0x1e, 0x80, 0x9, 0x26, 0x21802, r3, 0xa7c1, '\x00', r4, r9, 0x5, 0x3, 0x1, 0x5}, 0x50) sendmsg$unix(r7, &(0x7f0000004700)={0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000004680)="90242c0d0edc670322fdb0f8119a383024f06fe39587fd56171e2ceb96ed0d2fb3545e596be14e12031a204321ef53a24af3f7fa", 0x34}], 0x1, 0x0, 0x0, 0x800}, 0x4004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004740)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000004d80)={&(0x7f0000004780)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000004c80)=[{&(0x7f0000004800)=""/200, 0xc8}, {&(0x7f0000004900)=""/241, 0xf1}, {&(0x7f0000004a00)=""/24, 0x18}, {&(0x7f0000004a40)=""/26, 0x1a}, {&(0x7f0000004a80)=""/148, 0x94}, {&(0x7f0000004b40)=""/222, 0xde}, {&(0x7f0000004c40)=""/11, 0xb}], 0x7, &(0x7f0000004d00)=""/116, 0x74}, 0x40000100) mkdir(&(0x7f0000004dc0)='./file0\x00', 0x10) sendmsg(r10, &(0x7f0000005580)={&(0x7f0000004e00)=@isdn={0x22, 0x4, 0x0, 0x0, 0xc}, 0x80, &(0x7f0000005100)=[{&(0x7f0000004e80)="9dffad958cb2d374bb705723ff169923be34422ed28155a413269d376e07345f3913b42f877d86873709beae6a0f4332fba653af00d4dc22e2e3230d4e902ddb072894313f2f66dd1219b21461b0b6fb400e143712388138e25b5b3eec9331aa97782588b12949f92a8c44cff6d809243c1b69dc43ff3033328bf2fecd77d82e38090397d81a19a8bd9c2e4a7856a7601c7bcbb5f878c3c01cbaa00255d54420ac6b1de887f388d1e0a6d00b3a52d3972a0f24e713ed549a7a68eeaad7aadab28ce9729fc50e804fab439bf45faa9ebcae3af60d51d1d875961a5615aa3d6a9a69ac4cd210bc6e1de358b2037b7cdb9f0b93d8dc8c8a", 0xf6}, {&(0x7f0000004f80)="9f4c2c2c41aa173423d49936393ebfaf3bf7f3b63e52ec1db573fc93046644713393405ca93c197b871da6b79b577d2ce6804ed2dca2318255446a77686ca09ff2f34f98d4d7", 0x46}, {&(0x7f0000005000)="f01e5ce9526db7f69bc5788dc76a4f7949b0b418389d14e559d4b0a7f1ccce592634dd69fc6477ffdf27897eddd9866173602cf164fd3cbb4a8df124e617c31f2e49170c0eff7cbf0fa4cb9729e9c03c3e94bb04282784249f5148284fb9fb54acf0a6675b58471a11b72082c1db0eba9ad03de54cf3b22fb8d4265a95f5867eb16eda0ae8248bab53170d1a15", 0x8d}, {&(0x7f00000050c0)="a71f80e912f836f9663a636da9da6dd067d34944c0023decb856f947ead4149a6d5bca66cc2529", 0x27}], 0x4, &(0x7f0000005140)=[{0x108, 0x107, 0x0, "28143ed1332a804dac2eb46477d3112d1902bcc2b2d1af926fa81bfbab85a9c471e40bfa10aea03454e4d318479e94af644cf594dc72d783f64072bba342fba65ffa872dc44a3df1279d90b987381a835c747120836569fd0fd663888df40d6c0959eb4acab0001087f9b5320e0f8b14374e2ebddd17ed3a91fbdeb2799c07fb6ab59c3557e2bd16ce2f1ef32ef1e39fcc5e35f9733011546e7dc322e13b4037390001fe2490c80f8bbf2827a03eb4a358fd4b522c585333424cfa87df7780f7feafac2f7fd211f05bf56e0b3d1aaf7da9208ee5494d3a20be7f399992cf946543de910bcdc55639865f4b0c05dcbcdeef0d2b"}, {0x110, 0x104, 0x7f1, "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"}, {0x100, 0x88, 0x4, "1a7651da02c1d99b46eadc84cec0e36f5336fe0a6c58dae337767b67f7ab1ad44aa0e7bb126c5c4e2deb1c7ce786e65535eb317379e9053af6ae2e5855d4630c4aa914c847d1cb6d665fb945ce3cf71e190d7dc3bd1fd220cc39dd0a5c115d6f5cc6461a403fc24ea28b648d1433d46495bc338a85159e865076c39986b96012d6037b8b038a57dcac44ea5a57589d0743c6e4637217c4078e4ebfeef5d22f4ebdb5fd964cc6e5a0a87b6844f2d6666f61ccc0b93268ab24f1cd632bf3f73473a3cc0371e7f99b3735172b75e2f89f593f19ed4cc37221b7fb8d179c8020262b760459c16f57662f6eee59a71c"}, {0xb0, 0x0, 0x9, "669d014e2d35b88a2b708cd9a4c2525467e619ef4fcae062bc456eaa9327fd48b912c6e1db347bf06242652759ffda6318fee7f424888691632185c1a53a4b06ee1ec2515f5a7991b41b8b25b7d3c5f50a17b38c1d668112cba38adb97bc9624031a325953cea99ba79d710bfb93b833bdf0e0197a0a1b2ae12f70b9338c7c757771b8388606c18d53c5a062d34bff090ec8f0769eb4a82ff58c32"}, {0x60, 0x113, 0x4, "7645e53d380bf17096927a320475472bc788f423955fd61c8edf57a49a73107ca9b95c0e327823196e1191f51f97badbeabab07c074b722b238e7e0dc98eb9ac4c925427bd74d08a8861"}], 0x428}, 0x1) socketpair(0x1, 0x80805, 0xfe, &(0x7f00000055c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005600)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000005980)={&(0x7f0000005640)="60cc00576dd2d8a51799413d5f6dabfd761fbfadc60513f608eb615a567d348e4ee49a6d59570e80212ef66e2c42f465de5896326bedf7b62814b118efdd9c7b78536d9b6b346b48112525ef7581162bcba0e8cba2628d35200ced16c33ff714dbbc513a00bcf649cc7217b47a9ea0fb3854bc1132edc0e85ad9313f42de6d0d3365b85e0444cf7af2a3d7a2603b8e4607c8b77237ea3aaaa2122c092f2f43072fcffa94", &(0x7f0000005700)=""/231, &(0x7f0000005800)="f108f69b3566ee440759b38f5d857be61c140d549e0fbeaa192e4bc28f787d33ce585154357dff55d22771437d9a5f955377b69daf4c6ecbc7b16628c1e98f514c51502221cb6317a823acf8aa9a8eb2d1a048a95d4cf8b1241e575aece11186f334853cfff613b8322fc65c2b80c26e076d2640cba4f3efbb254bc853412cc1768dcae357d951a038025372475e4b0291b3b49bed888ddba1504431cfd3eba305145b5404f67b52b6869952288fd197b68911fa43bc6617a6d7ea64b3ed90999ea1324f64afe7a0b15c", &(0x7f0000005900)="14b04e84e358057a38b7ce79bf2c644714b60374d8ddb4ea68a0eb98764ee55e49850eceb8d1d0f5c2d3843d2ee4f023c0b163a07fced09117522ed8085d736585669dfae694288bb8", 0x3ff, r5}, 0x38) recvmsg(r12, &(0x7f0000005d00)={&(0x7f00000059c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005a40)=""/47, 0x2f}, {&(0x7f0000005a80)=""/51, 0x33}, {&(0x7f0000005ac0)=""/168, 0xa8}, {&(0x7f0000005b80)=""/64, 0x40}], 0x4, &(0x7f0000005c00)=""/210, 0xd2}, 0x100) r13 = bpf$TOKEN_CREATE(0x24, &(0x7f0000005e80), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000005e40)={&(0x7f0000005d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@enum64={0x10, 0x5, 0x0, 0x13, 0x1, 0x0, [{0xf, 0x9, 0xffff6912}, {0xe, 0x6, 0x10}, {0x10, 0x7d, 0x4}, {0xc, 0x2f, 0xfffffffa}, {0xb, 0xa, 0x6}]}, @const={0xe, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x30]}}, &(0x7f0000005dc0)=""/88, 0x6f, 0x58, 0x1, 0x8, 0x10000, @value=r13}, 0x28) sendmsg$sock(r12, &(0x7f0000006680)={&(0x7f0000005ec0)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x80, &(0x7f0000006540)=[{&(0x7f0000005f40)="db52cc7164fe48ad5be669ef364bc5ca5298802ec423862896221c3838736f1d0d5ff5cc3a7638a211802fbc328c9c6c8e677f4192fb1f8339d284f25d971f35b089b4f803b49aba4eba5a7e5a60814f736be6a1e8efe4b5c3f23dc2b72780c04379770b05ebf98832cb3f44f3f4ffa55bbeefccf0c28c8f5fc4122b13aeb3613253ca8002c9ddae1190ca126bd5bb93293778b9860d1ef5ab708084f2bbae317ffb57c161eca9974b1035303e887d4f7fbed876402f53cc84617efbbf7f6dd35b724d13d4f834329e45157cf607122e7c77b8ba6fabb572932057d349fe0726340f3e7ea462d708933a45445fb5dc6c", 0xf0}, {&(0x7f0000006040)="2374cb0e8400bb8b0f696d807c61aa7a006ddb9286d2d0a6ca34f57848c8b807b6d904eae124a9cbc839bb5a9383236975f097a7c3577a133ff9e9d7109ddb2f86e38da511ab6ff4954198299653228f0bf9e98e2f1899289fec1d332f23b4e180dbf8b17ddf6f76b39f4d11b99313e9025f5912cfe7c2800f1fa92bb086cbacbe74ae68f7c9074bd7166e79708a67e9fca76ba2ab83f59c2e642d4a2fc18c48bf70a3e94d470072ad60ebf0d52596a2684869", 0xb3}, {&(0x7f0000006100)="f08d496f5f87720adbb4d4ef226d0eaece1a9ade9792eb1c2ae337eb276c6ce505da9dfc501178f47e271d3f5feb6ca2c3cfd9b196fbc56b3608b12032276096ec9350137311dc3c2bcd363880879d757037a00139a7d0615e1391d6084d1c90b41dbf7aab153d2e87f6e559fe29936a7ff4c23a5e5d94ac7e323718951271e5cf63f938a96658d7bd0b65365253f7a4e8ed3882c68751745ca114f4b6310eea71c3b1c738177b0bd857b3cf06fc32729cb96714c00d0f81ef25457e24a60c64495fadfe641863521442ad26e682a9f203fab8838fc6390f7b97e734ad517a78f9c47d63b2db07d70aa87cf7c7eedb", 0xef}, {&(0x7f0000006200)="fac58462fbb876844b740b5e3807a27ecc0ee23b64410b388b572d1e6c922db24470ef1fcaec81e7b9bfe9ab9fdaed120e8ede3deeaa0bf6d4fa77b7cc31f731ee4cafb143ccbeff29e71d0dfdfc6cd53aae6d2925fce3ef8ebe3f27d3d11670860cc1a490d794ec2f23e117d2adaba176297f88268e3ad453c02ad4d17d0eb0dc3fe77f70af7b9acadd8d31c8d880fcebc94d8cd90b6539a2e3ce08a6923da2adf83fcf9a68163bb0c70e5ae731e92c4cee5f33c6fe277f16df023b32ca76802c1f48b5782585d9c58e628dcf031967ee5d8c09d6c888a5ff4a6805cbb63011996859f89b87bc89", 0xe8}, {&(0x7f0000006300)="aad9240543f3a15a9f64143f027a74d9befce96c8e05168d492e2a6716a26586f70774a5a7d517f9b385af9af65f4425883da87e551d1a1f9bce782b0e97e56afc062e123dd2ed9ca0a696993f5b6728e175a726c5287d074fc75594079e3f9c223bc1cd25951b97df73d0147e70cdd16a55fd6f1936269f434ebb9f4c38f867df17c35e5fdfe69334af6c8b68dc5290f0c5a0c845800dbc6aa5517272bf7b2c96bad758acac2c506074efd799da29c8fad38ca759ae82c512f70f141659d40b2e9e92258db520091b0cc5354d", 0xcd}, {&(0x7f0000006400)="abd05869892d86962f942411b8551e2d1ecbe7e735fad83486e3001b6a32c4b8f5f74ff7dba14cba20b655fac0be955dd9eb9a19294942cfb1d0589321c08599c54ec1113ec6ba29ac13c0b653f631", 0x4f}, {&(0x7f0000006480)="6eac1e563e2d085407821be5a962b869a32e0dbb9524083574d4df7583eb32ec87082b54823282eee3bad8347d6713ee0a29cbc062b4d5b0212d807408b8a2596e6ca429db580f27d2fe10ff662e779f43aac8eb1a7d9298e9545ff27b2b0972f77b3b27186104855af32aa36517d4714576a2d0cf055d2031534427c6fd30cbb3b3d7d35e4baa15b048466c3632f8c7b20846f95cde942c32ee0180f737c6f73f62e2081babeb0f", 0xa8}], 0x7, &(0x7f00000065c0)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffff}}, @mark={{0x14, 0x1, 0x24, 0x84c}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0xa8}, 0x4000) 18m12.447940413s ago: executing program 36 (id=7997): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2d, 'net_prio'}, {0x2b, 'rdma'}, {0x2d, 'devices'}, {0x2d, 'cpuacct'}, {0x2d, 'freezer'}, {0x2d, 'cpuset'}, {0x2d, 'io'}, {0x2b, 'io'}]}, 0x3b) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x7, 0xc, &(0x7f0000000500)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='svcrdma_post_recv\x00', r1, 0x0, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8c}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x10}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000004c0)='timer_expire_entry\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x4200c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00@', @ANYRES32=0x0], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000cd00b222d7e76441e158365e3f000008", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000080000000}, 0x400, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x4000, 0x0, 0x9, 0x0, 0x80000000e}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5bf) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3d6}, [@ldst={0x1, 0x2, 0x0, 0x2, 0x1, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0xfffffede}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_devices(r9, &(0x7f0000000280)={'a', ' *:* ', 'rm\x00'}, 0x9) 17m40.203025747s ago: executing program 37 (id=8036): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x8, 0x7fe2, 0x1}, 0x50) close(0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x80, 0x5, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1a00000004000000040000000a00000000000000", @ANYRES32=r2, @ANYBLOB="ff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000100000000000000000000000000000000000000585017d1c991f7bd98c0d44c02260dd28200c2056832e1607beb2ac3120ae46206ff93995c99c7b627be8f9aa59a5278a687d06012513ffc31f5738d7ef1ad60073d3e2d225bf45bc76b283be266d304c0df4076f35788af80b2c39109f0e7da2c291dc29352dcfdf83be98d98d7514a6931a4ba26cc5d935680f175decfb4108b7594f9db9323edc866"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='fib6_table_lookup\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000086000001"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r7}, 0xc) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x10) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2800000}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000170000000000000000000073010500000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x80) 17m40.176946799s ago: executing program 38 (id=8030): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001940)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000008200000095"], 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000080)=@framed={{}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffb}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r10}, 0x10) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.numa_stat\x00', 0x100002, 0x0) 17m40.176731229s ago: executing program 39 (id=8033): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0xb) close(0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x201, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x5, 0x3}, 0x40, 0x0, 0x200000, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 17m40.1685066s ago: executing program 40 (id=8037): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 17m40.143499961s ago: executing program 41 (id=8029): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRES8=r0, @ANYRESDEC=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000010010000100100000000000000000000000003000000000400000002000000040000000000000004000005030000000700000001000000080000000c00000003000000040000000b00000005000000e10d00000c0000000100000000000000020000000000000c030000000b000000060000060400000001000000e29b00001000000009000000100000000000000004000000050000000c000000030000000d00000009000000010000000000000b050000000800000004000005030000000200000005000000040000000900000001000000030000000500000001000000020000000f00000004000000090000000d0000000000001101000000060000000b00000000000001000000003f00660008000000000000090300000000302e305f00"], &(0x7f0000000200)=""/57, 0x12e, 0x39, 0x0, 0x4}, 0x28) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400feffb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='timer_start\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0a1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32=r5, @ANYRES8, @ANYRESHEX=r7, @ANYRESHEX=r0, @ANYRES16, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff8500000010000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071122c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8982, &(0x7f0000000680)='\x9a\x81\xf1U\xd4\xa1*\x90') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x75}, 0x0, 0x20001, r4, 0x1) close(0xffffffffffffffff) close(r8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) 16m15.070801623s ago: executing program 42 (id=8887): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffebe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0xa7bd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dce", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/time\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) socketpair(0x2b, 0x800, 0x1ff, &(0x7f00000002c0)) 15m57.975515188s ago: executing program 43 (id=9251): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff92, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xa, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0x4, 0x5}]}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0x101, [{0x6, 0x2}]}]}, {0x0, [0x30, 0x61, 0x2e, 0x5f, 0x0, 0x5f, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/164, 0x56, 0xa4, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x300d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x108000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xa004000, &(0x7f0000001b80), 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 10m39.673770769s ago: executing program 44 (id=12559): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0xb6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x32, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1a, &(0x7f0000000200)=@framed={{}, [@map_fd={0x18, 0xb, 0x1, 0x0, r3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000000)='GPL\x00', 0x9, 0xd5, &(0x7f0000000300)=""/213, 0x40f00, 0x4, '\x00', r4, 0x25, r6, 0x8, &(0x7f00000007c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x0, 0x1, 0x7fffffff, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0, r0], &(0x7f0000000880)=[{0x2, 0x2, 0x9, 0x6}, {0x3, 0x4, 0x6, 0x8}, {0x3, 0x5, 0xd, 0x1}], 0x10, 0x3ff00000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10m39.643239621s ago: executing program 45 (id=12554): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000010000)=ANY=[@ANYBLOB="1800000001000000000000000000000063010400000000009500000000000000587cef8e11908f87e4a058"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x523, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x1, 0xf, 0x0, 0x800}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0), 0x10, 0x3}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) 10m39.642907431s ago: executing program 46 (id=12570): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000b00)=""/243, 0x2f, 0xf3, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac141416441805034d2f87e5940c05ab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x121400, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000300)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400ea00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="1e030800"], 0xffdd) 10m39.596674635s ago: executing program 47 (id=12561): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1a00000004000000040000000a00000000000000", @ANYRES32=r0, @ANYBLOB="ff7f000000000000000000000000000000000000524d27b7494d2e6089a1316410235311d6331c5274bb0a3c20d231bae632cc3b010033a1d67da72b0403c57d629ea61da81b61b280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000100"/28], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000007755fb3b73a3e59200"/36], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000b000000cc000000e80000001f319b1f7f168448d75269f38fc09dcacdddfc7adb743250e39ffbcb83c70e5a16097c8c6eea17b8654138b641ba902ca9c19d6f4f566a0313b80e5df4a3d5b263cff10cc4d82ab1d9002afad9f7466cba8d57481ba0ec8e211a311b6f2827b008791366d2125d40644b52b67d47c9be65cc6e092c16fa2465edd1d6f594c7e54c7a1af7bd937fcc2f18fb22fe0e707be75865c3d696743a2002ad81a8cd0960479dad678111726986d35cfd32414739c595ec464ce7d07b48b9ec1ef4cf94d68c8f2c79e3a4c07788c78069e15c151a404a2b6f1458ab3465be2ede274c8d9440631a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000880), 0x300, r5}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640), 0x0, 0x6, r5}, 0x38) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'wlan1\x00', 0x4000}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x44c04, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYRESOCT=r1], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x24004810) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) 10m39.596155465s ago: executing program 48 (id=12560): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="04000000000000000e0000000000000008e000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x1, 0x7fe6, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000017a4d2fb0d8d539fac6f83b0f2a8000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0}, 0x94) openat$cgroup_ro(r1, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0xfffffe91) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1900000004000000", @ANYRES32=0x1, @ANYBLOB="0000000000000900000000000000000000010000d1294f7b63e9ba89e6ac4269ffebb80c88d0d89fe755a07c235afefc1f430f7174b4cba90996e02cc002c13ff4f571dc096a86dc40f11fa1ee6ce5bd8d0ffd94a1eedfe04599a44d7ce85077f71c5f3c8058502d87d29c197701e2dda1c0bf73db91bb0d8b9e1401d43a6ebe71c169d6734dedd2bcbc751b837a3d252d02c0aab7f9fa3de21950766d0972fb744d7c50d1d4e0c98be747a3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 9m28.052628753s ago: executing program 49 (id=13065): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) (async) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1a9) (async) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1a9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) close(r0) (async) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000340)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r7, &(0x7f0000000340), 0x0}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) gettid() (async) r9 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x5a, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r9, &(0x7f0000000280)='ns/user\x00') syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 9m28.038590645s ago: executing program 50 (id=13059): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000200"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x702, 0xe, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000010000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000003c0)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0xb4, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) recvmsg(0xffffffffffffffff, 0x0, 0x40000140) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) 9m28.014029406s ago: executing program 51 (id=13064): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000001c0)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x3c, &(0x7f00000006c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f00000008c0), 0x8, 0xdb, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYBLOB="000000f6ffffffffb60200000200000d74670d008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x3, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='sys_exit\x00', r5}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000001d00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0x10, &(0x7f0000000740)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {0x5}, {0x7, 0x0, 0x0, 0x0}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}, {}, {0x85, 0x0, 0x0, 0x31}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000bc0)={'pim6reg1\x00', 0x200}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 9m27.987060659s ago: executing program 52 (id=13045): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000200)='syzkaller\x00', 0xa4fe}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r3}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085", @ANYRESHEX=r0], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe30, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000400)={'macvtap0\x00', @multicast}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000001a00)=ANY=[@ANYRESHEX=r4, @ANYRES32, @ANYBLOB="0100"/20, @ANYBLOB="a44090d18b9108e1bbaba8bbba8c15625a35b78aa220daf0aa3700a2d4f8e5212f50fcbab297b7e0e2811e0ad16d2bd0f2ca6b2e8d44bbd8c6310ed586b80c725a876aa3", @ANYBLOB="cea5dbd0120804c24001cdf5d2297c2d2a1737f6d258acf379b7c697792c9873495785c34974adca071b2331fa1f542815b5d0321c892f2f0ebdcc8836183ddf65fd27ddd8de203b6ec9c7d9a11a33fa502c7b0a38d4b9bf726933bf854d89c1e69369099abcc781ef4eadc3f418b283d184c2e41eedafbe8974454d8f79a7f7dbe52a595ac42894cbd43de298dae55512da5f749c266a75606674df98d74a265a7576b44d218c81b812f27d8006a7879e009025b623626f8af215a39ef9bff846c22b5d5afec73a20f8b85fa5a21ead7065e245808bff00f88aa5113fcbaf0710b327a6c649eeb041695fa2aba9eb821c13f57783aa8fa63b1bf27940bbbbea53d5c23e7354a77583750944ebdf0717e4266ca9adf1b50a55867d320afb6ff5b1532fb31ecbbd2e6a889d72bdd1ca61f19280e024126c09e53eb17b548c3ec38e78e811151dcb461c901826ef61a739de4c66e7d6eb27bd742de7ec95d1bb9b0a604bc85325df68400716d64807f9aba355a4ab756c", @ANYBLOB="00000000030000000400ee87c19a950c54800871c7e400000000000000000000000000001f8894fe028d400458267b14b4f308e8a2f42001ecbc41e19919b734eb096ba00ff1759a4c6bb264d6534e93df117dbb36388dbaa473ef2f40593b94be56f0695a6a5cf04d723652d9a18a1d46d11e67e66df0e815835c0004e0e428fedefa83bfa413"], 0x50) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r7) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 9m27.97217289s ago: executing program 53 (id=13057): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x40) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/net\x00') r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0x2, 0x6, 0x4, 0x0, 0x3, 0x248, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x20, 0x7, 0x447, 0x7, 0x10c, 0xa3aa, 0x0, 0x0, 0x9, 0x0, 0x8001}, r1, 0x3, r0, 0x1) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'vlan0\x00'}) r3 = openat$cgroup_subtree(r0, &(0x7f0000000240), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x2b, 'devices'}, {0x2d, 'hugetlb'}]}, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000002c0)='\'/.\x00') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000300)={'macsec0\x00'}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000340)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x24, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0x10, 0x6, 0x1000}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000580)=[{0x0, 0x3, 0x7, 0x5}, {0x1, 0x2, 0x10, 0x5}, {0x5, 0x5, 0x3, 0x9}, {0x2, 0x1, 0x0, 0x1}, {0x4, 0x5, 0x4, 0xa}, {0x3, 0x4, 0x8, 0xa}], 0x10, 0x4}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000007c0)=[0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x0, 0x30, &(0x7f0000000840)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x95, 0x0}, 0x8) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x10, &(0x7f00000006c0)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @exit, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @alu={0x7, 0x0, 0x2, 0x9, 0x9, 0x2, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x22b}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000740)='syzkaller\x00', 0x1728, 0x0, 0x0, 0x40f00, 0x80, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0x0, 0x2, &(0x7f0000000ac0)=[r0], &(0x7f0000000b00)=[{0x1, 0x4, 0x10, 0xc}, {0x1, 0x1, 0x8, 0x9}], 0x10, 0x100}, 0x94) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000c00)='devices.allow\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000c40)=r6, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000c80), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(r0, &(0x7f0000000d00)='cgroup.events\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000d40)=r8, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000d80)=0x1) recvmsg$unix(r7, &(0x7f0000001400)={&(0x7f0000000dc0)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000000e40)=""/175, 0xaf}, {&(0x7f0000000f00)=""/93, 0x5d}, {&(0x7f0000000f80)=""/60, 0x3c}, {&(0x7f0000000fc0)=""/219, 0xdb}, {&(0x7f00000010c0)=""/128, 0x80}, {&(0x7f0000001140)=""/35, 0x23}, {&(0x7f0000001180)=""/165, 0xa5}, {&(0x7f0000001240)=""/138, 0x8a}], 0x8, &(0x7f0000001380)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x100) 6m57.75298172s ago: executing program 6 (id=15004): syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001280)={&(0x7f0000001240)='afs_cb_miss\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)=@o_path={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x18) perf_event_open$cgroup(&(0x7f0000001380)={0x4, 0x80, 0x94, 0x5, 0x1, 0x3, 0x0, 0x4, 0x6ab5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000001340), 0x6}, 0x0, 0x3, 0x7868, 0x4, 0x2, 0x2, 0xfffe, 0x0, 0x645c, 0x0, 0x8000}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.idle_time\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, 0x0, 0x54) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x6, 0x4, 0x6}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)=r7}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001440)) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0xe, 0x4, &(0x7f0000001480)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}, @exit, @cb_func={0x18, 0xb, 0x4, 0x0, 0x7}], &(0x7f00000014c0)='syzkaller\x00', 0x1000, 0x8d, &(0x7f0000001500)=""/141, 0x41000, 0x10, '\x00', 0x0, @sk_skb=0x5, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x4, 0x6, 0xfffffffa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000001640)=[0xffffffffffffffff], &(0x7f0000001680)=[{0x3, 0x4, 0xe, 0x8}, {0x4, 0x5, 0x2, 0x1}, {0x4, 0x3, 0xa, 0xc}], 0x10, 0x2}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r9}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001780)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000017c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001800)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x50) 6m56.796214318s ago: executing program 6 (id=15014): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x8, 0x2c, 0x5, 0x0, 0x1, 0x200, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0xb}, 0xc0, 0x9, 0x9, 0x9, 0x0, 0x0, 0xfff, 0x0, 0x7ff, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00'}, 0x80) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x400}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="120000007f00000004000000ff"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r2, &(0x7f00000002c0), 0x0}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1e00000006000000020000000900000001090000", @ANYRES32=0x1, @ANYBLOB="0300000000000000000008000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000000000000030000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x14}, 0x108003, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') 6m56.795939628s ago: executing program 3 (id=15015): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x15, &(0x7f0000000280)=@raw=[@map_idx={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x36, &(0x7f0000000180)=""/54, 0x40f00, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x5, 0x8, 0x6}, 0x10, 0x217d3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000380)={r1, r0}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f00000003c0), &(0x7f00000004c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071101100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 6m56.77664005s ago: executing program 3 (id=15016): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r3, @ANYBLOB="0200000000000000b702000014000000b7030000000000008500000083000000bf090000841b00000000550901000000000095000000ad000000bf91000000000000b70200000000000085000000840000ee352bd4622d5ffe9600b700000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) (async, rerun: 32) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff5b) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x54) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x19}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x80) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) 6m56.740300062s ago: executing program 6 (id=15017): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x4, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000014000000e2900041f416b1db2a6b7e00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000067b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r5}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) r7 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='c(u&\'\'\t|\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000c5fd9a6f139c16ba093e3e2d606780a30223b7e08981ddc44664cbca25267c30654fcf84e40e5ff73702000000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000d2000c00000000000000bf91000000000000b7020000000000008500000095000000b7000000000000009500"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000740)}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000400)='ufshcd_uic_command\x00', r9}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 6m56.615521733s ago: executing program 3 (id=15019): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x2, 0xe9, 0x6, 0xf7, 0x0, 0x4, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x180a0, 0x9, 0xffffff7f, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x8}, r3, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 6m55.923386709s ago: executing program 3 (id=15021): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xedba}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5ff}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000280), 0x2, 0x0) 6m54.817343409s ago: executing program 6 (id=15031): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000c319b2afffba969b38cf4de343a00d1d011b97d0cb91b70fcb0f374ca29506a7ba68bbd0fc"], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x30, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x3, 0xff, 0x5, 0x0, 0x6151, 0x61000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x6}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x8, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10081, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x100) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) 6m54.81561001s ago: executing program 3 (id=15032): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x2, 0xe9, 0x6, 0xf7, 0x0, 0x4, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x180a0, 0x9, 0xffffff7f, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x8}, r2, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 6m54.81374168s ago: executing program 6 (id=15033): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, 0x0}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000110000000800000000000000000000003000000000100000002"], 0x0, 0x4e, 0x0, 0x80}, 0x28) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1", @ANYRES64], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="2b63707520f1796a0a96b5aaa356499c67417858ac6abf8e4908bb3d87ba9bd4d216e181830d1af715eefa10b586114b5272a603f7f95caa2a74f1376e25f8468513e1a3ed32ee8ec5b69aa1a1c7614922bba3ac897c2857e2578d82e94668a0e9f827ccff9cf0abf53206930079645c2371009970608c87cc7a67de8e8fbcd205df2a0fea90ea091fae6b"], 0x5) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) (async) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d64aa34d4236f3a28a3c4cecafd11885981b6388708f0789613be46592d079c548d64"], 0x5) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x17, 0xe, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETFILTEREBPF(r8, 0x800454e1, &(0x7f0000000040)=r7) (async) close(r8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6m54.749169505s ago: executing program 6 (id=15034): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000b437b5f200000000007ab73fcf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000500)="51ed5a691d881f9bf00b5cb6091166c2faa5367d567b01b72fcd2a818a73a4353fe941b7181ef9e8d7dfe160536fe927ea83e21ecba62397229478053d634d316246ede3d1fb49c86771a29f3d97e73c8c639736bec3324abb9b87cfb5beff85a3e802c75edb49c3d990c779ade712795520a9e0e7d47d5a8fb1ffc954fa879931d57bd61b80f5feabc3d87d5d0014766c4d1b", 0x93}, {&(0x7f0000000640)="29585ea95a90d566d7aae3d6480112395b136f32ecfb2855d030e4b84adccfabcc01222a4683588ba75f3bb5fa0e0e35cd04e6c7c661ecdbce68953f49f2e4f417710a2032a48471", 0x48}, {}, {&(0x7f0000000700)="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", 0xfd}, {&(0x7f0000000940)="ed3a03ebd6eacbf31ed68a34340b5352523844a4c07ca43078249edb213da461b0d3bfd6ca31a37ee85d806c186a9bc94e2884efa569600278cd70309cb0073543d529500f24e2ee20b61d644f937aef925af9e738735c85892897a95cc407aee7868a4219eab434f673fa21c0a97e73cdba7a390ef951fcbf466adb5239", 0x7e}, {&(0x7f0000000a40)="c231fac5006529beeaeb5693ad4b8b65c87649ce8187fe907ea27a894a802beb4a9a3369a507f4058191780c259c128b233a56833cd23d07ef6fe017893918cadf9d96a92f6375cc5581198f451136635a74f93b021c2e4c9339b611c3fe4d510464f8048cefd600d6353dfa45bc9c6fd3bcd685999856ca9caf4c76e17ea77ed311027510849dfa910eb505d96358c717936195307aa159f6806d0a7d0c668cae4cb3d7ad77cd86485483936b1a740d7cd4e10010b5fb0a8fbdbc211378a9ff1b2d6ab76ccb4cdd46360670e5a3eb2a5a47347041c867602bfb1e1d20918c55977a5ab2e44ca5d169e695986e3f640ea3662454", 0xf4}, {&(0x7f0000000b40)="94a064e01f3b6eeecb6aa3b0cbe4d374fa9ff0ccbb46f02ac7929e8cda0a38a434cf0a7765d49c33cab1ab14ff27f42684dbda272cc6556185325762a2bfeda598e5429b21f4f2b060700cc97e29e13e1491544e6bd9f5dcafd4994145c8dce89e2843f8e7c42fd7f57d5bccffaf20f69b8733437f24914fffae8e28a0a52286408f5f78bb402abc40a4c180a4843d3a94486d4ca1bdb0137cad0b9dc7ad45f2e287bcbc907d798b8305b60fae0dbf0e556c1f", 0xb3}, {&(0x7f0000000c00)="f4c806ab22112a00c63b896d22f05e48066fd755506eb002e0c91125302464ad1156bc57cd6470f76648e427fff405fc6490262e451e1f3c35e73deb5f30297173e3c5993c3ad65715c4c96f4407d23cd0f038cd793056f8978511150d7c4aba05bd164f59481a2be74c426bd08d7cc27c3400f1e2adb0bdf9585a5234590be0c42e8ec499e4875cac7d4e1c8537eb34753de71075714c57f4e319920703459f67c06bdba91bc3d026a1857f6da7875fb8e99ee0cf5e42aaf29bd2897ed6a6335094a06cc6294d86adb0753e01bc8dff507c9a9ae2f7cea8992707d2086b9e5852b5e07afa45bc76c24429042985d5dad67bf31943b4cd2b", 0xf8}, {&(0x7f0000000d00)="63a14c02a1b4dce5f8fff212ca3b0ca28e233005a34645cc6ba4269e19d6c612beab1c361be47642932cd5074858ab65c171a706e2558f2acd5a4375f49461d9f3dc05ce69542b", 0x47}], 0x9, &(0x7f0000000080)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0x18}, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r3, 0x4) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000007000000fc7f0000cc00", @ANYRES32], 0x50) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=r4, 0x24, 0x0, 0x5, 0x0, 0xfffffffffffffe30, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000e80)={r8}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6m54.69432503s ago: executing program 3 (id=15035): bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x18, 0x1, 0x1, [r3, r2]}}], 0x18}, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r2) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r6}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r7}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r8}, 0x18) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$ITER_CREATE(0x21, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) close(r10) 6m39.664817969s ago: executing program 54 (id=15028): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'vlan0\x00', @local}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r6, &(0x7f00000000c0)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m39.64954649s ago: executing program 55 (id=15029): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="290000fd02000000ab21ffecbb63e3b2f8000018210400475147403222a61900c7206dfac248b7e4393dd8f0c70ab579c0c9b0c80d9964e01d65bc84d06f8cc48d618fc244d81fc47a81698e09f6ed453aa1d83e64cfdc4250893049b75915310332cead2840f73b7063364b528ae71da321966f00000000000000d0f9cd4268521ccf8b15dcdc7916935ad7d8ab7f30930419694bc89a9b5a6f9a1d1a5e2800"/169, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000830000000700000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@ifindex, 0xb, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e010000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={@map=r5, r3, 0x16, 0x10, 0x0, @void, @value=r2, @void, @void, r4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) close(r7) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x7, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x1000, r9}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000bc0)={r9, &(0x7f0000000880)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8923, &(0x7f00000000c0)={'bond_slave_1\x00', @random="0134014030d9"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r11}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m39.627750541s ago: executing program 56 (id=15030): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x2, 0xe9, 0x6, 0xf7, 0x0, 0x4, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x180a0, 0x9, 0xffffff7f, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x8}, r3, 0x1, r2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 6m39.604183143s ago: executing program 57 (id=15035): bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x18, 0x1, 0x1, [r3, r2]}}], 0x18}, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r2) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r6}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r7}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r8}, 0x18) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$ITER_CREATE(0x21, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) close(r10) 6m39.563930617s ago: executing program 58 (id=15034): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000b437b5f200000000007ab73fcf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000500)="51ed5a691d881f9bf00b5cb6091166c2faa5367d567b01b72fcd2a818a73a4353fe941b7181ef9e8d7dfe160536fe927ea83e21ecba62397229478053d634d316246ede3d1fb49c86771a29f3d97e73c8c639736bec3324abb9b87cfb5beff85a3e802c75edb49c3d990c779ade712795520a9e0e7d47d5a8fb1ffc954fa879931d57bd61b80f5feabc3d87d5d0014766c4d1b", 0x93}, {&(0x7f0000000640)="29585ea95a90d566d7aae3d6480112395b136f32ecfb2855d030e4b84adccfabcc01222a4683588ba75f3bb5fa0e0e35cd04e6c7c661ecdbce68953f49f2e4f417710a2032a48471", 0x48}, {}, {&(0x7f0000000700)="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", 0xfd}, {&(0x7f0000000940)="ed3a03ebd6eacbf31ed68a34340b5352523844a4c07ca43078249edb213da461b0d3bfd6ca31a37ee85d806c186a9bc94e2884efa569600278cd70309cb0073543d529500f24e2ee20b61d644f937aef925af9e738735c85892897a95cc407aee7868a4219eab434f673fa21c0a97e73cdba7a390ef951fcbf466adb5239", 0x7e}, {&(0x7f0000000a40)="c231fac5006529beeaeb5693ad4b8b65c87649ce8187fe907ea27a894a802beb4a9a3369a507f4058191780c259c128b233a56833cd23d07ef6fe017893918cadf9d96a92f6375cc5581198f451136635a74f93b021c2e4c9339b611c3fe4d510464f8048cefd600d6353dfa45bc9c6fd3bcd685999856ca9caf4c76e17ea77ed311027510849dfa910eb505d96358c717936195307aa159f6806d0a7d0c668cae4cb3d7ad77cd86485483936b1a740d7cd4e10010b5fb0a8fbdbc211378a9ff1b2d6ab76ccb4cdd46360670e5a3eb2a5a47347041c867602bfb1e1d20918c55977a5ab2e44ca5d169e695986e3f640ea3662454", 0xf4}, {&(0x7f0000000b40)="94a064e01f3b6eeecb6aa3b0cbe4d374fa9ff0ccbb46f02ac7929e8cda0a38a434cf0a7765d49c33cab1ab14ff27f42684dbda272cc6556185325762a2bfeda598e5429b21f4f2b060700cc97e29e13e1491544e6bd9f5dcafd4994145c8dce89e2843f8e7c42fd7f57d5bccffaf20f69b8733437f24914fffae8e28a0a52286408f5f78bb402abc40a4c180a4843d3a94486d4ca1bdb0137cad0b9dc7ad45f2e287bcbc907d798b8305b60fae0dbf0e556c1f", 0xb3}, {&(0x7f0000000c00)="f4c806ab22112a00c63b896d22f05e48066fd755506eb002e0c91125302464ad1156bc57cd6470f76648e427fff405fc6490262e451e1f3c35e73deb5f30297173e3c5993c3ad65715c4c96f4407d23cd0f038cd793056f8978511150d7c4aba05bd164f59481a2be74c426bd08d7cc27c3400f1e2adb0bdf9585a5234590be0c42e8ec499e4875cac7d4e1c8537eb34753de71075714c57f4e319920703459f67c06bdba91bc3d026a1857f6da7875fb8e99ee0cf5e42aaf29bd2897ed6a6335094a06cc6294d86adb0753e01bc8dff507c9a9ae2f7cea8992707d2086b9e5852b5e07afa45bc76c24429042985d5dad67bf31943b4cd2b", 0xf8}, {&(0x7f0000000d00)="63a14c02a1b4dce5f8fff212ca3b0ca28e233005a34645cc6ba4269e19d6c612beab1c361be47642932cd5074858ab65c171a706e2558f2acd5a4375f49461d9f3dc05ce69542b", 0x47}], 0x9, &(0x7f0000000080)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0x18}, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r3, 0x4) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000007000000fc7f0000cc00", @ANYRES32], 0x50) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=r4, 0x24, 0x0, 0x5, 0x0, 0xfffffffffffffe30, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000e80)={r8}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6m37.126295086s ago: executing program 4 (id=15039): bpf$ENABLE_STATS(0x20, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffedf, 0x10, &(0x7f0000000040), 0xffffff95, 0x0, 0xffffffffffffffff, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xc69a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x44) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="740a00002f1a1c906910ac000000000095000f0000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) syz_clone(0x50800200, &(0x7f0000000100)="ae485a97b0be0d7b3d53b3bcaa482490afea5106d0f354cead3bc003f657fe1b026e478c10eeb57794a7cee5401a91d391ea99f8bcd7ba551fa3d72e3901deb4b1a4f6675fb6434b5e6c8916defbe0fc77a83c5a5c6860492174f37524b50675e216393bc063fe0de3487b3a39e3b50e3589416e707b5995e009238c56f3d02891b2fe2503830a273b73cc46a297c03c6b554bbf4834c43d85eb099ecf211dfa97a93930e55d2fd133ff46f9cc78c745fc84eb997abb9bab8c7b9f5c49a50a27579168", 0xc3, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)="84a45de79d6e42ba82788f3f02f63ee3d778fe7c07534142c705fa7f17891a039e7e141307e63fc5c04f14e38585fc3b793cfab745ca65e7986447d2dc1a099c92ee433a3ccafab15848fba6d852fe4eff594e8b6ca979ce102573a7b483345b89a9caf6f7633a423a2a6361097ade529766a0c8a955ac296ad50b09d407f12c7fd9277b109224741c3b3db8ab78df975e35b48f34e972d287b05deac67a6a4ac9ed595ef27879e29ff3b9810d89393c0ca6") 6m36.860090938s ago: executing program 4 (id=15043): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="02000000040000000700000009"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0d00000003000000040000000100000000000000", @ANYRES32=r3], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000730000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xffc0) 6m36.726942189s ago: executing program 4 (id=15044): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x2, 0xe9, 0x6, 0xf7, 0x0, 0x4, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x180a0, 0x9, 0xffffff7f, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x8}, r2, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 6m36.416398964s ago: executing program 4 (id=15046): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0xff58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000600000000000000369eb469ba8d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r2, 0x58, &(0x7f0000000fc0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) 6m36.141380696s ago: executing program 4 (id=15048): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) sendmsg$sock(r1, &(0x7f0000000740)={&(0x7f00000002c0)=@hci={0x1f, 0xffffffffffffffff, 0x3}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000340)="c253ea78f1ef58b14f2b80b0f7fc2d32b0a16b61236233ccc8de7382c7100a33a53394a2d58b97020978711770db5d7fd9bb72f69eab6083616ba45f1206988ee7d591e00ee7d7f407af0f39982839e3ec7d0c24ce659fa14b5f87fc4b8bdc10076bba16a7921942bfc767c9f0687740b1a88f233097b0e59608a788081a02153bd1bc2ad923144d1959431f2ae489cee668250481df06536e788cff993603eb45c4cb95dc3113409612caaafe846a6436fe3935e93ede906a20611cd24f7db2a992f59ff2c31e3a577f4537eee48266b7f6f7b16918373f54", 0xd9}, {&(0x7f0000000440)="8c67321bedc37e93714034cb6e804781a2cbfcf11797b54f83a0e542091d49b80f3ceba4853896944f54fffbe6e8e00b2f6a6cf44fb09437fbf7cf473ec3305cc910f31b0c11b9c495", 0x49}, {&(0x7f00000004c0)="4234c0eebeec39046ff44038c20679b808a8d6445cec6daf3643932a9cd4ada13f90ba028a0dfdbdfdc81703249185d60baf184641eb6293e44ebb53d1a6bf697e4156934b274d0e93109e29b9868c", 0x4f}, {&(0x7f0000000540)="30934cdf8006799da4914f287682484a6b1229f2c3bbba30b2b9499ddf0996dc3a4d2bd357fe450110fdb24d63e422e6cf9d9ac4617196636984d5993e09d5eec18e6d73528bd6b4c4af79a50fb9bd2e87a001c37022ef67", 0x58}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000000200)="55f8e49ee7c518e958338235469baa9acbb26da5b98058775c859c5204d7e5c687e2ccd59725179788f6", 0x2a}, {&(0x7f00000005c0)="c11286b09eaada4c0adac15d02e5a0f8d554826326bcd7d7d0517e327f0f2d79e8564dd096d97d4900e42a46d61933c175cdb133612ac361b378edc18f", 0x3d}], 0x7, &(0x7f0000000680)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x72}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x9066}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0xc0}, 0x24004451) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(r4, 0x0, 0x101) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) close(r5) write$cgroup_type(r6, &(0x7f0000000280), 0x9) 6m34.954598483s ago: executing program 4 (id=15054): perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x83}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) 6m19.802965142s ago: executing program 59 (id=15054): perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x83}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) 3m10.622363037s ago: executing program 0 (id=17535): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0c00000002000000000000008100"], 0x50) write$cgroup_subtree(r2, &(0x7f0000000000), 0x15) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="00fd0500000000000000000000135ede0073aad53ddf99bfc988000f68f41a492ceec5012e72f2d1fcf4f0ac3f971dd9a7c9d071e662314d7d17dc66160394f0a57bbd4de92cc2b066252b5216889ec240", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="000000000100"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40305828, 0x20000012) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffb, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3m10.428433273s ago: executing program 0 (id=17537): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x16, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4000000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xa}, 0x10, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x7a31}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000850000000300000095000000000000000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x7, 0x15, &(0x7f0000000d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5b2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000500)='GPL\x00', 0x6, 0x92, &(0x7f0000000e80)=""/146, 0x41000, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001340)={0x5, 0x4, 0xd0, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001380)=[r2, r2], &(0x7f00000013c0), 0x10, 0x4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0600000004000000080000000c00000040900100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="278ac386c9de4e79338add934d7ca1a09ecdd75760a7ce70c33d8e7b56abd2f1fb0e86c6c63c112db138a2ddbdc748d40320fbf8c3e0b23c15a53943d010b96387f15fa65ba5390f76fd66259c78327cf484e8a82869a37bfd0b4490becc8ce01bd9e78766b65a7f27421663b2bdb392d9b562d15a85bf151a2051beffd17cf59bca0cdf02dd80b9cde52bb5c6f4369c6ff95a86ed24d306f6b670b9cfaeff256f96da1476b88e378b13a2", @ANYRES32, @ANYBLOB], 0x50) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)=@o_path={&(0x7f00000008c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f00000006c0)=@raw=[@btf_id={0x18, 0x5ab5c5bcfd3fd963, 0x3, 0x0, 0x4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000740)='GPL\x00', 0x2, 0xc8, &(0x7f0000000780)=""/200, 0x40f00, 0x60, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x1, 0x8, 0x3, 0xca3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000940)=[r2, r2, r3], &(0x7f0000000980)=[{0x4, 0x2, 0x3, 0xa}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x11, 0x8000a, 0x300, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x601, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000001, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x12) socketpair(0x18, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="04e400200300000027221a060300005b56d332feae8df8c0000c000000", @ANYRES32=0x1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000010000000500"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000007b1198000000000046000000707c313f8e82fdc200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0xe, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r7, &(0x7f00000000c0)="dc51db34d7a5d84c3762da9bca9f05b5584ec542cf3f99990b6b0ef190950f147ae4335f919e7039da525af6f540de2cc67c12597417bb3a5515375fcbc111343cf0dbe851a073514904845b788dda667babe1f972aa27f8b905ec8812552932642b3675dc7dcda0efacb31dd8f39df99259f21366e2b5e02d78", &(0x7f0000000b00)=""/240}, 0x20) 3m10.241944668s ago: executing program 0 (id=17541): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000400)='./file0\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000711205000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x80) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 3m9.243670599s ago: executing program 0 (id=17553): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0xc101}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000000000008510000002000000d6000000000000009500007b0000000085000000180000009500000000000000f6fb1cd4c7e2fe423153968334d5c542b00a951ed3aa7ded88f9b5abd6cc5232895b0ded9c3132798928ccbcadcee4da46c7c206b1fa293ace38908b8be33756f24f2c782165e275b1a5f7dcab0dd9bf1d75086d9b6ff2e806"], &(0x7f00000003c0)='syzkaller\x00', 0x4, 0x92, &(0x7f0000000240)=""/146}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x204, 0x1020, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(r5) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) close(0x4) 3m9.027942097s ago: executing program 0 (id=17562): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01010001000000000500000001000000", @ANYRES32=r1, @ANYRESHEX=0x0, @ANYRES64], 0x18, 0x20000050}, 0x40000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000003c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd24}, {0x0, 0x4000}, {0x0, 0x21}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) close(r6) 3m8.495887051s ago: executing program 0 (id=17565): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffebe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0xa7bd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dce", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/time\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000340)}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) 2m53.364621288s ago: executing program 60 (id=17565): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffebe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0xa7bd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dce", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/time\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000340)}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) 1m46.29936943s ago: executing program 1 (id=18578): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) (async) r3 = perf_event_open$cgroup(&(0x7f0000000380)={0x2, 0x80, 0x1, 0x10, 0xe, 0xb, 0x0, 0x5, 0x22004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xbe81, 0x4, @perf_config_ext={0x0, 0x3}, 0x102000, 0xffff, 0x8000, 0x5, 0x81, 0xff, 0x100, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000400)='dvmrp0\x00') (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x5, 0x1c, 0x6, 0x81200, 0x1, 0x853, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x6}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x80000000, 0x7, 0x9, 0x60010, r1, 0x5, '\x00', 0x0, r2, 0x3, 0x4, 0x2, 0x7}, 0x50) (async, rerun: 32) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (rerun: 32) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) (async, rerun: 64) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff03c}, {0x6, 0x0, 0x0, 0x109}]}) (rerun: 64) 1m45.745228386s ago: executing program 1 (id=18584): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000a58ef22fac62c328c0cdd0a81db6cbba366a99ca14629b64651f85ef0e670d48e51a700cd54c06027205c6f236fbbbc4bc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000280)="8d3c407e64763dd1bbb5cba61fe08e2cb2be37723914f112631213d6a3d52c2ce2f738d2791ac959984fe02f910c3a69b8f09f29390a53e19a771fc62902c83d3b72ccfab271342dfd346731c0fc89dcc9dc5a85e5a8ce584a87fde00a0678ec8ea21f87ec33dbb78a8fc0b3a8374c0624b02de089ba4f4f208865c8e6576f3054914795b7ec860945964963e1abcc7a34f6dc1f4eb7ab5ff4b92fcadc42080062dd573e0c741458f2048360df687b62612ed5e454b7753aa914e24cd16c97"}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x8cc9a985cb12c40c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc48, 0x8000}, 0x100018, 0xc8, 0x4, 0x5, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYRES16=r3, @ANYBLOB="73f4cd7cee10262f57156fe7ca3ffdb26c97e8f450c2a47789ae121fa033d26bdf09fa7fbf3dfc02cbe16e65674f60b513b1f3819a9495c69c5eda3f02986ca5e4fad254180f1d2c93dc1bd81d58ef8aef1e05d41b11b35b00000000000000000000000000ab4888c6", @ANYBLOB="9c45cc59d3e626ecedc0f27e8d51f0e0f8ff4ac29750e53e2f6339271079e63c13a8851af6d3cf31040ba3febbc45ae6c4eec83c8c7b68a10c6b60b95f7cba1716b1991fdd3131f2b5a80663a3bd177a15ae8e34e3128f8662521a30f5ad1169699a6b016741438aac5936cb6693c34363ef9b37d2b804137bd26ac8c222d9435cd8388bca5e0a347b84eaae1fca0c3ca806a496a399d16b6775f31045db5407eba3895d4ced2f2f05d64a16f22f2558dddd1bdfa532c3bac60e74dabed331c2e753a32df472393810bc62cd4fc8519de9319e37a3ee"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r10}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r10}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0xffffff77, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1m44.915439913s ago: executing program 1 (id=18597): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000300)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70400000800000085430000950000009500004000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0xc456, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000003000000"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r8) socketpair(0x4, 0xa, 0x9, &(0x7f00000002c0)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r11 = openat$cgroup_ro(r1, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_subtree(r11, &(0x7f00000001c0)={[{0x2b, 'net_prio'}]}, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1m43.746425349s ago: executing program 1 (id=18612): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x40047459, &(0x7f0000001200)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 1m43.334406202s ago: executing program 1 (id=18619): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x87}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r7, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r9}, 0x18) sendmsg$inet(r8, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 1m43.333006312s ago: executing program 1 (id=18620): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x0, 0x470}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000900000000000000000000bfa200000000000007020000f8ffffffb703000008001a76b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(r7, &(0x7f0000000780)=0xf, 0x12) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r8}, 0x38) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r9, &(0x7f0000000340), 0x0}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x14, 0x73, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0x3, 0x4}, {0x4000003, 0x3, 0xb, 0x5ece48105434dadb}, {0x6, 0x2, 0x1, 0x5}, {0x0, 0x2, 0x3, 0xd}, {0x0, 0x5, 0xf, 0x5}, {0x3, 0x5, 0x0, 0x2}], 0x10, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r11, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x23, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c1", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESOCT=r2, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r12}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 1m28.283144193s ago: executing program 61 (id=18620): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x0, 0x470}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000900000000000000000000bfa200000000000007020000f8ffffffb703000008001a76b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(r7, &(0x7f0000000780)=0xf, 0x12) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r8}, 0x38) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r9, &(0x7f0000000340), 0x0}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x14, 0x73, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0x3, 0x4}, {0x4000003, 0x3, 0xb, 0x5ece48105434dadb}, {0x6, 0x2, 0x1, 0x5}, {0x0, 0x2, 0x3, 0xd}, {0x0, 0x5, 0xf, 0x5}, {0x3, 0x5, 0x0, 0x2}], 0x10, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r11, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x23, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c1", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESOCT=r2, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r12}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 2.100050198s ago: executing program 7 (id=19837): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.089755929s ago: executing program 7 (id=19838): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xff0f}], 0x1}, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r3, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, 0x0, &(0x7f0000000080)}, 0x20) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xb, &(0x7f0000000040)=ANY=[@ANYRESDEC=r5], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x2000000000000258, &(0x7f00000003c0)=ANY=[@ANYRES16=r6], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1f}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r7, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x7f) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2.053246581s ago: executing program 8 (id=19839): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20000000000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.963912349s ago: executing program 9 (id=19840): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2, 0x6, 0x10, 0x3, 0x0, 0x9, 0x10406, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x904, 0x1, 0x8000, 0xa, 0x2, 0xfff, 0x3, 0x0, 0x8, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x40000200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)="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") bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0xf, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x4}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[], 0x48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="07000000040000000800000001000038e0f781377d7b1b434bd047c8a1d6791cc385a35a2de78010995d79ab1392b43a5576606c9ad2d0d5c5522386e8e53abedfcc3dc5f9a9b4054b72494dd68381af82609e880c452f2a4b759954d336236e12605be93889f8d61f5003612aad6ffdefd82cb18e3d7337274ae19205182b826c944d24ab02dd853c1c877f802f6e9ef6539e22467db7cf61984070b06184a8156cfb149ed005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000066200000850000001b000000b70000000000000095000000000000001923f73c0d8d9e"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x3, 0x4, 0x3, 0x5, 0x20801}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t\x00\x00\x00\a\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0xc}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0xfff, 0x95, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r6, 0x11, 0x0, 0x0, @void, @value=r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0xc}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x0, 0x40, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r10, 0x11, 0x0, 0x0, @void, @value=r9}, 0x20) 1.961421119s ago: executing program 8 (id=19841): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r2}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r3}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00002000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r3}, &(0x7f0000000680), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000e73c63b8362d3900"/35], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000e73c63b8362d3900"/35], 0x48) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00'}) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r8}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 1.814059221s ago: executing program 8 (id=19843): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB="00002f268f7175865169755580b8db00"/25, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000a61a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000240)=ANY=[]) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001200a00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000080000000000000000000000000000000000000630ba714a0d8265ce98e20f433afd1a17df1affcc0590e9211e73358e6975ed0e6e408090000000000000021f8514a88d16803c9cabedca56e00000000000000"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000001d000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x14044, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x400, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.781661774s ago: executing program 9 (id=19844): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0d00000023000000040000000200000040000000", @ANYRES32=r1], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r2, &(0x7f0000000680), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdffffff8, 0x4, @perf_bp={0x0, 0xc}, 0x17191, 0x95f, 0x0, 0x1, 0x0, 0xfffffffe}, 0x0, 0x7ffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 1.670247293s ago: executing program 2 (id=19846): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$unix(r2, 0x0, 0x140) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x7ff, 0x9, 0x5, 0x8000, 0x1, 0x6, '\x00', r0, r1, 0x2, 0x2, 0x5, 0x8, @value=r2}, 0x50) 1.5878938s ago: executing program 9 (id=19847): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000000)="f798968425faad75bda34df3fb18b88c7139c5a21d3a98f0f966f071c12968ee52abcfbe394f1f73a357c015198b8f1d612e7fd25e3384503d5dc71309be6c49222b509614fdbafa6f887b126236f3828c2af2dec4216e4d35509a25af8dfb5872a31798b51377064fdbd7b88f1d7fed7894fd07e199b9d0fcd60c42bbe69120c2c7036924cbc2f25ccd3a53691628952735e698e4f151ee94f4449ffe559df46a45687429932850af73124e", &(0x7f0000000f80)=""/4096, &(0x7f0000000180)="85ec87f22021c62078df6195da6a9e92ade658a507173318d761c20b3c24d1c60b53a96e1c58982f01849edbfb397e834eb0d837b67ef6c31c5c1892d87938f42031a402610c717cff46dc9883d5f70bff8ff683af6dd0ab007f7d57ced0687e183fcd4186f4bee98d68fb47bc195c3bf8e4b1f435b363f81f5123f92e0479ce82fa1fc40c9d44d16eb96c0dff5268712ce2bd3099d7973f7d3d6c3380652034f27bdf47981f", &(0x7f0000000240)="82c3ea1849f7a8f7f469b0a735492548278285", 0x9, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="09000000040000000400000006"], 0x50) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000700)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000a80)=""/229, 0xe5}, {&(0x7f0000000b80)=""/189, 0xbd}], 0x2, &(0x7f0000000c80)=""/21, 0x15}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r4, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000000067c272d4d71dec2d6006baf829ea57c8b9ec364f15591ecc44a36b0aa6e2b6be6024e4f7605229bb3af87e0b4f53de04000000a835dc974e56deddbb597a1c81dc1b02e3d81f1b1f8ba8998c36b37726ab9c5d11d7ecf0f6fed18e09639edf0c75cc35bcb700c15689a1aa600880cad3cbbcf5298d4e05afd41b966a83b81358042d64439679381aeb863e332f39faaa33366233e4eae0d555bf2cdbb3c0e1f2670b648ffb0ff69441035d3d16e38bff97dae094a4b89ae078feb6b817768dbc56c22e6d0e9b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) syz_clone(0x640e7100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.57846183s ago: executing program 2 (id=19848): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 1.514438186s ago: executing program 5 (id=19849): bpf$MAP_CREATE(0x0, 0x0, 0x73) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup=r0, 0xe, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc, 0x7}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x2, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0x3, '\x00', r4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000006c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r10}, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r10}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 1.476500789s ago: executing program 2 (id=19850): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) sendmsg$inet(r0, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)}, 0x48000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000001000000000000000000000200", @ANYRES32, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ca216963424a56595b80c28e0000000000000000000000000000000000001547e5721402000000000000"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000001000000000000000000000200", @ANYRES32, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ca216963424a56595b80c28e0000000000000000000000000000000000001547e5721402000000000000"], 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1c, 0x4, 0xfff, 0x7}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1c, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000007000000080000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="000000000100"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000ffffffde0007000002000000008b57cef26664239fb0eba3000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="68e40000010001000200ba8ba25b8176138421d0d4a30435d96dbe77bf3f2f6c4835b833b60fbe6a338c86f84bad5ef13b345a9137fb82f5ac0b5ee890999cafeab0039d30c676504b5c427013db8aa2", @ANYRES32=r1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="050000000200"/28], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 1.34255037s ago: executing program 5 (id=19851): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x3, 0x4, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x51) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f00000001c0), &(0x7f0000000340)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) close(0x3) (async) close(0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="0500000003000000040000000900000000040000000000000000000051821454d5329f77df6f85e7696506756e88e46a69d5d965fcf43726b5ab913b5848f6831ae0e9866c6dc892d97c61073da82f0bbd2994d8f5f630ee02538ff6d319b3dc3975ea0e78232e5c23b5670af7b70fec1d8b9d6c9c40d49039dbaf6031a88a86258191496700c61a4e80751a3eb3984f993ffad79b4600"/161], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="0500000003000000040000000900000000040000000000000000000051821454d5329f77df6f85e7696506756e88e46a69d5d965fcf43726b5ab913b5848f6831ae0e9866c6dc892d97c61073da82f0bbd2994d8f5f630ee02538ff6d319b3dc3975ea0e78232e5c23b5670af7b70fec1d8b9d6c9c40d49039dbaf6031a88a86258191496700c61a4e80751a3eb3984f993ffad79b4600"/161], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xc, 0x9, 0xfffffffa, 0x40, 0x4000, 0xffffffffffffffff, 0x81, '\x00', 0x0, r3, 0x3, 0x1}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xc, 0x9, 0xfffffffa, 0x40, 0x4000, 0xffffffffffffffff, 0x81, '\x00', 0x0, r3, 0x3, 0x1}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0xfe, 0xfffff034}, {0x16, 0x0, 0x7}]}) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x8f}}, @const={0x4, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x6f, 0x5f, 0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/2, 0x45, 0x2, 0x1, 0x4000006, 0x10000, @value=r5}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x8f}}, @const={0x4, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x6f, 0x5f, 0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/2, 0x45, 0x2, 0x1, 0x4000006, 0x10000, @value=r5}, 0x28) 1.198871201s ago: executing program 7 (id=19852): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000003780)={0x11, 0xc, &(0x7f0000003740)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYRES16, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) close(r2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000600)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r11, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, 0x0, 0x0, 0x10, &(0x7f0000000480), 0x0, 0x0, 0xdb, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r12, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$sock(r13, &(0x7f0000003380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003340)=[@mark={{0x14, 0x1, 0x24, 0x6}}], 0x18}, 0x2000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003640)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000002540)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ldst={0x3, 0x3, 0x2, 0x7, 0x7, 0x80, 0x8}], &(0x7f0000000300)='GPL\x00', 0x4c, 0x1000, &(0x7f0000002640)=""/4096, 0x40f00, 0x9, '\x00', r12, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x4, 0x1000, 0xab}, 0x10, 0x2013e, r5, 0x0, &(0x7f0000000500)=[r0], 0x0, 0x10, 0xfffffffe}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.099934199s ago: executing program 2 (id=19853): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32, @ANYRESDEC], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.026555126s ago: executing program 8 (id=19854): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61123000000000006113100000000000bf2000000000000016000200071b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07276702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000331bcaabc9c549d173450e59c2f718481c056d9aa31ba84bbd8daf08420a98837f7d24b981d87c3609fedf52cf87561038b0e79e10c48ebf1b9be3eee9cb6132bfa9d5b3e2aa343b382d935d7004926caf6c389ac2ab8afaf691f76ac6521a484d80b54638f05254685c82434dde7647e34084e0f5dcf12047ca2ef20529731372f274f9327fe36a0e27d935d918725336919c86477933fb5e75418b427ce066d2624736f62a3c7d464f5cadde6c0cafc770303939b519a6235733e12749d8afc1331212"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) close(0x3) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000ff000000000000647a12180bff9339786b66319447cec6c69471e04781dfc53ab4a4808e599d11cabffdeb7c4dc6c3fb725a09efbfc3f9dc968e5520e1c60ee31e2cac1281038ad2712ae97d7d294ca19adcc86a3d014cb4597929c37ac91563e7017aef7615695fd410dab43946bca522326da88d7c70ac013b645c51bd1da0eea93b643d12277cf3af55fe1aff0b0b21cd67038b1125fd8383c383db236cfdd3bc397e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 912.137915ms ago: executing program 2 (id=19855): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000180000000000000003000085266db5e414f61e9659f1f5566085466a6b8d0fc98bd77670b47067401ed96f38cbf0e54d3baf30d5c5367cc07ea66077673e653473bcbc6d0165691391a1f5c6", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000600000000000000", @ANYRES32, @ANYBLOB="0000000300000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r6}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r7], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x15, 0x11, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18000000075cacf705000000000000000000000064fcf1b058a83219f20c6dd8227874708c6e067eb04e86ca62396e433a95700e64ad1ca95555bbb04eb8257a0c0c1f04aa2f1a1b32546f979b050476276ee49cd9f10a5036525887d9037c74cddecfa537e4efd99acf353272aacf409284e07c005488b40439e308257f0abde9ce90298c7cc9000000007b0863e81ce0ac73c2e241f9a5bb6f7f9e4b3def0a15ecfadd04d27e43a2d0ac6c10ba37ace3f24cbb3f134fc14bc231381cd516e8b8cf7944ebd5e7ee6a1e81cbd351dd7f2c8607e0fb", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185a00000d0000000000000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0xd, 0x18, &(0x7f0000000780)=""/24, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xe, 0x5, 0x1000}, 0x10, 0x0, r5, 0x4, 0x0, &(0x7f0000000b00)=[{0x4, 0x1, 0xe, 0x4}, {0x1, 0x5, 0x2, 0x1}, {0x5, 0x4, 0xd, 0x3}, {0x1, 0x1, 0x10, 0xc}], 0x10, 0x8d2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="d32c9ac5440000000000000000b50000000000000000000000000000000000000000000000000040"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 807.837603ms ago: executing program 7 (id=19856): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0x3a, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x18, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@printk={@u}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0xa00, 0x42, &(0x7f0000000400)=""/66, 0x40f00, 0x56, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0)=[0x1, 0xffffffffffffffff], &(0x7f0000000500)=[{0x2, 0x3, 0xc, 0xc}, {0x5, 0x2, 0x7, 0x2}, {0x0, 0x2, 0xb, 0xb}, {0x2, 0x3, 0x2, 0x3}, {0x4, 0x4, 0x4, 0x4}, {0x4, 0x5, 0x4, 0x3}, {0x4, 0x1, 0xd}, {0x2, 0x5, 0x0, 0xc}], 0x10, 0xb}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xa, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x8, 0x50, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}]}, &(0x7f00000006c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41000, 0x6, '\x00', r0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r1, 0xffffffffffffffff, 0xa, &(0x7f0000000740)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000780)=[{0x0, 0x3, 0x7, 0x5}, {0x2, 0x4, 0x8, 0x3}, {0x1, 0x5, 0x6, 0x9}, {0x1, 0x4, 0xc, 0x4}, {0x2, 0x5, 0x6, 0xa}, {0x2, 0x1, 0xb, 0x1}, {0x2, 0x3, 0x10, 0x3}, {0x5, 0x2, 0xd, 0x1}, {0x2, 0x1, 0xe, 0x3}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@ifindex=r0, 0x11, 0x1, 0xa, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0], 0x0}, 0x40) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a40)={@cgroup=r6, r2, 0x18, 0x18, r3, @void, @value, @void, @void, r5}, 0x20) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0xfffffffd, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x50) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000cc0)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@fwd={0x2}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x9, [{0xa, 0x7dc2067b, 0xfff}]}, @type_tag={0x3, 0x0, 0x0, 0x12, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x3, 0x2}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x2}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7, 0x4}, {0x0, 0x2}, {0xe, 0x3}]}, @func={0x3, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x0, 0x5f, 0x0]}}, &(0x7f0000000c00)=""/156, 0x99, 0x9c, 0x0, 0x5}, 0x28) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x127e, 0x0, r7, 0x5, '\x00', r4, r8, 0x3, 0x3}, 0x50) openat$cgroup_subtree(r6, &(0x7f0000000d80), 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000dc0)=r2, 0x4) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e00)={0x1b, 0x0, 0x0, 0x5, 0x0, r9, 0x7, '\x00', r4, r8, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r3, 0xe0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000ec0)=[0x0, 0x0], &(0x7f0000000f00)=[0x0, 0x0], 0x0, 0x9, &(0x7f0000000f40)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000f80), &(0x7f0000000fc0), 0x8, 0xdb, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r11, 0x20, &(0x7f00000012c0)={&(0x7f00000011c0), 0x0, 0x0, &(0x7f0000001200)=""/142, 0x8e}}, 0x10) openat$cgroup_type(r6, &(0x7f0000001340), 0x2, 0x0) close(r2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000023c0)={r7, &(0x7f0000001380)="57d1966699e436629f704e86afbb37ffe2d012e269", &(0x7f00000013c0)=""/4096}, 0x20) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002400)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x5, '\x00', r0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002740)={r3, 0xe0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000024c0)=[0x0, 0x0], &(0x7f0000002500)=[0x0], 0x0, 0x3a, &(0x7f0000002540)=[{}, {}], 0x10, 0x10, &(0x7f0000002580), &(0x7f00000025c0), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000002600)}}, 0x10) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002780)={0x1b, 0x0, 0x0, 0x8, 0x0, r12, 0x8, '\x00', r13, r11, 0x0, 0x3, 0x4}, 0x50) r15 = syz_clone(0x0, &(0x7f0000002880)="e84aa7c647ca8fc91936c3d39f234ee821cabcceedaf78cbd0955d7bb865e0f3489f27d741b8dc1b9cc7d2f484b07333406c2b4fb79d964a633f", 0x3a, &(0x7f00000028c0), &(0x7f0000002900), &(0x7f0000002940)="eac26a357225318f61ff624e731fb3a7d0f7353b2c91327bc59c3573200f988e39f119400cd31ea49148c14c07c5a5ef99b10b5c85d99c49fce67c76826fd67d6e61bb828beb5db6d1539e6e62a5d4719797ed75109f57107209883a34b87aa7e23e6beae682c50d5eec92561729ca4c9dbb10715dd6e2392d6fd8a3d2625624fbe668ffd23e72d753c57364e88e3087d30193da") perf_event_open(&(0x7f0000002800)={0x3, 0x80, 0x0, 0x8, 0xab, 0xff, 0x0, 0x401, 0x44009, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_config_ext={0x8, 0x3ae4}, 0x9080, 0xfffffffffffffff2, 0xffff, 0x3, 0x4, 0x4, 0x0, 0x0, 0x8, 0x0, 0x1}, r15, 0x3, 0xffffffffffffffff, 0x9) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d80)=@bpf_tracing={0x1a, 0xd, &(0x7f0000002b00)=@raw=[@snprintf], &(0x7f0000002b80)='GPL\x00', 0xfffffff8, 0xc3, &(0x7f0000002bc0)=""/195, 0x41000, 0x40, '\x00', 0x0, 0x19, r12, 0x8, &(0x7f0000002cc0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x2489a, r2, 0x4, &(0x7f0000002d00)=[r9, r7, 0x1, r14, r12, r7], &(0x7f0000002d40)=[{0x0, 0x6, 0xf, 0x6}, {0x1, 0x4, 0x8, 0x5}, {0x2, 0x1, 0xd, 0x7}, {0x5, 0x4, 0xd, 0xa}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002e80)={0x19, 0x1, &(0x7f0000002a00)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000002a40)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x25, r8, 0x8, &(0x7f0000002a80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000002ac0)={0x1, 0x4, 0x2, 0x5}, 0x10, r1, r16, 0x0, &(0x7f0000002e40)=[r12, r14, r9, r10], 0x0, 0x10, 0x9}, 0x94) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002f40), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003100)={0x0, 0x2, &(0x7f0000002f80)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f0000002fc0)='syzkaller\x00', 0x80000000, 0x22, &(0x7f0000003000)=""/34, 0x41100, 0x48, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003040)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000003080)={0x5, 0x0, 0x3, 0x44}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000030c0)=[r7, 0xffffffffffffffff], 0x0, 0x10, 0x7}, 0x94) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000031c0)={'bridge0\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x6, 0x6, &(0x7f0000003200)=@raw=[@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000003240)='GPL\x00', 0x0, 0x4d, &(0x7f0000003280)=""/77, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000003300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000003340)={0x0, 0xb, 0xfffffff3, 0x5}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000003380)=[r9, r10, r12], &(0x7f00000033c0)=[{0x5, 0x200, 0x10, 0xc}, {0x0, 0x2, 0xd, 0x7}, {0x2, 0x2, 0x6cc, 0x8}, {0x3, 0x2, 0xc, 0x3}, {0x2, 0x1, 0xf, 0x7}, {0x0, 0x2, 0x1, 0x5}, {0x4, 0x1, 0xb, 0x7}, {0x0, 0x3, 0xa, 0x6}, {0x4, 0x5, 0x1, 0xc}], 0x10, 0x60000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003580)={&(0x7f0000003540)='kvm_fpu\x00', r11, 0x0, 0x6}, 0x18) 802.916574ms ago: executing program 8 (id=19857): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x100}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x449}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) (async) close(r9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 795.480364ms ago: executing program 7 (id=19858): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x31}, 0x94) (rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700006b000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0}, 0x0, &(0x7f0000000680)}, 0x20) (async, rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x6, r0}, 0x38) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x1010, 0xc48}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x48) (rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r1}, 0x38) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r1}, &(0x7f0000000680), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x48) (rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c00000000140000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000380)='task_rename\x00', r4}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) close(0xffffffffffffffff) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xfffffffd, 0x0, 0xfffffffffffffffe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 707.749662ms ago: executing program 5 (id=19859): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000100000009000000ae"], 0x50) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xb000000000000001, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYBLOB="375fba75", @ANYBLOB="0000ffffffffe8ffff"], 0x48) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=ANY=[@ANYBLOB="0d00000002000000040000000240000000000000", @ANYRES32=r3, @ANYBLOB="1e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000011"], 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x2e, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 707.432421ms ago: executing program 8 (id=19860): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0xff58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, 0x0, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x2003) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xfe, 0x2b, &(0x7f0000000100)="b9ff03076844268cb89e14f0080047e0ffff00124000633a77fbac141416e000000194029f034d2f87e589ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x6b, 0x60000000, 0x0, 0x23, &(0x7f0000000000), &(0x7f0000001100)="60327540b67d670d2ccc7f8c6f1a994ecd4438fd3f7fc5d3f580e06effd413a37ffeed"}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) 706.934912ms ago: executing program 9 (id=19861): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000273d30058e58de943cbdf6b818ffe910000000a41d0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) sendmsg$tipc(r1, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000300), 0x2, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r5}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 550.159705ms ago: executing program 7 (id=19862): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x2}, 0x100860, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="5c000000000000000000000000000000006bbe00", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xc, &(0x7f0000000580)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000980)=""/70, 0x4}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYRES16=0x0, @ANYRES64=r2, @ANYBLOB="c4feda2e487d050eb2d4abcdc0774e75c565415fbffadccaa2a0aa60beabb56e00fe5f3a942d15875ee3ade4c6354c3bb4c421efc0eb2abfeb22fbe69577efeb7fecc74b1beac624adb32d3a31075063aa761fbeaf7cbe32adbee48151a2b6c1d1444b1f7f5c314af2fe0ff9ef0ca7dc6bf9b6a9bd64e943ccb07dac1b240555e8dd0add75b771c917f8af44f49365b2453f925a5170414d8d42a63ada88dce18bd8844690c836a52d395934580c267189e8790e2f1c115cc755c2532a1e6e8dfc70b08bc42c006c05052c45043a57b2e9239d", @ANYRESHEX, @ANYRESHEX=r5], 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x8, 0x9, 0x4, 0x6, 0x0, 0xfff, 0xa4f6e35545c750fa, 0x18, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xbd5a, 0x4, @perf_config_ext={0x8, 0x400}, 0x100, 0x4, 0x1, 0x9, 0x5, 0x2, 0xe03d, 0x0, 0x3, 0x0, 0x10000}, 0xffffffffffffffff, 0xb, r4, 0xa) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4}, 0x94) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8922, &(0x7f0000000080)) syz_clone(0x42100, &(0x7f0000000740)="b70c5e53ef8d3f45d7af1f083607e5ddaa493e28845d9318cb75a1b8f7b393bc60485df70abb832cedaac522c54cf8ccdfa9db80f6a2ff56f9758ca3b2dd5b6b90013f73d58f58b9249cd38fab6708999d57ab39573d174985183e2f1258b2c4e00cfb8c7e780929afb947a18aca65dc4c0b2ce8f49137db1667d55d9aa24583b6210ec872130f2f4737d7a553d042c377739632a84d52f7aca2d6e172076ee725d5c3123d2cdca8bc28103a0131e1941e17a8809935c0c8d5986063759832a8138955274a55132914f06ccde908dcc35c5109761ce799", 0xd7, &(0x7f0000000040), &(0x7f0000000200), &(0x7f00000002c0)="bef035339a1b0e478219bf3c153e0dfb3b3eb9a624973ac897d8b1600c130083d7c62dbf4f91dd47deca232e6dbc8c2d641620512b79dbe256368702e0703b351961b050d749f73ae3e6ce7d5c5a9401bcbcb556a4666d56b93283b50b80088f813731eb94b16d642d59") syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 411.507496ms ago: executing program 9 (id=19863): bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)='%pi6 \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r3, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x0, 0x10, &(0x7f0000000400), &(0x7f0000000580), 0x8, 0x19, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f00)={0x1b, 0x0, 0x0, 0xa6a9, 0x0, r5, 0x0, '\x00', r4, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x1dc0000, '\x00', r4, r1, 0x5, 0x1, 0x5}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x1, {{0x1, 0x2}, 0x1}}, 0x10, 0x0}, 0x460c4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='ext4_remove_blocks\x00', r7, 0x0, 0x1}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 158.952127ms ago: executing program 5 (id=19864): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x9, 0x10}, 0xc) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) (async, rerun: 64) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4a, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) (async, rerun: 64) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="002d3e58faad51bb0c8c00000000000000009731", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0xffffffffffffffff, 0x6}, 0xc) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x19, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x50}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000180)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0xc9d4}, @exit, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0x9, 0x1, 0x8, 0xfffffffffffffff8, 0x10}, @exit, @map_val={0x18, 0x5, 0x2, 0x0, r1}], &(0x7f00000000c0)='syzkaller\x00', 0x10001, 0xd9, &(0x7f0000000200)=""/217, 0x41000, 0x14, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xe, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000640)=[r3, r4, r5, r6, r7, r8, r9], &(0x7f0000000680)=[{0x0, 0x3, 0x2, 0x2}, {0x3, 0x5, 0x9, 0x9}], 0x10, 0x6}, 0x94) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 147.696817ms ago: executing program 5 (id=19865): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000000)="8cecdb43a69d49f24c69317634e908af3f6bd10b0616655bfce45dd10b781a5e625d270683bff140daf54783bb9c5b0af3", &(0x7f0000000040)=""/118}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, 0x0, &(0x7f0000000840)='%pI4 \x00'}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28622c52f1bc2e7d, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) (async) r5 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) 95.863831ms ago: executing program 5 (id=19866): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x684, 0x0, r2, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@cgroup, 0x2b, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz1\x00', 0x200002, 0x0) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={@cgroup=r11, r6, 0x1d, 0x201e, r5, @value=r12, @void, @void, @void, r10}, 0x20) 70.141514ms ago: executing program 2 (id=19867): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x8, 0x2}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r8, &(0x7f0000000280)='memory.swap.high\x00', 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000640), &(0x7f0000000180)=""/10, 0x2}, 0x20) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 0s ago: executing program 9 (id=19868): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000700002249417456", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): NGE): veth0_virt_wifi: link becomes ready [ 1222.981901][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1222.989918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1222.998318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.007282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1223.015406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1223.026159][T11993] device veth0_vlan entered promiscuous mode [ 1223.042348][T11998] device veth0_vlan entered promiscuous mode [ 1223.053860][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.062350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1223.085059][T11999] device veth0_vlan entered promiscuous mode [ 1223.093986][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1223.102714][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1223.119988][T11993] device veth1_macvtap entered promiscuous mode [ 1223.129118][T11997] device veth1_macvtap entered promiscuous mode [ 1223.142834][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1223.155164][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1223.163797][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1223.176145][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1223.190310][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1223.199241][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1223.220078][T11999] device veth1_macvtap entered promiscuous mode [ 1223.283755][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1223.297972][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.308465][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1223.317233][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1223.326027][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1223.334133][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.343148][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1223.354952][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1223.363460][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.376593][T11998] device veth1_macvtap entered promiscuous mode [ 1223.403816][T12019] device sit0 entered promiscuous mode [ 1223.453865][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1223.463169][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.471582][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.481475][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1223.490193][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.499424][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1223.531539][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1223.567177][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.612059][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.629373][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1223.847060][T12034] device veth0_vlan left promiscuous mode [ 1223.869210][T12034] device veth0_vlan entered promiscuous mode [ 1224.517138][T32356] device bridge_slave_1 left promiscuous mode [ 1224.527241][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1224.576421][T32356] device bridge_slave_0 left promiscuous mode [ 1224.641787][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.723700][T32356] device bridge_slave_1 left promiscuous mode [ 1224.751239][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1224.788318][T32356] device bridge_slave_0 left promiscuous mode [ 1224.808279][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.827269][T32356] device veth1_macvtap left promiscuous mode [ 1224.839991][T32356] device veth0_vlan left promiscuous mode [ 1224.846765][T32356] device veth1_macvtap left promiscuous mode [ 1224.853209][T32356] device veth0_vlan left promiscuous mode [ 1225.357376][T12065] device pim6reg1 entered promiscuous mode [ 1226.475274][T12086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.513797][T12107] device pim6reg1 entered promiscuous mode [ 1228.424874][T12130] device sit0 left promiscuous mode [ 1228.589781][T12130] device sit0 entered promiscuous mode [ 1230.600770][T12180] device sit0 entered promiscuous mode [ 1231.383940][T12198] device syzkaller0 entered promiscuous mode [ 1233.936059][T12244] device sit0 entered promiscuous mode [ 1235.626903][T12295] device syzkaller0 entered promiscuous mode [ 1236.736457][T12348] device sit0 entered promiscuous mode [ 1236.967072][T12363] device veth1_macvtap left promiscuous mode [ 1237.426944][T12385] device syzkaller0 entered promiscuous mode [ 1237.544942][T12391] tap0: tun_chr_ioctl cmd 1074025677 [ 1237.580295][T12391] tap0: linktype set to 778 [ 1237.626427][T12396] device sit0 left promiscuous mode [ 1237.709519][T12400] device sit0 entered promiscuous mode [ 1237.910169][T12403] device syzkaller0 entered promiscuous mode [ 1238.292945][T12420] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1238.481586][T12437] device pim6reg1 entered promiscuous mode [ 1238.900778][T12453] device wg2 entered promiscuous mode [ 1239.109885][T12479] device syzkaller0 entered promiscuous mode [ 1239.628671][T12516] device veth1_macvtap left promiscuous mode [ 1239.868173][T12537] device syzkaller0 entered promiscuous mode [ 1240.346438][T12566] device sit0 left promiscuous mode [ 1240.484575][T12576] device pim6reg1 entered promiscuous mode [ 1242.096291][T12632] syz.5.12734[12632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1242.096391][T12632] syz.5.12734[12632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1244.471216][T12711] device sit0 left promiscuous mode [ 1244.653049][T12717] device sit0 entered promiscuous mode [ 1244.939502][T12728] syz.8.12762[12728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1244.939588][T12728] syz.8.12762[12728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1245.128951][T12732] device wg2 entered promiscuous mode [ 1245.934206][T12775] device syzkaller0 entered promiscuous mode [ 1246.407496][T12809] device veth0_vlan left promiscuous mode [ 1246.451621][T12809] device veth0_vlan entered promiscuous mode [ 1247.506870][T12851] device wg2 entered promiscuous mode [ 1247.649356][T12859] device sit0 left promiscuous mode [ 1247.782960][T12862] device sit0 entered promiscuous mode [ 1249.244123][T12928] device pim6reg1 entered promiscuous mode [ 1250.320947][T12974] device veth0_vlan left promiscuous mode [ 1250.347394][T12974] device veth0_vlan entered promiscuous mode [ 1250.475477][T12977] : port 1(erspan0) entered blocking state [ 1250.491732][T12977] : port 1(erspan0) entered disabled state [ 1250.502855][T12977] device erspan0 entered promiscuous mode [ 1250.536041][T12981] : port 1(erspan0) entered blocking state [ 1250.542576][T12981] : port 1(erspan0) entered forwarding state [ 1250.886655][T13010] device syzkaller0 entered promiscuous mode [ 1250.936289][T13021] syz.8.12841[13021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1250.936391][T13021] syz.8.12841[13021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1251.399617][T13025] device syzkaller0 entered promiscuous mode [ 1251.506725][T13042] : renamed from pim6reg1 [ 1253.046116][T13092] device sit0 left promiscuous mode [ 1253.118041][T13093] device sit0 entered promiscuous mode [ 1253.295494][T13102] device sit0 left promiscuous mode [ 1253.407922][T13102] device sit0 entered promiscuous mode [ 1254.510164][T13140] device syzkaller0 entered promiscuous mode [ 1255.263160][T13161] device sit0 left promiscuous mode [ 1255.362415][T13167] device sit0 entered promiscuous mode [ 1255.956997][T13179] device syzkaller0 entered promiscuous mode [ 1256.016893][T13191] device sit0 left promiscuous mode [ 1257.057569][T13242] device wg2 left promiscuous mode [ 1257.169313][T13248] syz.7.12905[13248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1257.169379][T13248] syz.7.12905[13248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1257.220314][T13251] syz.7.12905[13251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1257.265922][T13251] syz.7.12905[13251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1257.775103][T13278] tap0: tun_chr_ioctl cmd 2147767506 [ 1258.440163][T13306] syz.4.12922[13306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1258.440237][T13306] syz.4.12922[13306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1258.491265][T13307] syz.4.12922[13307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1258.558792][T13307] syz.4.12922[13307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1258.594462][T13306] device wg2 entered promiscuous mode [ 1258.726300][T13314] device sit0 left promiscuous mode [ 1258.978891][T13323] device sit0 entered promiscuous mode [ 1259.585826][T13355] device veth0_vlan left promiscuous mode [ 1259.602568][T13355] device veth0_vlan entered promiscuous mode [ 1259.638468][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1259.652560][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1259.663376][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1260.430894][T13375] device pim6reg1 entered promiscuous mode [ 1261.388977][T13411] device syzkaller0 entered promiscuous mode [ 1261.598147][T13430] device syzkaller0 entered promiscuous mode [ 1261.822657][T13441] device sit0 left promiscuous mode [ 1262.513103][T13463] syz.7.12968[13463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1262.513215][T13463] syz.7.12968[13463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1263.091727][T13473] Ÿë: port 1(erspan0) entered blocking state [ 1263.109724][T13473] Ÿë: port 1(erspan0) entered disabled state [ 1263.116411][T13473] device erspan0 entered promiscuous mode [ 1263.150414][T13472] device erspan0 left promiscuous mode [ 1263.162754][T13472] Ÿë: port 1(erspan0) entered disabled state [ 1264.098608][T13503] device syzkaller0 entered promiscuous mode [ 1264.642214][T13522] device wg2 left promiscuous mode [ 1264.712052][T13522] device wg2 entered promiscuous mode [ 1266.500810][T13616] device veth0_vlan left promiscuous mode [ 1266.518131][T13616] device veth0_vlan entered promiscuous mode [ 1266.703277][T13627] device wg2 left promiscuous mode [ 1266.859104][T13630] device veth0_vlan left promiscuous mode [ 1266.878273][T13630] device veth0_vlan entered promiscuous mode [ 1267.283863][T13662] device veth1_macvtap entered promiscuous mode [ 1267.291038][T13662] device macsec0 entered promiscuous mode [ 1267.314881][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1267.819004][T13695] tap0: tun_chr_ioctl cmd 1074025677 [ 1267.826123][T13695] tap0: linktype set to 780 [ 1268.102780][T13712] device veth0_vlan left promiscuous mode [ 1268.141617][T13712] device veth0_vlan entered promiscuous mode [ 1292.886542][T13818] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.893897][T13818] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.901259][T13818] device bridge_slave_0 entered promiscuous mode [ 1292.908670][T13818] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.915854][T13818] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.923302][T13818] device bridge_slave_1 entered promiscuous mode [ 1292.932476][T13819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.939529][T13819] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.947031][T13819] device bridge_slave_0 entered promiscuous mode [ 1292.954270][T13819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.961323][T13819] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.968994][T13819] device bridge_slave_1 entered promiscuous mode [ 1293.030539][T13817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.037911][T13817] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.045789][T13817] device bridge_slave_0 entered promiscuous mode [ 1293.052883][T13816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.059942][T13816] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.067395][T13816] device bridge_slave_0 entered promiscuous mode [ 1293.080940][T13817] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.088013][T13817] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.095460][T13817] device bridge_slave_1 entered promiscuous mode [ 1293.106774][T13816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.114284][T13816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.121806][T13816] device bridge_slave_1 entered promiscuous mode [ 1293.164855][T13820] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.172176][T13820] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.179560][T13820] device bridge_slave_0 entered promiscuous mode [ 1293.190275][T13820] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.197516][T13820] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.205084][T13820] device bridge_slave_1 entered promiscuous mode [ 1293.272638][T13819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.279721][T13819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.287053][T13819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.294110][T13819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.353147][T13818] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.360215][T13818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.367656][T13818] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.374738][T13818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.415482][T13816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.422568][T13816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.429941][T13816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.437005][T13816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.457716][T13817] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.464816][T13817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.472366][T13817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.479402][T13817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.500114][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1293.508049][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.516166][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.523650][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.530896][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.538497][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.546069][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.553477][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.560923][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.591985][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1293.600101][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1293.608660][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.615729][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.623149][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1293.631295][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.638540][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.664352][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1293.683664][ T1018] device bridge_slave_1 left promiscuous mode [ 1293.689814][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.698171][ T1018] device bridge_slave_0 left promiscuous mode [ 1293.704758][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.712723][ T1018] device veth1_macvtap left promiscuous mode [ 1293.812186][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1293.820413][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.827751][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.835869][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1293.844185][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.851208][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.858611][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1293.867392][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1293.875671][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.882733][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.890237][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1293.899022][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1293.907362][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.914434][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.922109][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1293.930297][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1293.938636][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1293.946752][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1293.954982][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1293.963042][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1293.981913][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1293.989420][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1293.997249][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1294.006688][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1294.015498][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.022550][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.030223][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1294.038844][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1294.047108][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.054235][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.062000][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1294.084982][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1294.093785][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1294.102273][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1294.109822][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1294.117655][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1294.126153][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1294.134448][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1294.143407][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1294.152839][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1294.161257][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1294.177494][T13818] device veth0_vlan entered promiscuous mode [ 1294.192334][T13816] device veth0_vlan entered promiscuous mode [ 1294.203783][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1294.212486][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1294.220927][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1294.231287][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1294.239513][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1294.248350][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1294.256628][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.263686][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.271250][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1294.279311][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1294.287543][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1294.296270][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1294.305019][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.312271][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.319910][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1294.328066][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1294.336345][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1294.343922][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1294.355512][T13819] device veth0_vlan entered promiscuous mode [ 1294.367423][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1294.375859][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1294.384526][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1294.392755][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1294.400262][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1294.412897][T13816] device veth1_macvtap entered promiscuous mode [ 1294.428524][T13819] device veth1_macvtap entered promiscuous mode [ 1294.436635][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1294.445785][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1294.454405][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1294.462879][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1294.491056][T13818] device veth1_macvtap entered promiscuous mode [ 1294.505707][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1294.515009][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1294.523791][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1294.532511][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1294.541387][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1294.551058][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1294.564541][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1294.575372][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1294.583363][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1294.607713][T13820] device veth0_vlan entered promiscuous mode [ 1294.625185][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1294.636007][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1294.644807][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1294.653693][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1294.671904][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1294.680361][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1294.702438][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1294.711108][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1294.725092][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1294.733735][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1294.742633][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1294.751064][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1294.797406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1294.842100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1294.882419][T13817] device veth0_vlan entered promiscuous mode [ 1294.888919][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1294.917543][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1294.988084][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1295.014570][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1295.029209][T13820] device veth1_macvtap entered promiscuous mode [ 1295.088799][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1295.115836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1295.162174][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1295.205075][T13850] device pim6reg1 entered promiscuous mode [ 1295.302668][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1295.311248][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1295.333690][T13817] device veth1_macvtap entered promiscuous mode [ 1295.354912][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1295.373476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1295.387254][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1295.397046][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1295.406113][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1295.453203][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1295.472346][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1295.625472][T13862] device wg2 entered promiscuous mode [ 1295.676680][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1295.696039][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1296.670440][ T1018] : port 1(erspan0) entered disabled state [ 1296.727282][ T1018] device erspan0 left promiscuous mode [ 1296.758219][ T1018] : port 1(erspan0) entered disabled state [ 1297.656275][ T1018] device bridge_slave_1 left promiscuous mode [ 1297.663989][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.673843][ T1018] device bridge_slave_0 left promiscuous mode [ 1297.684236][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.696470][ T1018] device bridge_slave_1 left promiscuous mode [ 1297.702751][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.710501][ T1018] device bridge_slave_0 left promiscuous mode [ 1297.720920][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.729419][ T1018] device bridge_slave_1 left promiscuous mode [ 1297.735738][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.743385][ T1018] device bridge_slave_0 left promiscuous mode [ 1297.749546][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.758330][ T1018] device bridge_slave_1 left promiscuous mode [ 1297.764649][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.772249][ T1018] device bridge_slave_0 left promiscuous mode [ 1297.778409][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.787473][ T1018] device veth1_macvtap left promiscuous mode [ 1297.793965][ T1018] device veth0_vlan left promiscuous mode [ 1297.799956][ T1018] device veth0_vlan left promiscuous mode [ 1297.806157][ T1018] device veth1_macvtap left promiscuous mode [ 1297.812655][ T1018] device veth1_macvtap left promiscuous mode [ 1297.818685][ T1018] device veth0_vlan left promiscuous mode [ 1298.399142][T13911] device sit0 entered promiscuous mode [ 1299.332350][T13922] device veth1_macvtap left promiscuous mode [ 1299.522881][T13921] device veth1_macvtap entered promiscuous mode [ 1299.531158][T13921] device macsec0 entered promiscuous mode [ 1299.811821][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1301.034983][T13941] device pim6reg1 entered promiscuous mode [ 1304.505175][T13971] device sit0 entered promiscuous mode [ 1306.023277][T14024] device sit0 left promiscuous mode [ 1306.541735][T14045] device veth0_vlan left promiscuous mode [ 1306.551500][T14045] device veth0_vlan entered promiscuous mode [ 1306.643621][T14051] device wg2 entered promiscuous mode [ 1307.863837][T14118] device syzkaller0 entered promiscuous mode [ 1308.993629][T14163] device pim6reg1 entered promiscuous mode [ 1309.598131][T14202] bridge0: port 2(bridge_slave_1) entered disabled state [ 1309.605644][T14202] bridge0: port 1(bridge_slave_0) entered disabled state [ 1309.656153][T14202] device bridge_slave_1 left promiscuous mode [ 1309.665892][T14202] bridge0: port 2(bridge_slave_1) entered disabled state [ 1309.763509][T14202] device bridge_slave_0 left promiscuous mode [ 1309.807066][T14202] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.949488][T14237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.958718][T14237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1311.177377][T14242] device bridge_slave_1 left promiscuous mode [ 1311.187558][T14242] bridge0: port 2(bridge_slave_1) entered disabled state [ 1311.195447][T14242] device bridge_slave_0 left promiscuous mode [ 1311.201792][T14242] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.024771][T14286] !€ÿ: renamed from bond_slave_0 [ 1312.628076][T14308] device syzkaller0 entered promiscuous mode [ 1313.610027][T14335] device syzkaller0 entered promiscuous mode [ 1314.287234][T14357] device sit0 entered promiscuous mode [ 1314.959594][T14404] device sit0 entered promiscuous mode [ 1315.287658][T14422] device pim6reg1 entered promiscuous mode [ 1315.305693][T14423] device wg2 entered promiscuous mode [ 1315.467139][T14445] device wg2 left promiscuous mode [ 1315.533580][T14448] device pim6reg1 entered promiscuous mode [ 1316.357999][T14505] device wg2 entered promiscuous mode [ 1316.841089][T14532] device syzkaller0 entered promiscuous mode [ 1317.187078][T14541] ref_ctr_offset mismatch. inode: 0xe9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1318.040563][T14574] device pim6reg1 entered promiscuous mode [ 1318.773598][T14615] syz.3.13285[14615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1318.773702][T14615] syz.3.13285[14615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1319.942744][T14658] device syzkaller0 entered promiscuous mode [ 1320.026429][T14661] device syzkaller0 entered promiscuous mode [ 1320.075065][T14668] device pim6reg1 entered promiscuous mode [ 1321.828233][T14778] syz.6.13329[14778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1321.828342][T14778] syz.6.13329[14778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.294309][T14799] €Â0: renamed from pim6reg1 [ 1323.282044][T14876] A6±ÿ: renamed from team_slave_1 [ 1323.362136][T14882] device veth1_to_team entered promiscuous mode [ 1323.681151][T14890] device syzkaller0 entered promiscuous mode [ 1325.310814][T14958] A6±ÿ: renamed from team_slave_1 [ 1325.391102][T14966] ÿÿÿÿÿÿ: renamed from vlan1 [ 1325.627387][T14984] device wg2 entered promiscuous mode [ 1325.958240][T14997] device pim6reg1 entered promiscuous mode [ 1326.010557][T14996] device veth0_vlan left promiscuous mode [ 1326.040543][T14996] device veth0_vlan entered promiscuous mode [ 1326.093018][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.123445][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.191835][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.723891][T15029] device sit0 left promiscuous mode [ 1326.837005][T15029] device sit0 entered promiscuous mode [ 1327.263158][T15070] device pim6reg1 entered promiscuous mode [ 1328.371099][T15118] device syzkaller0 entered promiscuous mode [ 1329.224941][T15180] device syzkaller0 entered promiscuous mode [ 1329.492247][T15194] device sit0 entered promiscuous mode [ 1329.812120][T15222] device sit0 left promiscuous mode [ 1329.937360][T15222] device sit0 entered promiscuous mode [ 1331.407378][T15276] device pim6reg1 entered promiscuous mode [ 1331.684411][T15298] syz.3.13477[15298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.684520][T15298] syz.3.13477[15298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.759796][T15296] device sit0 entered promiscuous mode [ 1332.474519][T15329] device veth0_to_team entered promiscuous mode [ 1332.949439][T15352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.961335][T15352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.247783][T15378] device wg2 left promiscuous mode [ 1333.631236][T15390] device pim6reg1 entered promiscuous mode [ 1333.770517][T15389] device wg2 left promiscuous mode [ 1334.585623][T15420] device pim6reg1 entered promiscuous mode [ 1335.707141][T15475] device team_slave_0 entered promiscuous mode [ 1335.735187][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1335.752193][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1336.464736][T15492] device veth0_to_team entered promiscuous mode [ 1337.942275][T15562] device pim6reg1 entered promiscuous mode [ 1338.019047][T15568] syz.2.13559[15568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1338.022477][T15568] syz.2.13559[15568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.374366][T15622] device syzkaller0 entered promiscuous mode [ 1340.570458][T15657] device syzkaller0 entered promiscuous mode [ 1341.284910][T15662] device veth1_macvtap left promiscuous mode [ 1341.619167][T15672] device veth0_vlan left promiscuous mode [ 1341.653094][T15672] device veth0_vlan entered promiscuous mode [ 1341.698648][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1341.707200][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1341.721243][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1342.209459][T15727] device sit0 left promiscuous mode [ 1342.221350][T15728] device sit0 entered promiscuous mode [ 1342.490279][T15734] device wg2 entered promiscuous mode [ 1343.783254][T15770] device sit0 left promiscuous mode [ 1344.656377][T15802] tap0: tun_chr_ioctl cmd 1074025677 [ 1344.686368][T15802] tap0: linktype set to 768 [ 1345.777201][T15848] device pim6reg1 entered promiscuous mode [ 1346.676804][T15911] device ip_vti0 entered promiscuous mode [ 1346.792100][T15908] : port 1(erspan0) entered blocking state [ 1346.804505][T15908] : port 1(erspan0) entered disabled state [ 1346.830763][T15908] device erspan0 entered promiscuous mode [ 1346.877748][T15909] : port 1(erspan0) entered blocking state [ 1346.883982][T15909] : port 1(erspan0) entered forwarding state [ 1346.943339][T15924] device veth1_macvtap left promiscuous mode [ 1346.964212][T15925] device pim6reg1 entered promiscuous mode [ 1347.702976][T15994] device wg2 left promiscuous mode [ 1347.891427][T15997] device wg2 entered promiscuous mode [ 1348.486359][T16026] device syzkaller0 entered promiscuous mode [ 1348.757627][T16038] device pim6reg1 entered promiscuous mode [ 1349.014852][T16066] device pim6reg1 entered promiscuous mode [ 1350.548685][T16140] device pim6reg1 entered promiscuous mode [ 1350.835074][T16156] device sit0 left promiscuous mode [ 1351.253034][T16168] device syzkaller0 entered promiscuous mode [ 1351.333158][T16179] syz.0.13739[16179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1351.333250][T16179] syz.0.13739[16179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1351.485354][T16193] syz.3.13744[16193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1351.507710][T16193] syz.3.13744[16193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1351.925698][T16213] device veth0_vlan left promiscuous mode [ 1352.021193][T16213] device veth0_vlan entered promiscuous mode [ 1352.138193][T16232] device pim6reg1 entered promiscuous mode [ 1352.530683][T16248] device wg2 left promiscuous mode [ 1352.602073][T16250] syz.6.13761[16250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1352.602165][T16250] syz.6.13761[16250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1352.684861][T16248] device wg2 entered promiscuous mode [ 1353.580514][T16300] syz.3.13776[16300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1353.580620][T16300] syz.3.13776[16300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.084119][T16318] device pim6reg1 entered promiscuous mode [ 1354.265208][T16342] Q±6ã`Ò˜: renamed from lo [ 1354.353665][T16347] syz.6.13791[16347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.353761][T16347] syz.6.13791[16347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1355.129953][T16376] ÿ: renamed from team_slave_1 [ 1356.558450][T16433] device syzkaller0 entered promiscuous mode [ 1356.967476][T16482] bpf_get_probe_write_proto: 4 callbacks suppressed [ 1356.967489][T16482] syz.0.13829[16482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.989363][T16482] syz.0.13829[16482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1357.658613][T16535] syz.0.13843[16535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1357.687342][T16539] device veth0_vlan left promiscuous mode [ 1357.708243][T16535] syz.0.13843[16535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1357.725685][T16539] device veth0_vlan entered promiscuous mode [ 1358.379548][T16565] device wg2 left promiscuous mode [ 1358.420824][T16565] device wg2 entered promiscuous mode [ 1358.731647][T16589] Ÿë: port 1(erspan0) entered blocking state [ 1358.740797][T16589] Ÿë: port 1(erspan0) entered disabled state [ 1358.762272][T16589] device erspan0 entered promiscuous mode [ 1358.798516][T16580] Ÿë: port 1(erspan0) entered blocking state [ 1358.804846][T16580] Ÿë: port 1(erspan0) entered forwarding state [ 1359.281414][T16639] device pim6reg1 entered promiscuous mode [ 1359.341413][T16641] device syzkaller0 entered promiscuous mode [ 1359.452501][T16653] syz.6.13877[16653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1359.452602][T16653] syz.6.13877[16653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.148706][T16745] syz.2.13903[16745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.199006][T16745] syz.2.13903[16745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.597731][T16768] device pim6reg1 entered promiscuous mode [ 1361.739203][T16770] device wg2 left promiscuous mode [ 1361.749088][T16778] device wg2 entered promiscuous mode [ 1361.779351][T16774] bridge0: port 2(bridge_slave_1) entered disabled state [ 1361.788527][T16774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.188950][T16806] syz.2.13918[16806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.189093][T16806] syz.2.13918[16806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.269310][T16809] device wg2 left promiscuous mode [ 1363.037158][T16834] device syzkaller0 entered promiscuous mode [ 1363.328645][T16861] syz.3.13933[16861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1363.328747][T16861] syz.3.13933[16861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1364.571328][T16910] syz.6.13948[16910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1364.650331][T16910] syz.6.13948[16910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1365.512831][T16955] device veth0_vlan left promiscuous mode [ 1365.565881][T16955] device veth0_vlan entered promiscuous mode [ 1365.588992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1365.602537][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1365.618135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1365.637220][T16965] syz.3.13962[16965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1365.637320][T16965] syz.3.13962[16965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1365.661915][T16962] device pim6reg1 entered promiscuous mode [ 1366.141650][T16979] ÿÿÿÿÿÿ: renamed from vlan1 [ 1367.700219][T17048] device pim6reg1 entered promiscuous mode [ 1367.745710][T17040] device veth0_vlan left promiscuous mode [ 1367.782884][T17040] device veth0_vlan entered promiscuous mode [ 1367.998768][T17050] device syzkaller0 entered promiscuous mode [ 1369.013495][T17096] device syzkaller0 entered promiscuous mode [ 1369.377002][T17117] syz.0.14008[17117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1369.377095][T17117] syz.0.14008[17117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1369.480221][T17114] device syzkaller0 entered promiscuous mode [ 1370.089714][T17145] device veth0_to_team entered promiscuous mode [ 1370.831618][T17177] device pim6reg1 entered promiscuous mode [ 1370.884605][T17189] device syzkaller0 entered promiscuous mode [ 1370.977489][T17182] device veth0_vlan left promiscuous mode [ 1370.996094][T17182] device veth0_vlan entered promiscuous mode [ 1371.024605][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1371.042433][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1371.050049][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1371.096761][T17212] syz.1.14036[17212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.096869][T17212] syz.1.14036[17212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.783725][T17239] device veth1_macvtap left promiscuous mode [ 1371.816664][T17239] device macsec0 entered promiscuous mode [ 1372.003315][T17245] syz.2.14047[17245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1372.003425][T17245] syz.2.14047[17245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1372.803990][ T24] audit: type=1400 audit(1755638343.280:180): avc: denied { create } for pid=17264 comm="syz.2.14054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1373.326480][T17283] syz.0.14059[17283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1373.326583][T17283] syz.0.14059[17283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1373.434933][T17285] device pim6reg1 entered promiscuous mode [ 1373.715962][T17293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.157065][T17324] syz.6.14071[17324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1374.157160][T17324] syz.6.14071[17324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1374.688412][T17390] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1374.688424][T17390] syz.2.14087[17390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1374.711837][T17390] syz.2.14087[17390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1375.036126][T17420] device syzkaller0 entered promiscuous mode [ 1375.457454][T17452] syz.6.14105[17452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1375.457566][T17452] syz.6.14105[17452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1376.462064][T17518] device pim6reg1 entered promiscuous mode [ 1377.714674][T17600] device syzkaller0 entered promiscuous mode [ 1378.431449][T17633] syz.2.14152[17633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1378.434026][T17633] syz.2.14152[17633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1379.400261][T17678] syz.2.14166[17678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1379.412145][T17678] syz.2.14166[17678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1379.935942][T17710] device pim6reg1 entered promiscuous mode [ 1380.387237][T17718] device veth0_vlan left promiscuous mode [ 1380.431469][T17718] device veth0_vlan entered promiscuous mode [ 1380.580386][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1380.615649][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1380.690103][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1381.387276][T17754] device syzkaller0 entered promiscuous mode [ 1382.180700][T17791] device syzkaller0 entered promiscuous mode [ 1382.883610][T17815] device syzkaller0 entered promiscuous mode [ 1384.907613][T17930] syz.3.14240[17930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1384.907717][T17930] syz.3.14240[17930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1385.000994][T17931] device wg2 entered promiscuous mode [ 1385.672019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 1385.710921][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1385.946617][T17974] syz.3.14253[17974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1385.953167][T17974] syz.3.14253[17974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1387.032781][T18016] syz.0.14264[18016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1387.054965][T18016] syz.0.14264[18016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1388.134732][T18049] syz.6.14277[18049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1388.151363][T18049] syz.6.14277[18049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1388.671969][T18058] syz.2.14280[18058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1388.683897][T18058] syz.2.14280[18058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1390.150401][T18121] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1390.150414][T18121] syz.0.14300[18121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1390.191734][T18113] device veth0_vlan left promiscuous mode [ 1390.251506][T18121] syz.0.14300[18121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1390.306133][T18113] device veth0_vlan entered promiscuous mode [ 1390.450283][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1390.476725][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1390.505071][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1391.267275][T18161] syz.2.14312[18161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1391.267376][T18161] syz.2.14312[18161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1391.903258][T18204] syz.3.14325[18204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1391.956669][T18204] syz.3.14325[18204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1392.342537][T18225] device wg2 left promiscuous mode [ 1392.380189][T18226] device wg2 entered promiscuous mode [ 1392.472967][T18231] device sit0 left promiscuous mode [ 1392.537267][T18231] device sit0 entered promiscuous mode [ 1392.730789][T18255] syz.2.14338[18255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1392.730892][T18255] syz.2.14338[18255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1393.660940][T18298] device sit0 left promiscuous mode [ 1393.741923][T18305] syz.2.14351[18305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1393.742019][T18305] syz.2.14351[18305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1393.911055][T18314] device sit0 left promiscuous mode [ 1393.983445][T18318] device sit0 entered promiscuous mode [ 1394.988449][T18347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.159971][T18361] device bridge_slave_1 left promiscuous mode [ 1395.174688][T18361] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.211782][T18361] device bridge_slave_0 left promiscuous mode [ 1395.226273][T18361] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.814052][T18393] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1395.814066][T18393] syz.0.14378[18393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1395.820819][T18393] syz.0.14378[18393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1397.128878][T18431] syz.0.14390[18431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1397.173254][T18431] syz.0.14390[18431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1397.565804][T18446] device sit0 entered promiscuous mode [ 1398.132528][T18465] lo: mtu less than device minimum [ 1398.493105][T18480] device pim6reg1 entered promiscuous mode [ 1399.367783][T18498] device wg2 left promiscuous mode [ 1399.581832][T18500] device wg2 entered promiscuous mode [ 1400.819828][T18578] device syzkaller0 entered promiscuous mode [ 1401.483922][T18612] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1401.495486][T18612] syzkaller0: linktype set to 804 [ 1401.875184][T18629] device veth0_vlan left promiscuous mode [ 1401.888916][T18629] device veth0_vlan entered promiscuous mode [ 1403.543996][T18708] syz.3.14471[18708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.548549][T18708] syz.3.14471[18708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.579701][T18709] syz.3.14471[18709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.751926][T18709] syz.3.14471[18709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.105398][T18723] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 1406.136945][T18834] device veth1_to_bond entered promiscuous mode [ 1406.194512][T18835] ±ÿ: renamed from team_slave_1 [ 1406.468896][T18849] device syzkaller0 entered promiscuous mode [ 1406.606803][T18859] device sit0 left promiscuous mode [ 1406.922133][T18882] syz.0.14517[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1406.922231][T18882] syz.0.14517[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1407.296512][T18927] device sit0 entered promiscuous mode [ 1407.325529][T18919] device veth0_vlan left promiscuous mode [ 1407.353507][T18919] device veth0_vlan entered promiscuous mode [ 1407.400278][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1407.463416][T18944] syz.6.14532[18944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1407.463515][T18944] syz.6.14532[18944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1408.912040][T18961] device pim6reg1 entered promiscuous mode [ 1409.108509][T18969] device pim6reg1 entered promiscuous mode [ 1409.268158][T18978] tap0: tun_chr_ioctl cmd 1074025677 [ 1409.274277][T18978] tap0: linktype set to 778 [ 1409.386844][T18983] syz.0.14546[18983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1409.386950][T18983] syz.0.14546[18983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1410.139035][T19016] device syzkaller0 entered promiscuous mode [ 1410.254214][T19038] : port 1(erspan0) entered blocking state [ 1410.272614][T19038] : port 1(erspan0) entered disabled state [ 1410.279234][T19038] device erspan0 entered promiscuous mode [ 1410.296218][T19039] : port 1(erspan0) entered blocking state [ 1410.302215][T19039] : port 1(erspan0) entered forwarding state [ 1410.334908][T19042] tap0: tun_chr_ioctl cmd 1074025677 [ 1410.340617][T19042] tap0: linktype set to 774 [ 1410.713710][T19067] device syzkaller0 entered promiscuous mode [ 1411.046256][T19086] device wg2 entered promiscuous mode [ 1411.267862][T19101] ªªªªªª: renamed from vlan0 [ 1412.180837][T19124] device pim6reg1 entered promiscuous mode [ 1412.865258][T19149] device veth1_macvtap left promiscuous mode [ 1412.894141][T19149] device macsec0 entered promiscuous mode [ 1412.922452][T19150] device pim6reg1 entered promiscuous mode [ 1414.436795][T19235] device veth0_vlan left promiscuous mode [ 1414.443820][T19235] device veth0_vlan entered promiscuous mode [ 1414.455015][T19240] device sit0 left promiscuous mode [ 1414.621049][T19242] device sit0 entered promiscuous mode [ 1417.540033][T19360] syz.0.14652[19360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.540146][T19360] syz.0.14652[19360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.543047][T19358] syz.0.14652[19358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.591995][T19358] syz.0.14652[19358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1419.538445][T19454] device veth0_vlan left promiscuous mode [ 1419.583939][T19454] device veth0_vlan entered promiscuous mode [ 1419.598933][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1419.609247][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1419.617229][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1419.794100][T19486] @0Ù: renamed from bond_slave_1 [ 1420.186582][T19492] device pim6reg1 entered promiscuous mode [ 1420.449113][T19535] device pim6reg1 entered promiscuous mode [ 1420.476729][T19533] device bridge_slave_1 left promiscuous mode [ 1420.503170][T19533] bridge0: port 2(bridge_slave_1) entered disabled state [ 1420.570889][T19533] device bridge_slave_0 left promiscuous mode [ 1420.578756][T19533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1421.157745][T19598] device pim6reg1 entered promiscuous mode [ 1422.506942][T19646] device syzkaller0 entered promiscuous mode [ 1423.603208][T19679] device wg2 left promiscuous mode [ 1424.942180][T19789] syz.2.14777[19789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1424.942290][T19789] syz.2.14777[19789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1426.158728][T19833] device wg2 left promiscuous mode [ 1426.345986][T19842] device pim6reg1 entered promiscuous mode [ 1427.153412][T19885] device wg2 left promiscuous mode [ 1427.165141][T19891] device dummy0 entered promiscuous mode [ 1427.186691][T19894] device wg2 entered promiscuous mode [ 1428.061138][T19928] device veth0_vlan left promiscuous mode [ 1428.084498][T19928] device veth0_vlan entered promiscuous mode [ 1428.108749][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1428.127232][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1428.222058][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1428.925390][T19954] device wg2 left promiscuous mode [ 1429.219811][T19966] device sit0 entered promiscuous mode [ 1429.874627][ T24] audit: type=1400 audit(1755638400.350:181): avc: denied { create } for pid=19983 comm="syz.6.14833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1433.189834][T20146] device dummy0 entered promiscuous mode [ 1433.471035][T20158] device pim6reg1 entered promiscuous mode [ 1434.035982][T20188] device wg2 entered promiscuous mode [ 1434.545680][T20191] device syzkaller0 entered promiscuous mode [ 1435.475454][T20258] device pim6reg1 entered promiscuous mode [ 1435.645647][T20266] device wg2 entered promiscuous mode [ 1435.779236][T20269] device pim6reg1 entered promiscuous mode [ 1435.921125][T20281] device pim6reg1 entered promiscuous mode [ 1435.983401][T20279] device pim6reg1 entered promiscuous mode [ 1437.671372][T20354] device pim6reg1 entered promiscuous mode [ 1438.020657][T20354] device sit0 left promiscuous mode [ 1441.832109][T20508] device syzkaller0 entered promiscuous mode [ 1442.204031][T20539] syz.2.14989[20539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.204131][T20539] syz.2.14989[20539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.567866][T20552] device pim6reg1 entered promiscuous mode [ 1444.561050][T20640] device veth0_vlan left promiscuous mode [ 1444.583453][T20640] device veth0_vlan entered promiscuous mode [ 1444.673888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1444.682958][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1444.691001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1445.931867][T20670] @0Ù: renamed from bond_slave_1 [ 1461.257088][T20697] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.264370][T20697] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.272191][T20697] device bridge_slave_0 entered promiscuous mode [ 1461.280731][T20697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.288268][T20697] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.295840][T20697] device bridge_slave_1 entered promiscuous mode [ 1461.302596][T20698] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.309748][T20698] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.317367][T20698] device bridge_slave_0 entered promiscuous mode [ 1461.334373][T20698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.341430][T20698] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.349031][T20698] device bridge_slave_1 entered promiscuous mode [ 1461.377405][T20696] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.384588][T20696] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.392176][T20696] device bridge_slave_0 entered promiscuous mode [ 1461.399237][T20696] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.406351][T20696] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.414141][T20696] device bridge_slave_1 entered promiscuous mode [ 1461.487394][T20699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.494786][T20699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.502564][T20699] device bridge_slave_0 entered promiscuous mode [ 1461.520327][T20699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.527554][T20699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.535229][T20699] device bridge_slave_1 entered promiscuous mode [ 1461.566871][T20700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.574257][T20700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.582189][T20700] device bridge_slave_0 entered promiscuous mode [ 1461.614067][T20700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.621306][T20700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.629165][T20700] device bridge_slave_1 entered promiscuous mode [ 1461.669614][T20697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.676849][T20697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.684261][T20697] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.691315][T20697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.749702][T20698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.756903][T20698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.764499][T20698] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.771670][T20698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.804862][T20700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.812168][T20700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.819459][T20700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.826519][T20700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.845296][T20699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.852595][T20699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.860051][T20699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.867131][T20699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.879090][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.886956][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1461.894631][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.902427][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.909948][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.918027][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.925481][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.933105][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.940751][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.969481][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1461.977699][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1461.986918][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.994010][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1462.009703][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1462.029429][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1462.037792][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1462.044861][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1462.052725][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1462.061020][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.068114][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1462.092859][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1462.100515][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1462.108755][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1462.117388][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1462.126125][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.133233][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1462.140815][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1462.149785][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1462.204979][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1462.213139][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1462.221177][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1462.228796][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1462.238593][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1462.247039][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1462.255632][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1462.262834][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1462.270406][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1462.279464][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1462.287883][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.294936][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1462.303746][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1462.312090][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1462.320460][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1462.328780][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1462.336836][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1462.345510][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1462.354127][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1462.361167][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1462.368659][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1462.377126][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1462.385624][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1462.392862][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1462.400430][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1462.409626][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1462.418061][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.425121][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1462.432626][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1462.440751][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1462.448995][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1462.457640][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1462.501643][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1462.509693][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1462.518369][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1462.528605][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1462.536761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1462.545037][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1462.553610][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1462.562187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1462.570359][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.577434][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1462.585089][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1462.593057][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1462.612095][T20696] device veth0_vlan entered promiscuous mode [ 1462.641550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1462.649844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1462.658422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1462.666852][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1462.687438][T20697] device veth0_vlan entered promiscuous mode [ 1462.696936][T20696] device veth1_macvtap entered promiscuous mode [ 1462.706996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1462.715283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1462.723817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1462.733204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1462.741221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1462.749609][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1462.757348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1462.778624][T20698] device veth0_vlan entered promiscuous mode [ 1462.792254][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1462.800842][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1462.809342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1462.817468][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1462.825158][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1462.833535][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1462.841976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1462.850294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1462.858461][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1462.867147][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1462.874801][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1462.885497][T20700] device veth0_vlan entered promiscuous mode [ 1462.896366][T20697] device veth1_macvtap entered promiscuous mode [ 1462.906548][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1462.915489][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1462.923908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1462.940387][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1462.949364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1462.957918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1462.966621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1462.991640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1463.011386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1463.019933][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1463.029473][T20699] device veth0_vlan entered promiscuous mode [ 1463.040573][T20698] device veth1_macvtap entered promiscuous mode [ 1463.050545][T32356] Ÿë: port 1(erspan0) entered disabled state [ 1463.057719][T32356] : port 1(erspan0) entered disabled state [ 1463.064952][T32356] : port 1(erspan0) entered disabled state [ 1463.072976][T32356] device erspan0 left promiscuous mode [ 1463.078491][T32356] Ÿë: port 1(erspan0) entered disabled state [ 1463.086880][T32356] device erspan0 left promiscuous mode [ 1463.092738][T32356] : port 1(erspan0) entered disabled state [ 1463.100467][T32356] device erspan0 left promiscuous mode [ 1463.107416][T32356] : port 1(erspan0) entered disabled state [ 1463.123691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1463.133458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1463.142148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1463.150610][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1463.159710][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1463.173210][T20700] device veth1_macvtap entered promiscuous mode [ 1463.184295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1463.192884][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1463.201197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1463.223050][T20699] device veth1_macvtap entered promiscuous mode [ 1463.233403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1463.242011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1463.250481][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1463.259605][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1463.268762][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1463.287905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1463.296618][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1463.305473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1463.314306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1463.324307][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1463.334281][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1463.346326][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1463.354810][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1463.406145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1463.419692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1463.530444][T32356] device veth1_macvtap left promiscuous mode [ 1465.004626][T20760] ÿÿÿÿÿÿ: renamed from vlan1 [ 1465.330274][T20769] device sit0 entered promiscuous mode [ 1465.635355][T20774] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.645055][T20774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.771682][T20779] device bridge_slave_1 left promiscuous mode [ 1465.778636][T20779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.786410][T20779] device bridge_slave_0 left promiscuous mode [ 1465.793049][T20779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.246257][T20821] device sit0 entered promiscuous mode [ 1468.150622][T20869] device syzkaller0 entered promiscuous mode [ 1469.844360][T20949] device sit0 entered promiscuous mode [ 1470.725104][T20982] device pim6reg1 entered promiscuous mode [ 1470.733841][T20980] syz.8.15115[20980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1470.735365][T20980] syz.8.15115[20980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.725974][T21024] device wg2 entered promiscuous mode [ 1472.892394][T21031] device pim6reg1 entered promiscuous mode [ 1474.331898][T21073] FAULT_INJECTION: forcing a failure. [ 1474.331898][T21073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1474.362467][T21073] CPU: 0 PID: 21073 Comm: syz.8.15148 Tainted: G W 5.10.240-syzkaller #0 [ 1474.372321][T21073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1474.382399][T21073] Call Trace: [ 1474.385700][T21073] __dump_stack+0x21/0x24 [ 1474.390038][T21073] dump_stack_lvl+0x169/0x1d8 [ 1474.394903][T21073] ? show_regs_print_info+0x18/0x18 [ 1474.400185][T21073] ? stack_trace_save+0x98/0xe0 [ 1474.405036][T21073] ? stack_trace_snprint+0xf0/0xf0 [ 1474.410186][T21073] dump_stack+0x15/0x1c [ 1474.414364][T21073] should_fail+0x3c1/0x510 [ 1474.418788][T21073] should_fail_usercopy+0x1a/0x20 [ 1474.423821][T21073] _copy_from_user+0x20/0xd0 [ 1474.428419][T21073] ____sys_sendmsg+0x305/0x8c0 [ 1474.433195][T21073] ? __sys_sendmsg_sock+0x40/0x40 [ 1474.438254][T21073] ? import_iovec+0x7c/0xb0 [ 1474.442780][T21073] ___sys_sendmsg+0x1f0/0x260 [ 1474.447465][T21073] ? __sys_sendmsg+0x250/0x250 [ 1474.452317][T21073] ? rw_verify_area+0x1c0/0x360 [ 1474.457176][T21073] ? __fdget+0x1a1/0x230 [ 1474.461419][T21073] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1474.466355][T21073] ? ___sys_sendmsg+0x260/0x260 [ 1474.471317][T21073] ? syscall_trace_enter+0x108/0x170 [ 1474.476628][T21073] do_syscall_64+0x31/0x40 [ 1474.481119][T21073] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1474.487030][T21073] RIP: 0033:0x7f5e70c01be9 [ 1474.491445][T21073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1474.511059][T21073] RSP: 002b:00007f5e6f66a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1474.519470][T21073] RAX: ffffffffffffffda RBX: 00007f5e70e28fa0 RCX: 00007f5e70c01be9 [ 1474.527622][T21073] RDX: 0000000000040000 RSI: 0000200000000340 RDI: 0000000000000004 [ 1474.535861][T21073] RBP: 00007f5e6f66a090 R08: 0000000000000000 R09: 0000000000000000 [ 1474.544181][T21073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1474.552342][T21073] R13: 00007f5e70e29038 R14: 00007f5e70e28fa0 R15: 00007ffce97555c8 [ 1474.817719][T21082] device sit0 left promiscuous mode [ 1474.830634][T21084] syz.8.15152[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1474.830709][T21084] syz.8.15152[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1474.885148][T21082] device sit0 entered promiscuous mode [ 1475.200497][T21091] device syzkaller0 entered promiscuous mode [ 1475.367639][T21104] device veth1_macvtap left promiscuous mode [ 1475.375398][T21104] device macsec0 entered promiscuous mode [ 1475.393446][T21108] FAULT_INJECTION: forcing a failure. [ 1475.393446][T21108] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.406404][T21108] CPU: 1 PID: 21108 Comm: syz.9.15160 Tainted: G W 5.10.240-syzkaller #0 [ 1475.416384][T21108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1475.426733][T21108] Call Trace: [ 1475.430224][T21108] __dump_stack+0x21/0x24 [ 1475.434574][T21108] dump_stack_lvl+0x169/0x1d8 [ 1475.439267][T21108] ? thaw_kernel_threads+0x220/0x220 [ 1475.444557][T21108] ? stack_trace_save+0x98/0xe0 [ 1475.449587][T21108] ? show_regs_print_info+0x18/0x18 [ 1475.454911][T21108] dump_stack+0x15/0x1c [ 1475.459200][T21108] should_fail+0x3c1/0x510 [ 1475.463756][T21108] ? __alloc_skb+0x9e/0x520 [ 1475.468537][T21108] __should_failslab+0xa4/0xe0 [ 1475.473320][T21108] should_failslab+0x9/0x20 [ 1475.477922][T21108] kmem_cache_alloc+0x3d/0x2e0 [ 1475.482970][T21108] __alloc_skb+0x9e/0x520 [ 1475.487453][T21108] ? selinux_capable+0x29c/0x380 [ 1475.492410][T21108] alloc_skb_with_frags+0xa2/0x560 [ 1475.497564][T21108] ? avc_has_perm+0x234/0x360 [ 1475.502274][T21108] sock_alloc_send_pskb+0x853/0x980 [ 1475.507478][T21108] ? sock_kzfree_s+0x60/0x60 [ 1475.512172][T21108] ? __kasan_check_write+0x14/0x20 [ 1475.517387][T21108] ? _raw_spin_lock+0x8e/0xe0 [ 1475.522073][T21108] ? _raw_spin_trylock_bh+0x130/0x130 [ 1475.527543][T21108] unix_dgram_sendmsg+0x5f4/0x17d0 [ 1475.532682][T21108] ? selinux_socket_sendmsg+0x208/0x2e0 [ 1475.538252][T21108] ? selinux_socket_accept+0x500/0x500 [ 1475.543735][T21108] ? unix_dgram_poll+0x620/0x620 [ 1475.548682][T21108] ? check_stack_object+0x106/0x140 [ 1475.553963][T21108] unix_seqpacket_sendmsg+0x118/0x1e0 [ 1475.559532][T21108] ? unix_dgram_peer_wake_me+0x410/0x410 [ 1475.565462][T21108] ____sys_sendmsg+0x5a2/0x8c0 [ 1475.570492][T21108] ? __sys_sendmsg_sock+0x40/0x40 [ 1475.575518][T21108] ? import_iovec+0x7c/0xb0 [ 1475.580270][T21108] ___sys_sendmsg+0x1f0/0x260 [ 1475.584982][T21108] ? __sys_sendmsg+0x250/0x250 [ 1475.589842][T21108] ? rw_verify_area+0x1c0/0x360 [ 1475.594724][T21108] ? __fdget+0x1a1/0x230 [ 1475.598974][T21108] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1475.603916][T21108] ? ___sys_sendmsg+0x260/0x260 [ 1475.608991][T21108] ? syscall_trace_enter+0x108/0x170 [ 1475.614368][T21108] do_syscall_64+0x31/0x40 [ 1475.618809][T21108] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1475.624818][T21108] RIP: 0033:0x7f4bdb142be9 [ 1475.629641][T21108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1475.649544][T21108] RSP: 002b:00007f4bd9bab038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1475.657976][T21108] RAX: ffffffffffffffda RBX: 00007f4bdb369fa0 RCX: 00007f4bdb142be9 [ 1475.665948][T21108] RDX: 0000000000040000 RSI: 0000200000000340 RDI: 0000000000000004 [ 1475.673927][T21108] RBP: 00007f4bd9bab090 R08: 0000000000000000 R09: 0000000000000000 [ 1475.681898][T21108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.689868][T21108] R13: 00007f4bdb36a038 R14: 00007f4bdb369fa0 R15: 00007ffca4c95518 [ 1475.734574][T21106] device veth1_macvtap entered promiscuous mode [ 1475.742694][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1476.830503][T21135] FAULT_INJECTION: forcing a failure. [ 1476.830503][T21135] name failslab, interval 1, probability 0, space 0, times 0 [ 1476.843559][T21135] CPU: 0 PID: 21135 Comm: syz.9.15171 Tainted: G W 5.10.240-syzkaller #0 [ 1476.853382][T21135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1476.863465][T21135] Call Trace: [ 1476.866790][T21135] __dump_stack+0x21/0x24 [ 1476.871142][T21135] dump_stack_lvl+0x169/0x1d8 [ 1476.875849][T21135] ? show_regs_print_info+0x18/0x18 [ 1476.881166][T21135] dump_stack+0x15/0x1c [ 1476.885331][T21135] should_fail+0x3c1/0x510 [ 1476.889759][T21135] ? alloc_skb_with_frags+0xa2/0x560 [ 1476.895316][T21135] __should_failslab+0xa4/0xe0 [ 1476.900079][T21135] should_failslab+0x9/0x20 [ 1476.904623][T21135] __kmalloc_track_caller+0x5f/0x320 [ 1476.909992][T21135] ? kmem_cache_alloc+0x165/0x2e0 [ 1476.915026][T21135] ? __alloc_skb+0x9e/0x520 [ 1476.919702][T21135] ? alloc_skb_with_frags+0xa2/0x560 [ 1476.925086][T21135] __alloc_skb+0xdc/0x520 [ 1476.929428][T21135] alloc_skb_with_frags+0xa2/0x560 [ 1476.934681][T21135] ? avc_has_perm+0x234/0x360 [ 1476.939364][T21135] sock_alloc_send_pskb+0x853/0x980 [ 1476.944585][T21135] ? sock_kzfree_s+0x60/0x60 [ 1476.949202][T21135] ? __kasan_check_write+0x14/0x20 [ 1476.954316][T21135] ? _raw_spin_lock+0x8e/0xe0 [ 1476.958998][T21135] ? _raw_spin_trylock_bh+0x130/0x130 [ 1476.964505][T21135] unix_dgram_sendmsg+0x5f4/0x17d0 [ 1476.969620][T21135] ? selinux_socket_sendmsg+0x208/0x2e0 [ 1476.975280][T21135] ? selinux_socket_accept+0x500/0x500 [ 1476.981086][T21135] ? unix_dgram_poll+0x620/0x620 [ 1476.986029][T21135] ? check_stack_object+0x106/0x140 [ 1476.991229][T21135] unix_seqpacket_sendmsg+0x118/0x1e0 [ 1476.996730][T21135] ? unix_dgram_peer_wake_me+0x410/0x410 [ 1477.002506][T21135] ____sys_sendmsg+0x5a2/0x8c0 [ 1477.007379][T21135] ? __sys_sendmsg_sock+0x40/0x40 [ 1477.012406][T21135] ? import_iovec+0x7c/0xb0 [ 1477.016936][T21135] ___sys_sendmsg+0x1f0/0x260 [ 1477.021620][T21135] ? __sys_sendmsg+0x250/0x250 [ 1477.026379][T21135] ? rw_verify_area+0x1c0/0x360 [ 1477.031243][T21135] ? __fdget+0x1a1/0x230 [ 1477.035575][T21135] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1477.040599][T21135] ? fput+0x1a/0x20 [ 1477.044516][T21135] ? ___sys_sendmsg+0x260/0x260 [ 1477.049381][T21135] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1477.055460][T21135] do_syscall_64+0x31/0x40 [ 1477.059970][T21135] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1477.065859][T21135] RIP: 0033:0x7f4bdb142be9 [ 1477.070274][T21135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1477.090168][T21135] RSP: 002b:00007f4bd9bab038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1477.098688][T21135] RAX: ffffffffffffffda RBX: 00007f4bdb369fa0 RCX: 00007f4bdb142be9 [ 1477.106786][T21135] RDX: 0000000000040000 RSI: 0000200000000340 RDI: 0000000000000004 [ 1477.114858][T21135] RBP: 00007f4bd9bab090 R08: 0000000000000000 R09: 0000000000000000 [ 1477.123189][T21135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1477.131170][T21135] R13: 00007f4bdb36a038 R14: 00007f4bdb369fa0 R15: 00007ffca4c95518 [ 1477.279665][T21141] device syzkaller0 entered promiscuous mode [ 1477.624874][T21174] device veth1_macvtap left promiscuous mode [ 1477.651623][T21174] device macsec0 entered promiscuous mode [ 1478.317417][T21186] FAULT_INJECTION: forcing a failure. [ 1478.317417][T21186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1478.341670][T21186] CPU: 1 PID: 21186 Comm: syz.8.15187 Tainted: G W 5.10.240-syzkaller #0 [ 1478.351556][T21186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1478.361725][T21186] Call Trace: [ 1478.365047][T21186] __dump_stack+0x21/0x24 [ 1478.369428][T21186] dump_stack_lvl+0x169/0x1d8 [ 1478.374136][T21186] ? thaw_kernel_threads+0x220/0x220 [ 1478.379442][T21186] ? vsnprintf+0x1871/0x1960 [ 1478.384059][T21186] ? show_regs_print_info+0x18/0x18 [ 1478.389371][T21186] dump_stack+0x15/0x1c [ 1478.393811][T21186] should_fail+0x3c1/0x510 [ 1478.398236][T21186] should_fail_usercopy+0x1a/0x20 [ 1478.403610][T21186] _copy_to_user+0x20/0x90 [ 1478.408234][T21186] simple_read_from_buffer+0xe9/0x160 [ 1478.413724][T21186] proc_fail_nth_read+0x19a/0x210 [ 1478.418865][T21186] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1478.424532][T21186] ? rw_verify_area+0x1c0/0x360 [ 1478.429415][T21186] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1478.435177][T21186] vfs_read+0x1fe/0xa10 [ 1478.439511][T21186] ? kernel_read+0x70/0x70 [ 1478.443951][T21186] ? __kasan_check_write+0x14/0x20 [ 1478.449166][T21186] ? mutex_lock+0x8c/0xe0 [ 1478.453685][T21186] ? mutex_trylock+0xa0/0xa0 [ 1478.458283][T21186] ? __fget_files+0x2c4/0x320 [ 1478.463063][T21186] ? __fdget_pos+0x2d2/0x380 [ 1478.467761][T21186] ? ksys_read+0x71/0x240 [ 1478.472103][T21186] ksys_read+0x140/0x240 [ 1478.476702][T21186] ? vfs_write+0xd60/0xd60 [ 1478.481131][T21186] __x64_sys_read+0x7b/0x90 [ 1478.485654][T21186] do_syscall_64+0x31/0x40 [ 1478.490073][T21186] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1478.496178][T21186] RIP: 0033:0x7f5e70c005fc [ 1478.500606][T21186] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1478.520621][T21186] RSP: 002b:00007f5e6f66a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1478.529253][T21186] RAX: ffffffffffffffda RBX: 00007f5e70e28fa0 RCX: 00007f5e70c005fc [ 1478.537678][T21186] RDX: 000000000000000f RSI: 00007f5e6f66a0a0 RDI: 0000000000000005 [ 1478.546101][T21186] RBP: 00007f5e6f66a090 R08: 0000000000000000 R09: 0000000000000000 [ 1478.554079][T21186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1478.562247][T21186] R13: 00007f5e70e29038 R14: 00007f5e70e28fa0 R15: 00007ffce97555c8 [ 1480.888553][T21272] bridge0: port 1(bridge_slave_0) entered blocking state [ 1480.896789][T21272] bridge0: port 1(bridge_slave_0) entered disabled state [ 1480.904342][T21272] device bridge_slave_0 entered promiscuous mode [ 1480.913358][T21272] bridge0: port 2(bridge_slave_1) entered blocking state [ 1480.921731][T21272] bridge0: port 2(bridge_slave_1) entered disabled state [ 1480.929711][T21272] device bridge_slave_1 entered promiscuous mode [ 1481.711456][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1481.721826][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1481.763016][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1481.771589][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1481.779900][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.786996][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1481.795478][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1481.836846][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1481.845306][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1481.853653][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1481.860696][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1481.903094][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1481.911299][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1481.922775][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1481.931091][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1482.012739][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1482.021744][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1482.103152][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1482.112008][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1482.121715][T21272] device veth0_vlan entered promiscuous mode [ 1482.130632][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1482.138346][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1482.189940][T21272] device veth1_macvtap entered promiscuous mode [ 1482.207051][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1482.236163][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1482.290153][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1482.354176][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1482.392523][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1482.484365][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1482.493611][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1482.985028][T21348] device wg2 entered promiscuous mode [ 1483.042541][T21348] syz.0.15222[21348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1483.044136][T21348] syz.0.15222[21348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1483.193760][T21362] device wg2 left promiscuous mode [ 1484.573989][T21430] device sit0 entered promiscuous mode [ 1485.433561][T21479] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.443154][T21479] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.987415][T21482] device syzkaller0 entered promiscuous mode [ 1486.342249][T21500] device syzkaller0 entered promiscuous mode [ 1486.654392][T21515] device syzkaller0 entered promiscuous mode [ 1487.009212][T21540] device syzkaller0 entered promiscuous mode [ 1487.029718][T21544] ÿÿÿÿÿÿ: renamed from vlan1 [ 1487.311319][T21552] device sit0 left promiscuous mode [ 1487.375376][T21552] device sit0 entered promiscuous mode [ 1487.851270][T21574] device pim6reg1 entered promiscuous mode [ 1487.861971][T21582] syz.5.15290[21582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.862070][T21582] syz.5.15290[21582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1488.433329][T21606] ÿÿÿÿÿÿ: renamed from vlan1 [ 1488.818832][T21623] device veth0_vlan left promiscuous mode [ 1488.881284][T21623] device veth0_vlan entered promiscuous mode [ 1488.949148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1488.962452][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1488.970888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1488.997356][T21637] device veth1_macvtap left promiscuous mode [ 1489.013155][T21637] device macsec0 left promiscuous mode [ 1489.781874][T21682] Ÿë: port 1(veth0_to_team) entered blocking state [ 1489.788722][T21682] Ÿë: port 1(veth0_to_team) entered disabled state [ 1489.800873][T21682] device veth0_to_team entered promiscuous mode [ 1490.362827][T21713] device pim6reg1 entered promiscuous mode [ 1490.600436][T21728] syz.5.15334[21728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.600540][T21728] syz.5.15334[21728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1492.612976][T21835] device dummy0 entered promiscuous mode [ 1493.007988][T21857] device syzkaller0 entered promiscuous mode [ 1493.271372][T21870] : renamed from pim6reg1 [ 1493.317420][T21870] device syzkaller0 entered promiscuous mode [ 1493.574079][T21896] device wg2 left promiscuous mode [ 1493.793397][T21884] device syzkaller0 entered promiscuous mode [ 1493.869330][T21899] device wg2 entered promiscuous mode [ 1494.009366][T21912] device sit0 left promiscuous mode [ 1494.203315][T21918] device sit0 entered promiscuous mode [ 1495.564022][T21977] device pim6reg1 entered promiscuous mode [ 1497.444774][T22088] device syzkaller0 entered promiscuous mode [ 1497.469321][T22091] device veth1_to_bond entered promiscuous mode [ 1497.940346][T22118] device sit0 left promiscuous mode [ 1498.021634][T22119] device sit0 entered promiscuous mode [ 1498.561118][T22155] device pim6reg1 entered promiscuous mode [ 1499.956975][T22236] device wg2 entered promiscuous mode [ 1500.070347][T22241] device pim6reg1 entered promiscuous mode [ 1500.888212][T22289] tap0: tun_chr_ioctl cmd 1074025675 [ 1500.960337][T22289] tap0: persist enabled [ 1501.013891][T22288] tap0: tun_chr_ioctl cmd 1074025673 [ 1505.175404][T22477] device sit0 left promiscuous mode [ 1508.619852][T22633] ±ÿ: renamed from bond_slave_0 [ 1508.896058][T22640] device wg2 left promiscuous mode [ 1508.951003][T22641] device wg2 entered promiscuous mode [ 1510.289356][T22686] device syzkaller0 entered promiscuous mode [ 1510.670674][T22710] device pim6reg1 entered promiscuous mode [ 1513.134820][T22829] A6±ÿ: renamed from team_slave_1 [ 1513.589214][T22859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.598753][T22859] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.756582][T22861] device bridge_slave_1 left promiscuous mode [ 1513.764255][T22861] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.783638][T22861] device bridge_slave_0 left promiscuous mode [ 1513.800114][T22861] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.019363][T22878] device wg2 left promiscuous mode [ 1514.194293][T22884] device wg2 entered promiscuous mode [ 1516.183071][T22970] device syzkaller0 entered promiscuous mode [ 1516.766327][T22984] device pim6reg1 entered promiscuous mode [ 1519.799017][T23095] device syzkaller0 entered promiscuous mode [ 1520.054067][T23117] ªªªªªª: renamed from vlan0 [ 1522.080923][T23219] device syzkaller0 entered promiscuous mode [ 1523.633497][T23267] device veth0_to_team entered promiscuous mode [ 1523.923809][T23269] syz.9.15789[23269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1523.923875][T23269] syz.9.15789[23269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1524.513607][T23303] @ÿ: renamed from bond_slave_0 [ 1527.601259][T23459] syz.7.15848[23459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1527.601348][T23459] syz.7.15848[23459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1527.760636][T23469] device syzkaller0 entered promiscuous mode [ 1527.989110][T23495] device sit0 left promiscuous mode [ 1529.177427][T23563] device veth0_vlan left promiscuous mode [ 1529.193529][T23563] device veth0_vlan entered promiscuous mode [ 1529.864691][T23581] device pim6reg1 entered promiscuous mode [ 1529.904529][T23581] device veth0_vlan left promiscuous mode [ 1529.943381][T23581] device veth0_vlan entered promiscuous mode [ 1529.974877][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1530.007561][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1530.091007][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1530.677833][T23629] device sit0 left promiscuous mode [ 1530.844456][T23633] device wg2 left promiscuous mode [ 1530.914022][T23637] device wg2 entered promiscuous mode [ 1530.923003][T23638] device sit0 entered promiscuous mode [ 1531.815069][T23691] tun0: tun_chr_ioctl cmd 1074025676 [ 1531.851879][T23691] tun0: owner set to 0 [ 1532.686528][T23716] tun0: tun_chr_ioctl cmd 1074025678 [ 1532.694343][T23716] tun0: group set to 1 [ 1532.701260][T23715] device pim6reg1 entered promiscuous mode [ 1532.826317][T23730] device sit0 left promiscuous mode [ 1533.391194][T23774] device sit0 entered promiscuous mode [ 1533.585348][T23784] device sit0 entered promiscuous mode [ 1533.794008][T23800] device sit0 left promiscuous mode [ 1533.991236][T23816] device syzkaller0 entered promiscuous mode [ 1534.042390][T23816] device pim6reg1 entered promiscuous mode [ 1534.136279][T23830] syz.0.15953[23830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1534.136380][T23830] syz.0.15953[23830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1534.235303][T23835] device pim6reg1 entered promiscuous mode [ 1535.209340][T23858] device pim6reg1 entered promiscuous mode [ 1536.394350][T23908] device syzkaller0 entered promiscuous mode [ 1538.804793][T24033] device sit0 entered promiscuous mode [ 1539.081894][T24101] €Â0: renamed from pim6reg1 [ 1539.438625][T24119] device syzkaller0 entered promiscuous mode [ 1540.484673][T24176] device veth0_vlan left promiscuous mode [ 1540.495646][T24176] device veth0_vlan entered promiscuous mode [ 1540.733699][T24191] device sit0 left promiscuous mode [ 1541.268025][T24211] FAULT_INJECTION: forcing a failure. [ 1541.268025][T24211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1541.311721][T24211] CPU: 0 PID: 24211 Comm: syz.7.16062 Tainted: G W 5.10.240-syzkaller #0 [ 1541.321578][T24211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1541.331666][T24211] Call Trace: [ 1541.335096][T24211] __dump_stack+0x21/0x24 [ 1541.339545][T24211] dump_stack_lvl+0x169/0x1d8 [ 1541.344417][T24211] ? thaw_kernel_threads+0x220/0x220 [ 1541.349726][T24211] ? show_regs_print_info+0x18/0x18 [ 1541.355148][T24211] ? __irq_exit_rcu+0x40/0x150 [ 1541.359947][T24211] dump_stack+0x15/0x1c [ 1541.364128][T24211] should_fail+0x3c1/0x510 [ 1541.368615][T24211] should_fail_usercopy+0x1a/0x20 [ 1541.373659][T24211] _copy_from_user+0x20/0xd0 [ 1541.378358][T24211] perf_copy_attr+0x14c/0x730 [ 1541.383068][T24211] __se_sys_perf_event_open+0xd1/0x1b10 [ 1541.388641][T24211] ? sched_clock_cpu+0x1b/0x3d0 [ 1541.393509][T24211] ? sched_clock+0x3a/0x40 [ 1541.397955][T24211] ? sched_clock_cpu+0x1b/0x3d0 [ 1541.403024][T24211] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1541.408973][T24211] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1541.415252][T24211] __x64_sys_perf_event_open+0xbf/0xd0 [ 1541.420737][T24211] do_syscall_64+0x31/0x40 [ 1541.425272][T24211] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1541.431181][T24211] RIP: 0033:0x7f20e38ccbe9 [ 1541.435816][T24211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1541.455559][T24211] RSP: 002b:00007f20e2335038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1541.464133][T24211] RAX: ffffffffffffffda RBX: 00007f20e3af3fa0 RCX: 00007f20e38ccbe9 [ 1541.472305][T24211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 1541.480398][T24211] RBP: 00007f20e2335090 R08: 0000000000000008 R09: 0000000000000000 [ 1541.488390][T24211] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1541.496479][T24211] R13: 00007f20e3af4038 R14: 00007f20e3af3fa0 R15: 00007ffc8c070b88 [ 1542.008630][T24237] device syzkaller0 entered promiscuous mode [ 1542.813609][T24262] FAULT_INJECTION: forcing a failure. [ 1542.813609][T24262] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.881300][T24262] CPU: 1 PID: 24262 Comm: syz.7.16077 Tainted: G W 5.10.240-syzkaller #0 [ 1542.891537][T24262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1542.902158][T24262] Call Trace: [ 1542.905573][T24262] __dump_stack+0x21/0x24 [ 1542.909941][T24262] dump_stack_lvl+0x169/0x1d8 [ 1542.914654][T24262] ? show_regs_print_info+0x18/0x18 [ 1542.920114][T24262] ? kvm_sched_clock_read+0x18/0x40 [ 1542.925371][T24262] ? expand_files+0xd3/0x8f0 [ 1542.930249][T24262] ? sched_clock_cpu+0x1b/0x3d0 [ 1542.935135][T24262] dump_stack+0x15/0x1c [ 1542.939317][T24262] should_fail+0x3c1/0x510 [ 1542.943761][T24262] ? perf_event_alloc+0xd0/0x1990 [ 1542.948806][T24262] __should_failslab+0xa4/0xe0 [ 1542.953600][T24262] should_failslab+0x9/0x20 [ 1542.958222][T24262] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1542.963540][T24262] perf_event_alloc+0xd0/0x1990 [ 1542.968407][T24262] ? __alloc_fd+0x498/0x530 [ 1542.973405][T24262] __se_sys_perf_event_open+0x6f7/0x1b10 [ 1542.979061][T24262] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1542.984885][T24262] ? debug_smp_processor_id+0x17/0x20 [ 1542.990260][T24262] __x64_sys_perf_event_open+0xbf/0xd0 [ 1542.995746][T24262] do_syscall_64+0x31/0x40 [ 1543.000266][T24262] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1543.006341][T24262] RIP: 0033:0x7f20e38ccbe9 [ 1543.010762][T24262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1543.030597][T24262] RSP: 002b:00007f20e2335038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1543.039011][T24262] RAX: ffffffffffffffda RBX: 00007f20e3af3fa0 RCX: 00007f20e38ccbe9 [ 1543.047006][T24262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 1543.055020][T24262] RBP: 00007f20e2335090 R08: 0000000000000008 R09: 0000000000000000 [ 1543.063098][T24262] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1543.071170][T24262] R13: 00007f20e3af4038 R14: 00007f20e3af3fa0 R15: 00007ffc8c070b88 [ 1543.264587][T24288] device sit0 entered promiscuous mode [ 1543.760790][T24311] FAULT_INJECTION: forcing a failure. [ 1543.760790][T24311] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.801598][T24311] CPU: 1 PID: 24311 Comm: syz.7.16092 Tainted: G W 5.10.240-syzkaller #0 [ 1543.811715][T24311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1543.821790][T24311] Call Trace: [ 1543.825094][T24311] __dump_stack+0x21/0x24 [ 1543.829468][T24311] dump_stack_lvl+0x169/0x1d8 [ 1543.834170][T24311] ? thaw_kernel_threads+0x220/0x220 [ 1543.839478][T24311] ? show_regs_print_info+0x18/0x18 [ 1543.844707][T24311] dump_stack+0x15/0x1c [ 1543.848905][T24311] should_fail+0x3c1/0x510 [ 1543.853351][T24311] ? tracepoint_add_func+0x332/0x9f0 [ 1543.858965][T24311] __should_failslab+0xa4/0xe0 [ 1543.863769][T24311] should_failslab+0x9/0x20 [ 1543.868306][T24311] __kmalloc+0x60/0x330 [ 1543.872490][T24311] ? __irq_exit_rcu+0x40/0x150 [ 1543.877367][T24311] tracepoint_add_func+0x332/0x9f0 [ 1543.882502][T24311] ? mutex_trylock+0xa0/0xa0 [ 1543.887127][T24311] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 1543.894014][T24311] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 1543.900895][T24311] tracepoint_probe_register+0x5a/0x90 [ 1543.906476][T24311] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 1543.913461][T24311] trace_event_reg+0x150/0x260 [ 1543.918251][T24311] perf_trace_event_init+0x52d/0xa30 [ 1543.923645][T24311] perf_trace_init+0x1bc/0x200 [ 1543.928438][T24311] perf_tp_event_init+0x8e/0x120 [ 1543.933401][T24311] perf_try_init_event+0x14a/0x430 [ 1543.938542][T24311] perf_event_alloc+0xcda/0x1990 [ 1543.943518][T24311] __se_sys_perf_event_open+0x6f7/0x1b10 [ 1543.949198][T24311] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1543.954871][T24311] __x64_sys_perf_event_open+0xbf/0xd0 [ 1543.960358][T24311] do_syscall_64+0x31/0x40 [ 1543.964801][T24311] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1543.970726][T24311] RIP: 0033:0x7f20e38ccbe9 [ 1543.975344][T24311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1543.995070][T24311] RSP: 002b:00007f20e2335038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1544.003705][T24311] RAX: ffffffffffffffda RBX: 00007f20e3af3fa0 RCX: 00007f20e38ccbe9 [ 1544.011713][T24311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 1544.019726][T24311] RBP: 00007f20e2335090 R08: 0000000000000008 R09: 0000000000000000 [ 1544.027936][T24311] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1544.035936][T24311] R13: 00007f20e3af4038 R14: 00007f20e3af3fa0 R15: 00007ffc8c070b88 [ 1545.126467][T24356] FAULT_INJECTION: forcing a failure. [ 1545.126467][T24356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.201550][T24356] CPU: 0 PID: 24356 Comm: syz.9.16108 Tainted: G W 5.10.240-syzkaller #0 [ 1545.211508][T24356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1545.221674][T24356] Call Trace: [ 1545.225002][T24356] __dump_stack+0x21/0x24 [ 1545.229358][T24356] dump_stack_lvl+0x169/0x1d8 [ 1545.234041][T24356] ? thaw_kernel_threads+0x220/0x220 [ 1545.239335][T24356] ? vsnprintf+0x1871/0x1960 [ 1545.243937][T24356] ? show_regs_print_info+0x18/0x18 [ 1545.249133][T24356] dump_stack+0x15/0x1c [ 1545.253294][T24356] should_fail+0x3c1/0x510 [ 1545.257724][T24356] should_fail_usercopy+0x1a/0x20 [ 1545.262751][T24356] _copy_to_user+0x20/0x90 [ 1545.267173][T24356] simple_read_from_buffer+0xe9/0x160 [ 1545.272545][T24356] proc_fail_nth_read+0x19a/0x210 [ 1545.277676][T24356] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1545.283510][T24356] ? rw_verify_area+0x1c0/0x360 [ 1545.288455][T24356] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1545.294129][T24356] vfs_read+0x1fe/0xa10 [ 1545.298302][T24356] ? kernel_read+0x70/0x70 [ 1545.302739][T24356] ? __kasan_check_write+0x14/0x20 [ 1545.307866][T24356] ? mutex_lock+0x8c/0xe0 [ 1545.312199][T24356] ? mutex_trylock+0xa0/0xa0 [ 1545.316794][T24356] ? __fget_files+0x2c4/0x320 [ 1545.321481][T24356] ? __fdget_pos+0x2d2/0x380 [ 1545.326243][T24356] ? ksys_read+0x71/0x240 [ 1545.330785][T24356] ksys_read+0x140/0x240 [ 1545.335131][T24356] ? vfs_write+0xd60/0xd60 [ 1545.339644][T24356] ? debug_smp_processor_id+0x17/0x20 [ 1545.345015][T24356] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1545.351082][T24356] __x64_sys_read+0x7b/0x90 [ 1545.355684][T24356] do_syscall_64+0x31/0x40 [ 1545.360096][T24356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1545.365996][T24356] RIP: 0033:0x7f4bdb1415fc [ 1545.370414][T24356] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1545.390034][T24356] RSP: 002b:00007f4bd9bab030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1545.398545][T24356] RAX: ffffffffffffffda RBX: 00007f4bdb369fa0 RCX: 00007f4bdb1415fc [ 1545.406512][T24356] RDX: 000000000000000f RSI: 00007f4bd9bab0a0 RDI: 0000000000000007 [ 1545.414486][T24356] RBP: 00007f4bd9bab090 R08: 0000000000000000 R09: 0000000000000000 [ 1545.422456][T24356] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1545.430537][T24356] R13: 00007f4bdb36a038 R14: 00007f4bdb369fa0 R15: 00007ffca4c95518 [ 1545.945386][T24405] tap0: tun_chr_ioctl cmd 1074025677 [ 1545.950775][T24405] tap0: linktype set to 778 [ 1553.644683][T24590] device wg2 left promiscuous mode [ 1555.633022][T24633] bridge0: port 2(bridge_slave_1) entered disabled state [ 1555.642765][T24633] bridge0: port 1(bridge_slave_0) entered disabled state [ 1563.642443][T24853] device sit0 left promiscuous mode [ 1563.862245][T24854] device sit0 entered promiscuous mode [ 1563.944689][T24873] syz.9.16276[24873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1563.944820][T24873] syz.9.16276[24873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1564.811260][T24907] syz.7.16289[24907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1564.878570][T24907] syz.7.16289[24907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1564.984123][T24910] device sit0 left promiscuous mode [ 1565.236299][T24913] device sit0 entered promiscuous mode [ 1565.544188][T24956] syz.5.16302[24956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1565.544284][T24956] syz.5.16302[24956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1565.932880][T24971] device sit0 entered promiscuous mode [ 1566.481038][T24994] syz.7.16316[24994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1566.481123][T24994] syz.7.16316[24994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1566.659106][T25000] device wg2 entered promiscuous mode [ 1567.425890][T25034] syz.9.16327[25034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1567.427578][T25034] syz.9.16327[25034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1568.882752][T25062] device veth1_macvtap left promiscuous mode [ 1568.919875][T25062] device macsec0 entered promiscuous mode [ 1569.171386][T25076] syz.0.16338[25076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1569.179923][T25076] syz.0.16338[25076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1569.241422][T25082] device pim6reg1 entered promiscuous mode [ 1569.483398][T25093] syz.7.16341[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1569.483503][T25093] syz.7.16341[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1569.671225][T25096] device syzkaller0 entered promiscuous mode [ 1570.384731][T25124] syz.5.16351[25124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1570.384829][T25124] syz.5.16351[25124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1570.399846][T25122] device syzkaller0 entered promiscuous mode [ 1571.162785][T25166] syz.8.16364[25166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1571.162884][T25166] syz.8.16364[25166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1573.225701][T25264] device veth0_vlan left promiscuous mode [ 1573.246884][T25264] device veth0_vlan entered promiscuous mode [ 1573.254817][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1573.272772][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1573.288096][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1573.560940][T25283] device syzkaller0 entered promiscuous mode [ 1573.822474][T25288] device pim6reg1 entered promiscuous mode [ 1573.900260][T25294] device pim6reg1 entered promiscuous mode [ 1574.055652][T25300] device pim6reg1 entered promiscuous mode [ 1574.103905][T25304] Ÿë: port 1(veth0_to_team) entered blocking state [ 1574.115734][T25304] Ÿë: port 1(veth0_to_team) entered disabled state [ 1574.131095][T25304] device veth0_to_team entered promiscuous mode [ 1574.625273][T25318] device syzkaller0 entered promiscuous mode [ 1574.661933][T25337] device pim6reg1 entered promiscuous mode [ 1575.237435][T25365] device veth0_vlan left promiscuous mode [ 1575.276736][T25365] device veth0_vlan entered promiscuous mode [ 1575.530370][T25380] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1575.648454][T25393] device sit0 left promiscuous mode [ 1575.772823][T25395] device macsec0 left promiscuous mode [ 1575.816286][T25399] device sit0 entered promiscuous mode [ 1575.924301][T25398] device veth1_macvtap entered promiscuous mode [ 1575.930794][T25398] device macsec0 entered promiscuous mode [ 1575.971217][T25408] device wg2 left promiscuous mode [ 1576.001446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1576.461904][T25433] device sit0 left promiscuous mode [ 1576.565411][T25436] device sit0 entered promiscuous mode [ 1577.397482][T25472] syz.9.16451[25472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1577.397580][T25472] syz.9.16451[25472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1577.522030][T25483] FAULT_INJECTION: forcing a failure. [ 1577.522030][T25483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1577.733333][T25483] CPU: 1 PID: 25483 Comm: syz.9.16451 Tainted: G W 5.10.240-syzkaller #0 [ 1577.743263][T25483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1577.753416][T25483] Call Trace: [ 1577.756710][T25483] __dump_stack+0x21/0x24 [ 1577.761039][T25483] dump_stack_lvl+0x169/0x1d8 [ 1577.765714][T25483] ? show_regs_print_info+0x18/0x18 [ 1577.771074][T25483] dump_stack+0x15/0x1c [ 1577.775270][T25483] should_fail+0x3c1/0x510 [ 1577.779721][T25483] should_fail_usercopy+0x1a/0x20 [ 1577.784752][T25483] _copy_from_user+0x20/0xd0 [ 1577.789362][T25483] memdup_user+0x5e/0xb0 [ 1577.793617][T25483] map_lookup_and_delete_elem+0x25b/0x530 [ 1577.799349][T25483] __se_sys_bpf+0x454/0x680 [ 1577.803944][T25483] ? __x64_sys_bpf+0x90/0x90 [ 1577.808538][T25483] ? fpu__clear_all+0x20/0x20 [ 1577.813217][T25483] __x64_sys_bpf+0x7b/0x90 [ 1577.817647][T25483] do_syscall_64+0x31/0x40 [ 1577.822066][T25483] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1577.828046][T25483] RIP: 0033:0x7f4bdb142be9 [ 1577.832577][T25483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1577.852365][T25483] RSP: 002b:00007f4bd9b8a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1577.860782][T25483] RAX: ffffffffffffffda RBX: 00007f4bdb36a090 RCX: 00007f4bdb142be9 [ 1577.868761][T25483] RDX: 0000000000000020 RSI: 00002000000004c0 RDI: 0000000000000015 [ 1577.876818][T25483] RBP: 00007f4bd9b8a090 R08: 0000000000000000 R09: 0000000000000000 [ 1577.884807][T25483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1577.892814][T25483] R13: 00007f4bdb36a128 R14: 00007f4bdb36a090 R15: 00007ffca4c95518 [ 1578.191195][T25500] device veth1_macvtap left promiscuous mode [ 1578.252422][T25500] device macsec0 left promiscuous mode [ 1578.458320][T25511] syz.5.16462[25511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1578.458424][T25511] syz.5.16462[25511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1578.659818][T25520] device veth0_vlan left promiscuous mode [ 1578.686946][T25520] device veth0_vlan entered promiscuous mode [ 1578.849914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1578.858414][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1578.866731][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1579.007767][T25539] syz.5.16471[25539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1579.007868][T25539] syz.5.16471[25539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1579.020345][T25539] FAULT_INJECTION: forcing a failure. [ 1579.020345][T25539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1579.045570][T25539] CPU: 1 PID: 25539 Comm: syz.5.16471 Tainted: G W 5.10.240-syzkaller #0 [ 1579.055575][T25539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1579.065714][T25539] Call Trace: [ 1579.069025][T25539] __dump_stack+0x21/0x24 [ 1579.073372][T25539] dump_stack_lvl+0x169/0x1d8 [ 1579.078146][T25539] ? thaw_kernel_threads+0x220/0x220 [ 1579.083445][T25539] ? show_regs_print_info+0x18/0x18 [ 1579.088774][T25539] ? __kasan_check_write+0x14/0x20 [ 1579.093930][T25539] ? prep_compound_page+0x253/0x330 [ 1579.099144][T25539] dump_stack+0x15/0x1c [ 1579.103402][T25539] should_fail+0x3c1/0x510 [ 1579.107964][T25539] should_fail_usercopy+0x1a/0x20 [ 1579.112987][T25539] copy_to_user_nofault+0x9c/0x150 [ 1579.118095][T25539] bpf_probe_write_user+0x98/0xf0 [ 1579.123205][T25539] bpf_prog_c7763bb3f68e5cb3+0x38/0x184 [ 1579.128749][T25539] bpf_trace_run4+0xd5/0x240 [ 1579.133451][T25539] ? bpf_trace_run3+0x230/0x230 [ 1579.138306][T25539] ? __alloc_pages_nodemask+0x5f0/0x5f0 [ 1579.143850][T25539] __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 1579.149324][T25539] __alloc_pages_nodemask+0x5b4/0x5f0 [ 1579.154699][T25539] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1579.160302][T25539] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1579.166902][T25539] ? proc_fail_nth_read+0x210/0x210 [ 1579.172116][T25539] kmalloc_order+0x4c/0x160 [ 1579.176621][T25539] kmalloc_order_trace+0x16/0x80 [ 1579.182043][T25539] __kmalloc+0x1ee/0x330 [ 1579.186287][T25539] map_lookup_and_delete_elem+0x314/0x530 [ 1579.192058][T25539] __se_sys_bpf+0x454/0x680 [ 1579.197101][T25539] ? __x64_sys_bpf+0x90/0x90 [ 1579.201721][T25539] __x64_sys_bpf+0x7b/0x90 [ 1579.206140][T25539] do_syscall_64+0x31/0x40 [ 1579.210647][T25539] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1579.216573][T25539] RIP: 0033:0x7f7acb146be9 [ 1579.220993][T25539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1579.240674][T25539] RSP: 002b:00007f7ac9baf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1579.249095][T25539] RAX: ffffffffffffffda RBX: 00007f7acb36dfa0 RCX: 00007f7acb146be9 [ 1579.257071][T25539] RDX: 0000000000000020 RSI: 00002000000004c0 RDI: 0000000000000015 [ 1579.265056][T25539] RBP: 00007f7ac9baf090 R08: 0000000000000000 R09: 0000000000000000 [ 1579.273058][T25539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1579.281029][T25539] R13: 00007f7acb36e038 R14: 00007f7acb36dfa0 R15: 00007ffc722e27b8 [ 1579.391850][T25547] syz.9.16474[25547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1579.391942][T25547] syz.9.16474[25547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1580.097886][T25582] syz.5.16484[25582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1580.269287][T25582] syz.5.16484[25582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1580.357683][T25589] FAULT_INJECTION: forcing a failure. [ 1580.357683][T25589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1580.400598][T25588] device syzkaller0 entered promiscuous mode [ 1580.411542][T25589] CPU: 0 PID: 25589 Comm: syz.5.16484 Tainted: G W 5.10.240-syzkaller #0 [ 1580.421574][T25589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1580.431816][T25589] Call Trace: [ 1580.435143][T25589] __dump_stack+0x21/0x24 [ 1580.439504][T25589] dump_stack_lvl+0x169/0x1d8 [ 1580.444217][T25589] ? show_regs_print_info+0x18/0x18 [ 1580.449460][T25589] ? format_decode+0x1bb/0x1520 [ 1580.454358][T25589] dump_stack+0x15/0x1c [ 1580.458667][T25589] should_fail+0x3c1/0x510 [ 1580.463159][T25589] should_fail_usercopy+0x1a/0x20 [ 1580.468304][T25589] _copy_from_user+0x20/0xd0 [ 1580.473034][T25589] kstrtouint_from_user+0xbe/0x200 [ 1580.478185][T25589] ? kstrtol_from_user+0x260/0x260 [ 1580.483336][T25589] ? memset+0x35/0x40 [ 1580.487434][T25589] ? avc_policy_seqno+0x1b/0x70 [ 1580.492322][T25589] ? selinux_file_permission+0x2a5/0x510 [ 1580.498022][T25589] proc_fail_nth_write+0x85/0x1f0 [ 1580.503170][T25589] ? proc_fail_nth_read+0x210/0x210 [ 1580.508482][T25589] ? rw_verify_area+0x1c0/0x360 [ 1580.513355][T25589] ? proc_fail_nth_read+0x210/0x210 [ 1580.518571][T25589] vfs_write+0x32d/0xd60 [ 1580.522827][T25589] ? kernel_write+0x3c0/0x3c0 [ 1580.527510][T25589] ? __kasan_check_write+0x14/0x20 [ 1580.532638][T25589] ? __kasan_check_write+0x14/0x20 [ 1580.537765][T25589] ? mutex_lock+0x8c/0xe0 [ 1580.542112][T25589] ? mutex_trylock+0xa0/0xa0 [ 1580.546727][T25589] ? __fget_files+0x2c4/0x320 [ 1580.551428][T25589] ? __fdget_pos+0x2d2/0x380 [ 1580.556054][T25589] ? ksys_write+0x71/0x240 [ 1580.560544][T25589] ksys_write+0x140/0x240 [ 1580.564877][T25589] ? __ia32_sys_read+0x90/0x90 [ 1580.569644][T25589] ? fpu__clear_all+0x20/0x20 [ 1580.574345][T25589] __x64_sys_write+0x7b/0x90 [ 1580.579164][T25589] do_syscall_64+0x31/0x40 [ 1580.583859][T25589] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1580.589772][T25589] RIP: 0033:0x7f7acb14569f [ 1580.594494][T25589] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1580.614473][T25589] RSP: 002b:00007f7ac9b8e030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1580.622907][T25589] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7acb14569f [ 1580.630885][T25589] RDX: 0000000000000001 RSI: 00007f7ac9b8e0a0 RDI: 0000000000000004 [ 1580.638871][T25589] RBP: 00007f7ac9b8e090 R08: 0000000000000000 R09: 0000000000000000 [ 1580.646943][T25589] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1580.655210][T25589] R13: 00007f7acb36e128 R14: 00007f7acb36e090 R15: 00007ffc722e27b8 [ 1581.226778][T25606] device pim6reg1 entered promiscuous mode [ 1583.674593][T25737] tap0: tun_chr_ioctl cmd 1074025675 [ 1583.687803][T25737] tap0: persist enabled [ 1583.696569][T25737] tap0: tun_chr_ioctl cmd 1074025675 [ 1583.707078][T25737] tap0: persist disabled [ 1583.862873][T25748] device syzkaller0 entered promiscuous mode [ 1584.610038][T25775] device syzkaller0 entered promiscuous mode [ 1585.382829][T25802] device syzkaller0 entered promiscuous mode [ 1585.389982][T25805] device sit0 left promiscuous mode [ 1585.449511][T25805] device sit0 entered promiscuous mode [ 1586.783858][T25863] device veth0_vlan left promiscuous mode [ 1586.790115][T25863] device veth0_vlan entered promiscuous mode [ 1586.895620][T25863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1586.961055][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1586.972548][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1587.007230][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1587.292031][T25881] device sit0 left promiscuous mode [ 1587.467368][T25884] device sit0 entered promiscuous mode [ 1588.152178][T25918] device wg2 entered promiscuous mode [ 1588.246779][T25933] device wg2 left promiscuous mode [ 1588.370965][T25933] device wg2 entered promiscuous mode [ 1588.833901][T25971] device sit0 left promiscuous mode [ 1588.940764][T25974] device sit0 entered promiscuous mode [ 1589.941742][T26026] device syzkaller0 entered promiscuous mode [ 1590.042160][T26026] device pim6reg1 entered promiscuous mode [ 1590.570986][T26060] device pim6reg1 entered promiscuous mode [ 1592.257516][T26120] device veth0_vlan left promiscuous mode [ 1592.290231][T26120] device veth0_vlan entered promiscuous mode [ 1592.297471][T26120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1592.305798][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1592.314807][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1592.323861][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1592.692124][T26161] bpf_get_probe_write_proto: 4 callbacks suppressed [ 1592.692136][T26161] syz.0.16659[26161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1592.698899][T26161] syz.0.16659[26161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1593.860369][T26221] device pim6reg1 entered promiscuous mode [ 1594.030050][T26238] syz.8.16680[26238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1594.030143][T26238] syz.8.16680[26238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1594.671782][T26270] device pim6reg1 entered promiscuous mode [ 1594.966738][T26283] device wg2 left promiscuous mode [ 1594.982584][T26284] syz.7.16692[26284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1594.982691][T26284] syz.7.16692[26284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1595.058804][T26291] device wg2 entered promiscuous mode [ 1596.116378][T26327] device pim6reg1 entered promiscuous mode [ 1596.475462][T26345] device syzkaller0 entered promiscuous mode [ 1597.892506][T26396] device syzkaller0 entered promiscuous mode [ 1599.375652][T26446] Ÿë: port 1(erspan0) entered blocking state [ 1599.382207][T26446] Ÿë: port 1(erspan0) entered disabled state [ 1599.392345][T26446] device erspan0 entered promiscuous mode [ 1599.409315][T26446] device erspan0 left promiscuous mode [ 1599.417927][T26446] Ÿë: port 1(erspan0) entered disabled state [ 1599.551775][T26452] syz.9.16741[26452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1599.551895][T26452] syz.9.16741[26452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1599.597082][T26454] device pim6reg1 entered promiscuous mode [ 1599.838065][T26459] device syzkaller0 entered promiscuous mode [ 1599.889016][T26471] syz.7.16747[26471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1599.889109][T26471] syz.7.16747[26471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1600.266005][T26487] device wg2 left promiscuous mode [ 1600.348036][T26487] device wg2 entered promiscuous mode [ 1600.659701][T26512] device macsec0 entered promiscuous mode [ 1600.793810][T26512] device veth1_macvtap entered promiscuous mode [ 1600.823960][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1601.941392][T26579] device veth0_vlan left promiscuous mode [ 1601.959270][T26579] device veth0_vlan entered promiscuous mode [ 1602.039137][T26580] device syzkaller0 entered promiscuous mode [ 1602.235663][T26593] device pim6reg1 entered promiscuous mode [ 1602.581288][T26611] device bridge_slave_1 left promiscuous mode [ 1602.607855][T26611] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.756115][T26611] device bridge_slave_0 left promiscuous mode [ 1602.773049][T26611] bridge0: port 1(bridge_slave_0) entered disabled state [ 1602.919500][T26617] syz.8.16788[26617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1602.919678][T26617] syz.8.16788[26617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1603.313752][T26644] device sit0 left promiscuous mode [ 1603.657644][T26660] device veth0_vlan left promiscuous mode [ 1603.668656][T26660] device veth0_vlan entered promiscuous mode [ 1603.690507][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1603.701154][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1603.708602][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1604.949319][T26715] device veth0_vlan left promiscuous mode [ 1604.979804][T26715] device veth0_vlan entered promiscuous mode [ 1605.044173][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1605.052357][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1605.059696][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1605.146034][T26716] device pim6reg1 entered promiscuous mode [ 1605.423353][T26734] device sit0 left promiscuous mode [ 1605.584390][T26730] device wg2 left promiscuous mode [ 1605.591094][T26741] device sit0 entered promiscuous mode [ 1605.848727][T26747] device syzkaller0 entered promiscuous mode [ 1606.137692][T26775] syz.5.16837[26775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1606.137798][T26775] syz.5.16837[26775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1606.493422][T26789] device veth1_macvtap left promiscuous mode [ 1606.734502][T26789] device macsec0 entered promiscuous mode [ 1606.964872][T26802] syz.9.16844[26802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1606.964964][T26802] syz.9.16844[26802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1607.120457][T26807] device veth0_vlan left promiscuous mode [ 1607.151669][T26807] device veth0_vlan entered promiscuous mode [ 1607.179796][T26807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1607.201140][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1607.209787][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1607.222187][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1607.423056][T26830] syz.0.16852[26830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1608.954513][T26909] device macsec0 left promiscuous mode [ 1609.001131][T26913] device syzkaller0 entered promiscuous mode [ 1609.428457][T26943] device pim6reg1 entered promiscuous mode [ 1609.612002][T26949] device pim6reg1 entered promiscuous mode [ 1609.945167][T26965] tap0: tun_chr_ioctl cmd 1074025677 [ 1609.992046][T26965] tap0: linktype set to 823 [ 1610.161412][T26965] tap1: tun_chr_ioctl cmd 1074025675 [ 1610.169879][T26965] tap1: persist enabled [ 1610.198267][T26965] tap1: tun_chr_ioctl cmd 1074025675 [ 1610.222508][T26965] tap1: persist enabled [ 1610.402916][T26974] syz.5.16893[26974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1610.403024][T26974] syz.5.16893[26974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1610.466906][T26976] syz.7.16894[26976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1610.479159][T26976] syz.7.16894[26976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1611.116215][T26988] device wg2 entered promiscuous mode [ 1611.689752][T27030] device macsec0 entered promiscuous mode [ 1611.841108][T27037] device pim6reg1 entered promiscuous mode [ 1613.670962][T27080] device syzkaller0 entered promiscuous mode [ 1613.755210][T27082] device wg2 entered promiscuous mode [ 1614.335219][T27105] device pim6reg1 entered promiscuous mode [ 1614.813093][T27130] syz.7.16937[27130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1614.813192][T27130] syz.7.16937[27130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1616.230659][T27198] syz.8.16954[27198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1617.047400][T27285] device pim6reg1 entered promiscuous mode [ 1617.332641][T27310] device syzkaller0 entered promiscuous mode [ 1617.451271][T27307] device wg2 left promiscuous mode [ 1618.988116][T27371] device syzkaller0 entered promiscuous mode [ 1620.573595][T27448] device sit0 left promiscuous mode [ 1621.058929][T27454] device sit0 entered promiscuous mode [ 1621.082219][T27466] syz.7.17034[27466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1621.082334][T27466] syz.7.17034[27466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1622.607886][T27568] device veth0_vlan left promiscuous mode [ 1622.625964][T27568] device veth0_vlan entered promiscuous mode [ 1622.633384][T27568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1622.641875][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1622.677058][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1622.684964][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1624.283182][T27659] device sit0 left promiscuous mode [ 1624.739657][T27671] device wg2 left promiscuous mode [ 1624.792900][T27670] device macsec0 left promiscuous mode [ 1624.829663][T27671] device veth1_macvtap entered promiscuous mode [ 1624.876650][T27671] device macsec0 entered promiscuous mode [ 1624.932790][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1625.293737][T27700] device sit0 left promiscuous mode [ 1625.693345][T27715] device veth0_to_team entered promiscuous mode [ 1626.114937][T27725] device syzkaller0 entered promiscuous mode [ 1626.543269][T27739] device pim6reg1 entered promiscuous mode [ 1626.614067][T27742] device pim6reg1 entered promiscuous mode [ 1627.426844][T27768] device sit0 entered promiscuous mode [ 1627.871060][T27774] device sit0 left promiscuous mode [ 1627.985501][T27776] device sit0 entered promiscuous mode [ 1631.537223][T27885] device syzkaller0 entered promiscuous mode [ 1631.780373][T27902] syz.0.17156[27902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1631.806877][T27902] syz.0.17156[27902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1632.701090][T27929] tun0: tun_chr_ioctl cmd 1074025678 [ 1632.731038][T27929] tun0: group set to 1 [ 1635.192589][T27985] device macsec0 left promiscuous mode [ 1635.931691][T28022] device veth0_vlan left promiscuous mode [ 1635.984919][T28022] device veth0_vlan entered promiscuous mode [ 1636.080955][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1636.089632][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1636.152074][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1636.879469][T28056] device pim6reg1 entered promiscuous mode [ 1638.429080][T28094] device wg2 entered promiscuous mode [ 1638.749420][T28096] device syzkaller0 entered promiscuous mode [ 1644.263033][T28291] device pim6reg1 entered promiscuous mode [ 1645.578680][T28366] device pim6reg1 entered promiscuous mode [ 1646.189387][T28380] tap0: tun_chr_ioctl cmd 1074025680 [ 1646.643649][T28417] syz.7.17302[28417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1649.496616][T28598] device sit0 entered promiscuous mode [ 1649.775404][T28586] device macsec0 entered promiscuous mode [ 1650.497312][T28655] syz.5.17365[28655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1650.497370][T28655] syz.5.17365[28655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1653.961709][ T95] udevd[95]: worker [20716] terminated by signal 33 (Unknown signal 33) [ 1654.112218][ T95] udevd[95]: worker [20756] terminated by signal 33 (Unknown signal 33) [ 1655.642166][T28684] udevd[28684]: failed to send result of seq 133279 to main daemon: Connection refused [ 1656.884150][T28739] device veth0_vlan left promiscuous mode [ 1656.895070][T28739] device veth0_vlan entered promiscuous mode [ 1656.929822][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1656.939382][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1656.953355][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1660.995380][T28951] device macsec0 left promiscuous mode [ 1661.069577][T28935] device pim6reg1 entered promiscuous mode [ 1661.378575][T28967] syz.7.17449[28967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1661.378741][T28967] syz.7.17449[28967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1661.392384][T28969] device sit0 left promiscuous mode [ 1661.588247][T28974] device sit0 entered promiscuous mode [ 1661.706918][T28980] tap0: tun_chr_ioctl cmd 1074025677 [ 1661.737228][T28980] tap0: linktype set to 778 [ 1662.247647][T29000] device sit0 left promiscuous mode [ 1664.144447][T29028] device wg2 left promiscuous mode [ 1664.371771][T29028] device wg2 entered promiscuous mode [ 1664.543526][T29064] device veth1_macvtap left promiscuous mode [ 1664.583606][T29064] device macsec0 left promiscuous mode [ 1664.785811][T29084] device pim6reg1 entered promiscuous mode [ 1668.136839][T29169] syz.9.17510[29169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1668.136946][T29169] syz.9.17510[29169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1669.465164][T29233] device pim6reg1 entered promiscuous mode [ 1670.250748][T29273] device syzkaller0 entered promiscuous mode [ 1671.290976][T29317] device pim6reg1 entered promiscuous mode [ 1672.042738][T29358] device pim6reg1 entered promiscuous mode [ 1672.322072][T29362] device syzkaller0 entered promiscuous mode [ 1674.704107][T29436] device syzkaller0 entered promiscuous mode [ 1674.883325][T29438] device sit0 left promiscuous mode [ 1675.090961][T29446] syz.7.17592[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1675.091064][T29446] syz.7.17592[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1676.420144][T29514] device veth0_vlan left promiscuous mode [ 1676.532935][T29514] device veth0_vlan entered promiscuous mode [ 1676.588107][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1676.602185][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1676.622890][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1676.904816][T29552] device gre0 entered promiscuous mode [ 1677.743989][T29578] device sit0 entered promiscuous mode [ 1679.184704][T29639] device wg2 left promiscuous mode [ 1679.932123][T29677] device veth0_vlan left promiscuous mode [ 1679.940416][T29677] device veth0_vlan entered promiscuous mode [ 1680.003794][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1680.022458][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1680.044558][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1680.558455][T29731] pim6reg0: tun_chr_ioctl cmd 3221517374 [ 1681.690010][T29755] device veth0_vlan left promiscuous mode [ 1681.704388][T29755] device veth0_vlan entered promiscuous mode [ 1681.728712][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1681.739604][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1681.752866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1681.848131][T29764] device syzkaller0 left promiscuous mode [ 1682.232538][T29775] device pim6reg1 entered promiscuous mode [ 1683.441010][T29812] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1683.663893][T29820] ÿÿÿÿÿÿ: renamed from vlan1 [ 1684.449304][T29856] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1685.080877][T29879] device syzkaller0 entered promiscuous mode [ 1687.362721][T29945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.369818][T29945] bridge0: port 1(bridge_slave_0) entered disabled state [ 1687.411129][T29945] device bridge_slave_0 entered promiscuous mode [ 1687.471933][T29945] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.489960][T29945] bridge0: port 2(bridge_slave_1) entered disabled state [ 1687.513870][T29945] device bridge_slave_1 entered promiscuous mode [ 1687.706545][T29945] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.713764][T29945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1687.721077][T29945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.728505][T29945] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1687.884682][T20902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1687.892480][T20902] bridge0: port 2(bridge_slave_1) entered disabled state [ 1687.900163][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1687.908220][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1687.917951][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1687.926763][T20902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.933864][T20902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1687.963443][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1687.978839][T20902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.986140][T20902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1688.021068][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1688.030305][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1688.039018][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1688.055615][T29945] device veth0_vlan entered promiscuous mode [ 1688.062240][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1688.070909][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1688.079349][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1688.105889][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1688.121976][T29945] device veth1_macvtap entered promiscuous mode [ 1688.177245][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1688.200871][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1689.532146][T30079] device veth0_vlan left promiscuous mode [ 1689.565518][T30079] device veth0_vlan entered promiscuous mode [ 1689.583309][T30079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1689.607467][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1689.618817][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1689.626803][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1692.063046][T30206] syz.7.17802[30206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1692.063119][T30206] syz.7.17802[30206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1693.759034][T30249] device syzkaller0 entered promiscuous mode [ 1693.796117][T30249] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1693.902919][T30262] syz.9.17819[30262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1693.902979][T30262] syz.9.17819[30262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1694.459681][T30313] device bridge_slave_1 left promiscuous mode [ 1694.526678][T30313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1694.556228][T30313] device bridge_slave_0 left promiscuous mode [ 1694.593576][T30313] bridge0: port 1(bridge_slave_0) entered disabled state [ 1696.439678][T30394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.452042][T30394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1696.465019][T30394] device bridge_slave_0 entered promiscuous mode [ 1696.477423][T30394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1696.485052][T30394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1696.492906][T30394] device bridge_slave_1 entered promiscuous mode [ 1696.863443][T30394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1696.870534][T30394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1696.877995][T30394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.885333][T30394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1697.072185][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1697.092750][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1697.111187][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1697.132606][T30428] device wg2 left promiscuous mode [ 1697.142739][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1697.151170][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1697.170364][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1697.189908][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1697.239883][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1697.284724][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1697.357398][T30394] device veth0_vlan entered promiscuous mode [ 1697.548400][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1697.581906][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1697.597190][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1697.605301][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1697.692942][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1697.706454][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1697.781813][T30394] device veth1_macvtap entered promiscuous mode [ 1697.889737][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1697.901592][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1697.920348][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1698.011564][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1698.024033][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1698.082272][T30445] device sit0 entered promiscuous mode [ 1698.799844][T30500] syz.7.17885[30500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1698.799913][T30500] syz.7.17885[30500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1698.816441][T32356] device veth0_to_team left promiscuous mode [ 1698.847951][T32356] Ÿë: port 1(veth0_to_team) entered disabled state [ 1700.701361][T30586] device veth0_vlan left promiscuous mode [ 1700.717568][T30586] device veth0_vlan entered promiscuous mode [ 1700.772721][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1700.786483][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1700.830815][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1701.026153][T30602] syz.8.17915[30602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1701.026262][T30602] syz.8.17915[30602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1701.313781][T30609] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1703.791689][T30696] device pim6reg1 entered promiscuous mode [ 1705.224568][T30747] device syzkaller0 entered promiscuous mode [ 1705.460295][T30743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1705.507255][T30743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1705.525015][T30743] device bridge_slave_0 entered promiscuous mode [ 1705.573726][T30743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1705.580912][T30743] bridge0: port 2(bridge_slave_1) entered disabled state [ 1705.678496][T30743] device bridge_slave_1 entered promiscuous mode [ 1705.729270][T30780] device pim6reg1 entered promiscuous mode [ 1706.115430][T30788] device vxcan1 entered promiscuous mode [ 1706.329508][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1706.352802][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1706.400035][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1706.409353][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1706.443013][T20902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1706.450083][T20902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1706.477959][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1706.488433][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1706.497453][T20902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1706.504620][T20902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1706.552145][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1706.580841][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1706.618529][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1706.628675][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1706.637971][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1706.669973][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1706.684517][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1706.703578][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1706.717157][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1706.734874][T30743] device veth0_vlan entered promiscuous mode [ 1706.817433][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1706.832082][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1706.842596][T30810] syz.7.17975[30810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1706.842718][T30810] syz.7.17975[30810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1706.889501][T30743] device veth1_macvtap entered promiscuous mode [ 1707.056005][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1707.075840][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1707.104705][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1707.130775][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1707.139615][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1707.148579][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1707.163962][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1707.208608][T30822] device pim6reg1 entered promiscuous mode [ 1707.411006][T32356] device veth0_to_team left promiscuous mode [ 1707.421644][T32356] Ÿë: port 1(veth0_to_team) entered disabled state [ 1707.447211][T32356] device veth0_vlan left promiscuous mode [ 1708.415900][T30856] device syzkaller0 entered promiscuous mode [ 1709.325678][T30916] syz.9.18006[30916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1709.325775][T30916] syz.9.18006[30916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1711.101072][T31013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1711.155188][T31013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1711.185848][T31013] device bridge_slave_0 entered promiscuous mode [ 1711.239234][T31013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1711.251896][T31013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1711.266549][T31013] device bridge_slave_1 entered promiscuous mode [ 1711.564951][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1711.575040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1711.597499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1711.613694][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1711.639898][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1711.647042][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1711.681674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1711.711372][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1711.720346][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1711.727524][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1711.746375][T31036] device pim6reg1 entered promiscuous mode [ 1711.834086][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1711.842292][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1711.850354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1711.886303][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1711.902625][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1711.912371][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1711.920403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1711.929689][T31013] device veth0_vlan entered promiscuous mode [ 1711.943373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1711.959522][T31013] device veth1_macvtap entered promiscuous mode [ 1711.973778][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1712.030957][T31059] device veth1_macvtap left promiscuous mode [ 1712.037396][T31059] device macsec0 entered promiscuous mode [ 1712.078175][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1713.439268][T31106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1713.478963][T31106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.535596][T31106] device bridge_slave_0 entered promiscuous mode [ 1713.598187][T31124] device wg2 entered promiscuous mode [ 1713.871268][T31106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1713.880731][T31106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1713.906890][T31106] device bridge_slave_1 entered promiscuous mode [ 1714.657445][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1714.666875][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1714.770030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1714.778601][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1714.787222][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1714.794330][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1714.802976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1714.811670][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1714.820401][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1714.827514][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1714.837250][T31147] device pim6reg1 entered promiscuous mode [ 1714.872601][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1714.880464][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1714.889863][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1714.898442][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1714.908333][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1714.989917][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1714.999511][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1715.116700][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1715.124796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1715.139044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1715.147718][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1715.156679][T31106] device veth0_vlan entered promiscuous mode [ 1715.235949][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1715.245982][T31106] device veth1_macvtap entered promiscuous mode [ 1715.258032][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1715.281813][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1715.328905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1715.338120][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1715.942144][T32356] device bridge_slave_1 left promiscuous mode [ 1715.948350][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.012829][T32356] device bridge_slave_0 left promiscuous mode [ 1716.019119][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1716.144154][T32356] device veth1_macvtap left promiscuous mode [ 1717.097015][T31223] bridge0: port 2(bridge_slave_1) entered disabled state [ 1717.105600][T31223] bridge0: port 1(bridge_slave_0) entered disabled state [ 1721.459627][T31400] device syzkaller0 entered promiscuous mode [ 1721.705459][T31416] €Â0: renamed from pim6reg1 [ 1722.568683][T31448] device macsec0 left promiscuous mode [ 1722.956429][T31455] device pim6reg1 entered promiscuous mode [ 1723.404848][T31497] device syzkaller0 entered promiscuous mode [ 1723.615194][T31501] device syzkaller0 entered promiscuous mode [ 1723.707602][T31512] device veth0_vlan left promiscuous mode [ 1723.719092][T31512] device veth0_vlan entered promiscuous mode [ 1723.728306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1723.737410][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1723.745642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1723.856373][T31523] device veth1_macvtap left promiscuous mode [ 1723.870451][T31523] device macsec0 entered promiscuous mode [ 1723.927364][T31531] device wg2 entered promiscuous mode [ 1723.946738][T31526] ÿÿÿÿÿÿ: renamed from vlan1 [ 1724.484935][T31572] device wg2 left promiscuous mode [ 1726.887670][T31663] device syzkaller0 entered promiscuous mode [ 1727.858591][T31733] device wg2 left promiscuous mode [ 1727.947806][T31733] device wg2 entered promiscuous mode [ 1728.446052][T31758] device pim6reg1 entered promiscuous mode [ 1730.064504][T31832] device pim6reg1 entered promiscuous mode [ 1730.605037][T31857] device veth1_macvtap left promiscuous mode [ 1730.924147][T31884] syz.9.18283[31884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1730.924249][T31884] syz.9.18283[31884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1732.691948][T31930] batadv0: tun_chr_ioctl cmd 2147767521 [ 1732.768970][T31930] batadv0: tun_chr_ioctl cmd 1074025692 [ 1733.479616][T31949] device sit0 entered promiscuous mode [ 1736.101051][T32050] device veth0_vlan left promiscuous mode [ 1736.148812][T32050] device veth0_vlan entered promiscuous mode [ 1736.498574][T32067] syz.8.18340[32067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1736.500357][T32067] syz.8.18340[32067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1736.875096][T32088] tap0: tun_chr_ioctl cmd 1074025677 [ 1736.901121][T32088] tap0: linktype set to 768 [ 1737.340974][T32119] Ÿë: port 1(veth0_to_team) entered blocking state [ 1737.360386][T32119] Ÿë: port 1(veth0_to_team) entered disabled state [ 1737.369319][T32119] device veth0_to_team entered promiscuous mode [ 1739.397710][T32200] device syzkaller0 entered promiscuous mode [ 1740.687294][T32328] device veth0_vlan left promiscuous mode [ 1740.709209][T32328] device veth0_vlan entered promiscuous mode [ 1740.762649][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1740.773471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1740.811739][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1741.591553][T32354] device sit0 entered promiscuous mode [ 1742.134328][T32383] device syzkaller0 entered promiscuous mode [ 1742.562255][T32414] device veth1_macvtap entered promiscuous mode [ 1742.572825][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1742.756026][T32430] device pim6reg1 entered promiscuous mode [ 1742.954679][T32446] device pim6reg1 entered promiscuous mode [ 1743.344769][T32467] device pim6reg1 entered promiscuous mode [ 1743.388437][T32457] tun0: tun_chr_ioctl cmd 1074025678 [ 1743.399725][T32457] tun0: group set to 1 [ 1743.690972][T32496] device syzkaller0 entered promiscuous mode [ 1745.012902][T32540] device veth0_vlan left promiscuous mode [ 1745.063039][T32540] device veth0_vlan entered promiscuous mode [ 1745.070518][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1745.097730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1745.121004][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1745.219387][T32544] syz.7.18477[32544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1745.219484][T32544] syz.7.18477[32544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1747.679946][T32637] ªªªªªª: renamed from vlan0 [ 1747.854848][T32639] device syzkaller0 entered promiscuous mode [ 1748.993511][T32667] device veth1_macvtap left promiscuous mode [ 1749.065663][T32667] device veth1_macvtap entered promiscuous mode [ 1749.075119][T32667] device macsec0 entered promiscuous mode [ 1749.118679][T32674] device sit0 left promiscuous mode [ 1749.239793][T32672] device syzkaller0 entered promiscuous mode [ 1749.257186][T32675] device sit0 entered promiscuous mode [ 1749.609733][T32693] syz.9.18521[32693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.609826][T32693] syz.9.18521[32693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.751856][T32693] device veth0_vlan left promiscuous mode [ 1749.820849][T32693] device veth0_vlan entered promiscuous mode [ 1749.876670][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1749.907623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1749.921846][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1750.479030][T32741] device syzkaller0 entered promiscuous mode [ 1750.821564][T32763] syz.8.18541[32763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1750.824392][T32763] syz.8.18541[32763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1753.782739][ T402] device pim6reg1 entered promiscuous mode [ 1754.129973][ T416] device wg2 entered promiscuous mode [ 1754.447151][ T444] FAULT_INJECTION: forcing a failure. [ 1754.447151][ T444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1754.471487][ T444] CPU: 0 PID: 444 Comm: syz.7.18583 Tainted: G W 5.10.240-syzkaller #0 [ 1754.481071][ T444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1754.491237][ T444] Call Trace: [ 1754.494831][ T444] __dump_stack+0x21/0x24 [ 1754.499195][ T444] dump_stack_lvl+0x169/0x1d8 [ 1754.503900][ T444] ? thaw_kernel_threads+0x220/0x220 [ 1754.509221][ T444] ? vsnprintf+0x1871/0x1960 [ 1754.513941][ T444] ? show_regs_print_info+0x18/0x18 [ 1754.519173][ T444] dump_stack+0x15/0x1c [ 1754.523377][ T444] should_fail+0x3c1/0x510 [ 1754.528069][ T444] should_fail_usercopy+0x1a/0x20 [ 1754.533213][ T444] _copy_to_user+0x20/0x90 [ 1754.537659][ T444] simple_read_from_buffer+0xe9/0x160 [ 1754.543408][ T444] proc_fail_nth_read+0x19a/0x210 [ 1754.548619][ T444] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1754.554258][ T444] ? rw_verify_area+0x1c0/0x360 [ 1754.559564][ T444] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1754.565214][ T444] vfs_read+0x1fe/0xa10 [ 1754.569382][ T444] ? kernel_read+0x70/0x70 [ 1754.573807][ T444] ? __kasan_check_write+0x14/0x20 [ 1754.578919][ T444] ? mutex_lock+0x8c/0xe0 [ 1754.583297][ T444] ? mutex_trylock+0xa0/0xa0 [ 1754.587993][ T444] ? __fget_files+0x2c4/0x320 [ 1754.592763][ T444] ? __fdget_pos+0x2d2/0x380 [ 1754.597348][ T444] ? ksys_read+0x71/0x240 [ 1754.601968][ T444] ksys_read+0x140/0x240 [ 1754.606211][ T444] ? vfs_write+0xd60/0xd60 [ 1754.610914][ T444] __x64_sys_read+0x7b/0x90 [ 1754.615413][ T444] do_syscall_64+0x31/0x40 [ 1754.619825][ T444] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1754.625822][ T444] RIP: 0033:0x7fa1e09745fc [ 1754.630335][ T444] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1754.650394][ T444] RSP: 002b:00007fa1df3de030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1754.659174][ T444] RAX: ffffffffffffffda RBX: 00007fa1e0b9cfa0 RCX: 00007fa1e09745fc [ 1754.667147][ T444] RDX: 000000000000000f RSI: 00007fa1df3de0a0 RDI: 0000000000000008 [ 1754.675118][ T444] RBP: 00007fa1df3de090 R08: 0000000000000000 R09: 0000000000000000 [ 1754.683178][ T444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1754.691329][ T444] R13: 00007fa1e0b9d038 R14: 00007fa1e0b9cfa0 R15: 00007ffcb2144098 [ 1754.724610][ T440] device sit0 entered promiscuous mode [ 1754.818011][ T447] device syzkaller0 entered promiscuous mode [ 1754.834050][ T446] device veth1_macvtap left promiscuous mode [ 1755.293404][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 1755.301776][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1755.431019][ T478] cgroup: fork rejected by pids controller in /syz9 [ 1755.484312][ T487] device pim6reg1 entered promiscuous mode [ 1755.806536][ T600] device pim6reg1 entered promiscuous mode [ 1755.813224][ T599] device bridge_slave_1 left promiscuous mode [ 1755.819481][ T599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1755.827259][ T599] bridge0: port 1(bridge_slave_0) entered disabled state [ 1756.496295][ T605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1756.539982][ T605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1756.571681][ T605] device bridge_slave_0 entered promiscuous mode [ 1756.621104][ T605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1756.628299][ T605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1756.636241][ T605] device bridge_slave_1 entered promiscuous mode [ 1756.923704][ T655] device wg2 left promiscuous mode [ 1756.933194][ T653] device pim6reg1 entered promiscuous mode [ 1756.996842][ T605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1757.003979][ T605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1757.011437][ T605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1757.018599][ T605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1757.105289][ T663] device pim6reg1 entered promiscuous mode [ 1757.162363][T32356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1757.170118][T32356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1757.196793][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1757.232436][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1757.279597][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1757.296722][T32356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1757.303954][T32356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1757.312655][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1757.321295][T32356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1757.328428][T32356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1757.363953][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1757.373745][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1757.382532][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1757.390276][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1757.431985][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1757.451690][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1757.460651][ T605] device veth0_vlan entered promiscuous mode [ 1757.528986][ T675] device pim6reg1 entered promiscuous mode [ 1757.589574][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1757.607766][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1757.639760][ T605] device veth1_macvtap entered promiscuous mode [ 1757.692724][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1757.722981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1757.741704][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1757.751117][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1757.759786][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1757.868339][ T688] device syzkaller0 entered promiscuous mode [ 1757.892531][T20902] device bridge_slave_1 left promiscuous mode [ 1757.898739][T20902] bridge0: port 2(bridge_slave_1) entered disabled state [ 1757.916851][T20902] device bridge_slave_0 left promiscuous mode [ 1757.923389][T20902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1757.981923][T20902] device veth0_vlan left promiscuous mode [ 1759.281959][ T783] device pim6reg1 entered promiscuous mode [ 1759.752272][ T817] device pim6reg1 entered promiscuous mode [ 1759.920374][ T829] device sit0 entered promiscuous mode [ 1760.351841][ T834] device syzkaller0 entered promiscuous mode [ 1761.083736][ T886] bridge0: port 3(veth1) entered blocking state [ 1761.102497][ T886] bridge0: port 3(veth1) entered disabled state [ 1761.122152][ T886] device veth1 entered promiscuous mode [ 1761.169899][ T886] bridge0: port 3(veth1) entered blocking state [ 1761.176632][ T886] bridge0: port 3(veth1) entered forwarding state [ 1761.245434][ T887] device macsec0 entered promiscuous mode [ 1762.006464][ T909] device pim6reg1 entered promiscuous mode [ 1762.878696][ T939] device pim6reg1 entered promiscuous mode [ 1763.193749][ T962] bridge0: port 3(veth1) entered disabled state [ 1763.200132][ T962] bridge0: port 2(bridge_slave_1) entered disabled state [ 1763.207382][ T962] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.640896][ T987] tap0: tun_chr_ioctl cmd 1074025677 [ 1763.650339][ T987] tap0: linktype set to 773 [ 1765.507136][ T1067] device syzkaller0 entered promiscuous mode [ 1765.971647][ T1093] device syzkaller0 entered promiscuous mode [ 1766.958755][ T1127] device syzkaller0 entered promiscuous mode [ 1767.326155][ T1140] device syzkaller0 entered promiscuous mode [ 1767.806927][ T1153] device pim6reg1 entered promiscuous mode [ 1768.212600][ T1158] device sit0 left promiscuous mode [ 1768.765093][ T1195] device veth0_vlan left promiscuous mode [ 1769.094021][ T1195] device veth0_vlan entered promiscuous mode [ 1769.433988][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1769.448312][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1769.457427][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1769.473762][ T1198] device pim6reg1 entered promiscuous mode [ 1769.656501][ T1213] device syzkaller0 entered promiscuous mode [ 1769.820437][ T1236] device veth0_vlan left promiscuous mode [ 1769.838780][ T1236] device veth0_vlan entered promiscuous mode [ 1770.306581][ T1253] device veth0_vlan left promiscuous mode [ 1770.323607][ T1253] device veth0_vlan entered promiscuous mode [ 1770.383287][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1770.392162][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1770.441971][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1770.488058][ T1264] @0Ù: renamed from bond_slave_1 [ 1771.751596][ T1332] device pim6reg1 entered promiscuous mode [ 1772.103811][ T1339] device syzkaller0 entered promiscuous mode [ 1772.662377][ T1355] bridge0: port 1(bridge_slave_0) entered blocking state [ 1772.687411][ T1355] bridge0: port 1(bridge_slave_0) entered disabled state [ 1772.726511][ T1355] device bridge_slave_0 entered promiscuous mode [ 1772.784918][ T1355] bridge0: port 2(bridge_slave_1) entered blocking state [ 1772.801469][ T1355] bridge0: port 2(bridge_slave_1) entered disabled state [ 1772.815032][ T1355] device bridge_slave_1 entered promiscuous mode [ 1773.275186][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1773.289126][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1773.326643][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1773.422254][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1773.459063][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1773.466311][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1773.542920][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1773.665201][ T1405] device syzkaller0 entered promiscuous mode [ 1773.692591][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1773.702770][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1773.713871][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1773.720961][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1773.739517][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1773.748076][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1773.764432][ T1411] device pim6reg1 entered promiscuous mode [ 1773.790269][ T1355] device veth0_vlan entered promiscuous mode [ 1773.820116][ T1355] device veth1_macvtap entered promiscuous mode [ 1773.846225][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1773.861969][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1773.876687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1773.892231][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1773.932171][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1773.940931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1773.958801][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1773.999235][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1774.014771][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1774.031190][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1774.049567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1774.058549][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1774.071750][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1775.574118][ T1498] device sit0 left promiscuous mode [ 1778.322763][ T1620] device vlan0 entered promiscuous mode [ 1778.442969][ T1620] device syzkaller0 entered promiscuous mode [ 1781.547212][ T1750] device sit0 entered promiscuous mode [ 1781.848137][ T1759] device sit0 entered promiscuous mode [ 1784.646837][ T1871] device pim6reg1 entered promiscuous mode [ 1785.159111][ T1882] device veth0_vlan left promiscuous mode [ 1785.172629][ T1882] device veth0_vlan entered promiscuous mode [ 1785.265695][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1785.295500][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1785.352498][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1785.900744][ T1924] device syzkaller0 entered promiscuous mode [ 1787.284522][ T1978] device wg2 entered promiscuous mode [ 1787.668085][ T2006] device syzkaller0 entered promiscuous mode [ 1789.703961][ T2120] device sit0 entered promiscuous mode [ 1791.409827][ T2176] device pim6reg1 entered promiscuous mode [ 1791.853522][ T2224] syz.9.19065[2224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1791.853644][ T2224] syz.9.19065[2224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1793.857155][ T2324] device syzkaller0 entered promiscuous mode [ 1794.223649][ T2342] device veth1_macvtap entered promiscuous mode [ 1794.342357][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1795.094237][ T2371] device veth0_vlan left promiscuous mode [ 1795.131808][ T2371] device veth0_vlan entered promiscuous mode [ 1795.171634][ T2370] device sit0 entered promiscuous mode [ 1795.442151][ T2408] syz.7.19117[2408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1795.442245][ T2408] syz.7.19117[2408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1795.445977][ T2406] device syzkaller0 entered promiscuous mode [ 1796.996287][ T2480] device syzkaller0 entered promiscuous mode [ 1797.825803][ T2522] device syzkaller0 entered promiscuous mode [ 1798.201560][ T2571] device veth1_macvtap left promiscuous mode [ 1798.410046][ T2577] device veth1_macvtap entered promiscuous mode [ 1798.417605][ T2577] device macsec0 entered promiscuous mode [ 1798.479598][ T2588] syz.2.19167[2588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1798.479669][ T2588] syz.2.19167[2588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1799.819222][ T2654] syz.8.19186[2654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1800.021609][ T2654] syz.8.19186[2654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1803.151678][ T2739] device veth1_macvtap left promiscuous mode [ 1803.271791][ T2739] device macsec0 entered promiscuous mode [ 1803.457024][ T2745] device veth0_vlan left promiscuous mode [ 1803.509714][ T2745] device veth0_vlan entered promiscuous mode [ 1803.656117][ T2749] device sit0 left promiscuous mode [ 1803.798616][ T2755] device sit0 entered promiscuous mode [ 1804.185454][ T2777] syz.8.19223[2777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1804.185541][ T2777] syz.8.19223[2777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1804.198585][ T2777] syz.8.19223[2777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1804.235267][ T2777] syz.8.19223[2777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1806.637073][ T2826] device syzkaller0 entered promiscuous mode [ 1807.076061][ T2852] device syzkaller0 entered promiscuous mode [ 1807.680457][ T2882] device syzkaller0 entered promiscuous mode [ 1807.722719][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1807.761931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1807.801741][ T2896] syz.7.19257[2896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1807.801856][ T2896] syz.7.19257[2896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1809.810684][ T2959] device syzkaller0 entered promiscuous mode [ 1809.949128][ T2966] device syzkaller0 entered promiscuous mode [ 1812.460592][ T3090] device veth0_vlan left promiscuous mode [ 1812.492257][ T3090] device veth0_vlan entered promiscuous mode [ 1812.610843][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1812.640822][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1812.684614][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1814.695290][ T3166] device veth0_vlan left promiscuous mode [ 1814.729036][ T3166] device veth0_vlan entered promiscuous mode [ 1816.487576][ T3213] bridge0: port 2(bridge_slave_1) entered disabled state [ 1816.492185][ T3221] syz.2.19343[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1816.496935][ T3213] bridge0: port 1(bridge_slave_0) entered disabled state [ 1816.500410][ T3221] syz.2.19343[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1816.564517][ T3216] device bridge_slave_1 left promiscuous mode [ 1816.583247][ T3216] bridge0: port 2(bridge_slave_1) entered disabled state [ 1816.591083][ T3216] device bridge_slave_0 left promiscuous mode [ 1816.597680][ T3216] bridge0: port 1(bridge_slave_0) entered disabled state [ 1816.738893][ T3221] device veth0_vlan left promiscuous mode [ 1816.760889][ T3221] device veth0_vlan entered promiscuous mode [ 1816.943118][ T3238] device sit0 left promiscuous mode [ 1817.052660][ T3228] device sit0 entered promiscuous mode [ 1817.497902][ T3254] device pim6reg1 entered promiscuous mode [ 1817.882486][ T3265] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 1818.178450][ T3276] device pim6reg1 entered promiscuous mode [ 1819.191643][ T3290] device syzkaller0 entered promiscuous mode [ 1819.278165][ T3299] device syzkaller0 entered promiscuous mode [ 1819.631641][ T3304] device sit0 left promiscuous mode [ 1822.194124][ T3437] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1822.221314][ T3437] device syzkaller0 entered promiscuous mode [ 1822.783723][ T3471] device wg2 entered promiscuous mode [ 1822.887640][ T3486] device sit0 left promiscuous mode [ 1823.573906][ T3523] syz.9.19432[3523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1823.573972][ T3523] syz.9.19432[3523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1823.665539][ T3524] device veth0_vlan left promiscuous mode [ 1823.801003][ T3524] device veth0_vlan entered promiscuous mode [ 1823.885635][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1823.912220][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1823.971730][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1824.753121][ T3568] tap0: tun_chr_ioctl cmd 1074025677 [ 1824.758646][ T3568] tap0: linktype set to 768 [ 1825.171454][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1825.215584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1825.231182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1825.482678][ T3612] device sit0 left promiscuous mode [ 1825.728407][ T3619] device sit0 entered promiscuous mode [ 1826.442073][ T3656] device wg2 left promiscuous mode [ 1826.479123][ T3654] device wg2 entered promiscuous mode [ 1826.718699][ T3680] device pim6reg1 entered promiscuous mode [ 1826.969814][ T3694] device sit0 entered promiscuous mode [ 1830.972804][ T3832] syz.2.19512[3832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1830.972911][ T3832] syz.2.19512[3832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1832.573357][ T3865] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.594858][ T3865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1836.704513][ T4079] device sit0 left promiscuous mode [ 1837.292044][ T4091] device xfrm0 entered promiscuous mode [ 1837.898732][ T4105] device syzkaller0 entered promiscuous mode [ 1838.713083][ T4153] device veth0_vlan left promiscuous mode [ 1838.739787][ T4153] device veth0_vlan entered promiscuous mode [ 1838.754303][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1838.765528][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1838.778875][T32356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1839.590286][ T4167] device syzkaller0 entered promiscuous mode [ 1840.426276][ T4184] device sit0 left promiscuous mode [ 1841.523201][ T4207] device pim6reg1 entered promiscuous mode [ 1843.733653][ T4294] cgroup: fork rejected by pids controller in /syz8 [ 1843.773734][ T4293] device sit0 entered promiscuous mode [ 1844.005536][ T4289] device syzkaller0 entered promiscuous mode [ 1844.846549][ T4313] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.868075][ T4313] bridge0: port 1(bridge_slave_0) entered disabled state [ 1844.892407][ T4313] device bridge_slave_0 entered promiscuous mode [ 1844.922592][ T4313] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.949909][ T4313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1844.970603][ T4313] device bridge_slave_1 entered promiscuous mode [ 1845.424083][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1845.444376][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1845.826406][ T4368] device syzkaller0 entered promiscuous mode [ 1845.849586][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1845.860479][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1845.874373][T20902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1845.881619][T20902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1845.901144][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1845.916163][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1845.932480][T20902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1845.939680][T20902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1845.960257][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1846.104925][ T4384] device syzkaller0 entered promiscuous mode [ 1846.261519][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1846.271824][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1846.284075][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1846.296936][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1846.399736][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1846.440688][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1846.497486][ T4313] device veth0_vlan entered promiscuous mode [ 1846.521773][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1846.551048][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1846.652527][ T4313] device veth1_macvtap entered promiscuous mode [ 1846.685119][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1846.693752][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1846.732438][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1846.762824][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1846.793151][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1846.823627][ T4407] device sit0 left promiscuous mode [ 1846.919858][ T4409] device sit0 entered promiscuous mode [ 1847.094074][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1847.122031][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1847.140410][ T49] device veth0_to_team left promiscuous mode [ 1847.152391][ T49] Ÿë: port 1(veth0_to_team) entered disabled state [ 1847.163947][ T49] device veth1_macvtap left promiscuous mode [ 1847.348770][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1847.358626][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1849.027012][ T4516] ÿÿÿÿÿÿ: renamed from vlan1 [ 1849.731951][ T4567] syz.5.19729[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1849.732014][ T4567] syz.5.19729[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1849.857321][ T4571] device pim6reg1 entered promiscuous mode [ 1849.966737][ T4574] device pim6reg1 entered promiscuous mode [ 1850.989200][ T4610] device veth0_vlan left promiscuous mode [ 1851.042038][ T4610] device veth0_vlan entered promiscuous mode [ 1851.396686][ T4632] device wg2 left promiscuous mode [ 1851.475255][ T4638] device wg2 entered promiscuous mode [ 1853.765624][ T4719] device syzkaller0 entered promiscuous mode [ 1855.202354][ T4784] syz.9.19789[4784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1855.202442][ T4784] syz.9.19789[4784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1855.475362][ T4801] device sit0 entered promiscuous mode [ 1856.523354][ T4848] device syzkaller0 entered promiscuous mode [ 1857.183785][ T4871] device sit0 entered promiscuous mode [ 1857.370778][ T4877] device syzkaller0 entered promiscuous mode [ 1858.600201][ T4946] device sit0 left promiscuous mode