last executing test programs:

1m19.00000806s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m16.759965116s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m13.702188074s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m12.119471829s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m9.634433227s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m7.179406906s ago: executing program 3 (id=1595):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m6.119259123s ago: executing program 2 (id=1774):
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0))
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071122400000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20)

1m5.992513655s ago: executing program 2 (id=1775):
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0)
sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0)
r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000100), &(0x7f0000000300)=r4}, 0x20)
sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x30)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r5=>0x0}}, 0xb)
bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r5, @fallback=0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94)
r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x12, 0x16, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x82f, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, [@exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x101, 0x0, 0x0, 0x41100, 0x1c, '\x00', r5, @fallback=0x23, r6, 0x8, &(0x7f0000000400)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xfffffffb, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x10, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xeda6}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000740)='syzkaller\x00', 0x80, 0x75, &(0x7f0000000780)=""/117, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f0000000800)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x1, 0x3, 0xc0, 0x4}, 0x10, 0x1cee1, r2, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94)
r8 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48)
r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@decl_tag={0x10, 0x0, 0x0, 0x11, 0x1, 0x1}]}, {0x0, [0x61, 0x30, 0x30, 0x61, 0x0]}}, &(0x7f00000003c0)=""/170, 0x2f, 0xaa, 0x0, 0x12e, 0x0, @void, @value}, 0x28)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
r11 = perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x1, 0x6, 0x5, 0x3, 0x0, 0x6, 0x10, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x8000000000000001, 0x1000}, 0x3188, 0xa, 0x7fffffff, 0x9, 0x8, 0x556, 0x1ff, 0x0, 0xfff, 0x0, 0xb484}, r8, 0xf, r2, 0x1)
perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x6, 0x2, 0x2, 0x7, 0x0, 0x10, 0x40b12, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000540), 0x3}, 0x4800, 0x4, 0x2, 0x9, 0x100000000, 0xc, 0x3, 0x0, 0x3, 0x0, 0x7}, r8, 0xd, r11, 0x8)
r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x12, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES32=r9, @ANYBLOB="0000000000000000b708000000000e51a29981007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7350000304673c17c77ddb00000002085"], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff56, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10)
close(r0)

1m5.844974637s ago: executing program 4 (id=1777):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='THAWED\x00', 0x7)
ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
r4 = syz_clone(0x1340200, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000780)="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")
socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={<r5=>0xffffffffffffffff})
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'erspan0\x00'})
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="ce716126521fe9543028fdd62b5ead3953e721fdd1f84b37c321f851407a4d9f9c5c08db53c23ab7fc04c1ece753c5571e83fc32e98f2593679c0a07bbbee2968a1084ebb22d70d5a8d7761a85f731091861098e97586a741bb82e5df51d1c838d3378d5", 0x64}, {&(0x7f00000003c0)="7383a6bcc9da15c63fa139b605b8f95d1e170b915b933b072c0d0249591f481b47c19a93ee5adb19f5de09c08c490d9a7c5d4d9f5fd0f55e0843dbea40dfc283c6abfbdab7c11e35c6b357b1a10837d8d35a9ebb8ef1e742c479e3b39fbca62ba92329f9ef2b4b3d02917ba6ab37f1d29f4c552eae7699f3a538e1379a9094b25806132a087e6ab7f5b537f189e7e377edda2a22ea", 0x95}, {&(0x7f0000001780)="edbf2ab4b6cdb03676f7274358b678f4c9500ef0e6ba7f43cfe2ea5eb47a4e963c3f20d784cc87d873e4d2259ab041bd35ab9a530b93dae1af1466fafb4cacfe53ee20653d2ce01c12bd483c812710eb809e8894edb83a2732ba9b85df00111104bf22adb8049f9731f37aa67971e0d61d32b641e0a49e8e0d5824b0c0a7cfe8daf569312fcc8033372f11a23012c00317b67b366c78e2866f6ed8d93e2d38e02c186e1aecfb52251428fb010297bb8a22d2eb1e653f6ee775cd4ebe82e7d8c5d3ccbfcbbc6d8f585e9a7b1183e7b9e630c1b857d620b7418c1c9b0a1d7506516106e629255a04fb0238b7c89bfda68780e69a030b10a16b9f", 0xf9}], 0x3, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}], 0x60, 0x80}, 0x20000081)
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8942, &(0x7f0000000080))
socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8922, &(0x7f0000000080))
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r6}, 0x20)

1m5.448576503s ago: executing program 2 (id=1781):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m5.447209623s ago: executing program 4 (id=1782):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

1m5.181345197s ago: executing program 2 (id=1783):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r3)
close(r4)

1m5.158766158s ago: executing program 1 (id=1784):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10)
r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, 0x0)
ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400})

1m5.157911938s ago: executing program 4 (id=1785):
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0))
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071122400000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20)

1m5.098583759s ago: executing program 2 (id=1786):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=<r2=>0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00e7ffff3f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3, @ANYRESHEX=0x0, @ANYRES64=r2, @ANYRES64=r0, @ANYRESHEX=r1], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3, @ANYRESHEX=0x0, @ANYRES64=r2, @ANYRES64=<r4=>r0, @ANYRESHEX=r1], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r7, &(0x7f0000000180), 0x40010)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xb, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=r4], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10003, @void, @value}, 0x94) (async)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xb, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=r4], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10003, @void, @value}, 0x94)
r9 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r1}, 0x8)
bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x2c, 0x3, 0xb, 0xf76, 0x41000, r5, 0x8, '\x00', 0x0, r9, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (async)
socketpair(0x1, 0x1, 0x0, &(0x7f0000000180))
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x15062, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a00000000000000", @ANYRES32, @ANYBLOB], 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r10, 0x0, 0x1ba8847c99}, 0x38)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r11, &(0x7f0000000180), 0x40010)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101})
write$cgroup_devices(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="2d84000906ffb9"], 0xffdd)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="750a000000000000611168000000000018000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

1m5.058743179s ago: executing program 4 (id=1787):
r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0)
write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'hugetlb'}, {0x2b, 'net'}]}, 0xe)
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x80cd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r2=>0x0}}, 0x10)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x7, [@struct={0x3, 0x4, 0x0, 0x4, 0x1, 0x9, [{0xc, 0x2, 0x9}, {0x2, 0x4, 0x4}, {0xf, 0x1, 0x8}, {0x200, 0x0, 0x7}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x2}, {0x9, 0x1}, {0xd, 0x2}, {0x9}, {0x8, 0x3}, {0xb, 0x5}]}, @float={0x5, 0x0, 0x0, 0x10, 0x8}, @fwd={0xf}, @union={0x10, 0x5, 0x0, 0x5, 0x0, 0x6a47, [{0x8, 0x0, 0x6}, {0x5, 0x0, 0x2}, {0x7, 0x0, 0x5}, {0x4, 0x4, 0x40a8}, {0xa, 0x1, 0x1}]}, @float={0xc, 0x0, 0x0, 0x10, 0xc}, @restrict={0xd, 0x0, 0x0, 0xb, 0x5}, @union={0x10, 0x3, 0x0, 0x5, 0x1, 0x7, [{0x10, 0x0, 0x2}, {0x5, 0x4, 0x8}, {0x3, 0x5}]}]}, {0x0, [0x30, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000380)=""/4096, 0x13f, 0x1000, 0x0, 0xb6, 0x10000, @value}, 0x28)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xc, 0x9, 0x7, 0x8, 0x9395, r1, 0x45, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x4, 0x0, @value=r3, @void, @void, @value}, 0x50)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001580)={{r1, <r5=>0xffffffffffffffff}, &(0x7f0000001500), &(0x7f0000001540)='%+9llu \x00'}, 0x20)
r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_ext={0x1c, 0x13, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0xad}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @exit, @exit]}, &(0x7f0000001480)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000014c0)={0x1, 0xa, 0x2, 0xfffffffe}, 0x10, 0x2296b, r1, 0x3, &(0x7f00000015c0)=[0xffffffffffffffff, r5, r1, r4, r4, r4], &(0x7f0000001600)=[{0x3, 0x1, 0x3, 0x3}, {0x0, 0x1, 0xc, 0x2}, {0x1, 0x5, 0x3, 0x2}], 0x10, 0x5, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001780)={{r4, <r7=>0xffffffffffffffff}, &(0x7f0000001700), &(0x7f0000001740)=r6}, 0x20)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
sendmsg$inet(r8, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000001800)}], 0x1, &(0x7f0000001880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x1f}, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x705}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xd}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr=0x64010101, @multicast1}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@generic={0xcd, 0x4, "9cc2"}, @cipso={0x86, 0x1e, 0xfffffffffffffffd, [{0x2, 0xb, "df7978a06cca1d9b68"}, {0x5, 0xd, "cbf5150331ba5840f71845"}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xf}}], 0x128}, 0x20000040)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000001a40)=r6, 0x4)
close(0xffffffffffffffff)
r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0)
ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0)
ioctl$TUNSETDEBUG(r10, 0x400454c9, &(0x7f0000001ac0)=0x7)
openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x486080, 0x0)
r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001b80)={r5, <r12=>0xffffffffffffffff}, 0x4)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001dc0)={0x7fffffff, <r13=>0x0}, 0x8)
r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001e00)=@bloom_filter={0x1e, 0x1, 0x5, 0x7, 0x5228, r11, 0x7fff, '\x00', r2, r11, 0x3, 0x0, 0x4, 0xd, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_lsm={0x1d, 0x1b, &(0x7f0000001bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x0, 0x6, 0x3, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @map_val={0x18, 0x0, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f0000001cc0)='syzkaller\x00', 0x7e3, 0x5b, &(0x7f0000001d00)=""/91, 0x40f00, 0x10, '\x00', r2, 0x1b, r11, 0x8, &(0x7f0000001d80)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, r13, 0x0, 0x0, &(0x7f0000001e80)=[r7, r5, r7, r14, r11, r11], 0x0, 0x10, 0x7, @void, @value}, 0x94)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000020c0)={r1, &(0x7f0000001f80)="8bc680702ffc78674ef5dbff8310ba2131816b4fe9f6f89cb27004d6c59bca777548aab52e4fda13995b1f804c1ee347f726d40a3e36b21bb329b16a348c8b36bf1b3ffa723c050ea4d271900198df11543b01ee0cc23d70ce854ee35d48f58adeae1494557b142c1fb8eeed478eb09c4ff5a299920d0dca72db608d53e044869bee12ee6edd6a3e9f484fd57e9074f1450243eb4344df1da4c967efa902b0aaf38862ef6b0f1455b534b505b93654d1cb9302df8835f49c659622eadfae78f2b2c2b7cbc5a3d95ca4065a2ea71440f55d02d9d847b8671ed32ef2b9a77632f0463c0621062a4a5c27100f27c1f701eabbd125213a5c4ee6", &(0x7f0000002080)=""/47}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x1, &(0x7f0000002100)=@raw=[@alu={0x7, 0x1, 0xa, 0x6, 0x1, 0xfffffffffffffff8, 0x1}], &(0x7f0000002140)='GPL\x00', 0xffff, 0x11, &(0x7f0000002180)=""/17, 0x41100, 0x63, '\x00', r2, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000021c0)={0x2, 0x8, 0x401, 0x200}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000002200)=[{0x4, 0x5, 0xa, 0xb}, {0x0, 0x1, 0xf, 0x4}, {0x0, 0x1, 0x6, 0x9}], 0x10, 0x3, @void, @value}, 0x94)
close(r0)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000002300))
r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000002340), 0x220082, 0x0)
ioctl$TUNGETVNETBE(r15, 0x800454df, &(0x7f0000002380)=0x1)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002740)={0x6, 0x8, &(0x7f0000002480)=@raw=[@ringbuf_query, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x59}, @ldst={0x3, 0x2, 0x3, 0x6, 0x1, 0xfffffffffffffff4, 0x4}], &(0x7f00000024c0)='GPL\x00', 0x0, 0xe2, &(0x7f0000002500)=""/226, 0x40f00, 0x19, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000026c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002700), 0x10, 0xb, @void, @value}, 0x94)

1m4.959889121s ago: executing program 1 (id=1788):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700"/96], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x26e1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080))
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x12)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d03000000000000000300000000000000000000010500000020000000000000000000000300"/86], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @cgroup_skb, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
close(r3)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r6=>0xffffffffffffffff})
ioctl$TUNGETDEVNETNS(r6, 0x8982, 0x20000000)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)

1m4.959265371s ago: executing program 4 (id=1789):
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=<r0=>0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
socketpair(0x1f, 0x4, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff})
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r5}, 0x10)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000007c0)=ANY=[], &(0x7f0000000040)=""/247, 0x1a, 0xf7, 0x0, 0x0, 0x0, @void, @value}, 0x28)
r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000063014000000000009500000000100000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="020000000400000008000000010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000021b00000000000000000000000000000000000000000000000da7f4dd82c1e508639d171b8000551af60dc5a3c558a550d8595a6ec131608ac7b4a3ce81ee61e08e116310a181ba1d2fe4aa78d4d54a7611a911c0aa6bf35825364881e6a5ee67f5a4d5ff55e47de2b50538eafa26beb6c1e89e830b1a308a67762f1df05a8acf5ab0acd316b33a148a6"], 0x48)
r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sendmsg$inet(r4, &(0x7f0000000840)={&(0x7f0000000500)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="7a691d754ef1eaeac6c153aa5ecc14a69c0eea36f4da09398232cfb29a6f4783c73f0e9f878344e696d70df0aa0607f93994d142e19283efb59756133664cbaa3266e691153f3003266596af50fbaeb546a93435ba", 0x55}, {&(0x7f0000000680)="b5d0fa55ec65ae5fb22c488e6743b5739a5822eef14de46e8c373acd4c69c5200cbca5b76df334f7ef9d97f4b01a102398c0c9041b54350d277bbea6ead43b38098eb3ab08524af786159b7a4c5e6f49ebdfa98f69688b896c50e5b702be84218ca4cbabe192b7812886ba93ae235d5b61c49c6b6cafd770c8", 0x79}], 0x2, &(0x7f0000000900)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x60}, 0x800)
ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
close(0xffffffffffffffff)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}})
bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r6}, 0x8)
r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000180)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYRESOCT=r2, @ANYRES32=r0, @ANYBLOB="f4fb03559561a4e17183bcd6ec223f8a779a9d66aa7c643e14ff734522179536a23f828b026afb5d3ce991658da75efadec20e149591a0a2a0d0fef98708993fffa1155daef3bb33c68c7c4527ffd4488e95e9f1a2808fb8450ce436d82b9b85db597bc539fb423052f88887e1ca3b7973b2d8f58096446e9af95a6dfb9435c0308b50733be05997417c1c75a8452f182bffc22ee8fabdb91db2af841e3efda87a9f1a3643cab5c015f3565e94fa0d7b716de914797fae64f8921fef31588f1e34e5a210ba26d28a1ba7bb4519beb069ce118090437f435f"], 0x48)
close(r7)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r10=>0xffffffffffffffff})
recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r11=>0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef)

1m4.681855945s ago: executing program 1 (id=1792):
bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000000000800007000000005c25d66308b0fa81f823bacad1c86b85154dc77a7a1a731e4e9537024fa0a13469e85c57bc69058580f0872e819a9e541832044b2c427f65f48349025c25226dac9cdd8b258dd972ef38111c02e0d0b84d786e4e29ed4c0b67dc3bdeffa649e3b4958587e1d8e26afdd35aa07f44e3ab18", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6df6794fcfeda542311b2b04002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a73fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6aabcb08adf86420eef49df2696b38e20b4ba3bf3672bb2359a860ff0b2f015b6f2a3fcc3e9e5f27453b18adcbb1792244cb04bca766de16b426c925971f1b6a4b86227692a4d0e777c0fb3a3687f9cd466ba802c4b7af6972930c3036820541fd8fa4f63c14c6efed1c256345ac179733f00f5224e18fe82f58cf49e"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00@\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d)
perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0x0, 0x0, 0xfb, 0x3, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0xd3, 0xd}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x7}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, <r6=>0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"})
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00')
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r10, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40)
setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000680)=r1, 0x4)
bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
syz_clone(0x6804500, 0x0, 0xfffffffffffffe93, 0x0, 0x0, 0x0)

1m4.592528487s ago: executing program 2 (id=1793):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x7, 0x2036f, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x1}, 0x8, 0x0, 0xf4}, 0x0, 0xffffffffffffffff, r3, 0x8)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000040000000000000000089591f004615f3d667aff0ec6000fa496b934a99a4f06c97aa57694fe18cd80411079814f06cbd7f9df6a3b6c381432a4b479489c025c2be028a050abf9f7c0000c749"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000110000000000000000020018110000", @ANYRES64, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r5)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r7=>0xffffffffffffffff]}}], 0x18}, 0x20)
write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)
r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48)
r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20)
r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
r11 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0)
write$cgroup_type(r11, &(0x7f00000001c0), 0x9)
ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2})
r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000002e75b45ef7201b2109171a591239a80000"], 0x48)
r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='scmi_xfer_response_wait\x00', r13}, 0x33)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast})

1m3.784971949s ago: executing program 4 (id=1795):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18)
r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff})
sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, <r5=>0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000680)}}, 0x10)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9, '\x00', r5, r4, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10)
close(r4)
r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0)
ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23003f)
r7 = gettid()
perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x6, 0x3, 0x7, 0x0, 0x0, 0x2b, 0x570704df3645dae1, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x3ff}, 0x100055, 0x8000000000000000, 0xa, 0x0, 0x19, 0x8, 0x8, 0x0, 0xff, 0x0, 0x1}, r7, 0xb, 0xffffffffffffffff, 0x1)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880))
ioctl$SIOCSIFHWADDR(r8, 0x8b36, &(0x7f0000000000)={'veth0_to_bridge\x00', @random="0000f80700"})
bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r0, 0x4)

1m3.784327159s ago: executing program 1 (id=1796):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r3)
close(r4)

1m3.783255899s ago: executing program 1 (id=1797):
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, <r1=>0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x4e, &(0x7f00000001c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0xc9, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r2=>0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r3=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef)
bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x111, 0x400, 0xffffffff, 0x3061, r0, 0x0, '\x00', r1, r3, 0x1, 0x5, 0x4, 0x1, @void, @value, @void, @value}, 0x50)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x9, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r4, 0x0, 0x7e, 0x8e, &(0x7f00000005c0)="b888e94c85700f1a9eb04d1c5cded3009165db0837b67441afd438e0bf6c60036cda2cc7a959ab8ed76cd6b595bad68c029694c9af26cb45e551eb6e7c5f9d68638db5e38b4ca5e02bd750ab0e190dd2f39e1ea2ba6353d6dc9740df7478b1514fe37684d80d66f33242f5582b416966065833da5ed55c92294d6f05d9c9", &(0x7f0000000640)=""/142, 0x2437, 0x0, 0xff, 0xd9, &(0x7f0000000700)="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", &(0x7f0000000800)="1ff58fa25a1fd829f1cf3190fbe9075bc1a142e993989ac382ce0aecbe914f1c3589ca64752095799c12c0b4ad4e50d06dc34167709c30b19b30599845ff9c7907dc7d6b93d67fa928bbb86dcb222efeb70aecd43e1ab6b429ad49cd8f55fd3ed237b7b663e8e792e005c69ee26ab032ee727e8fee76d65258951b201433cca6ca9a0ab41c75bb6f87c4d14d8f35b6f2ce938b57e5d41ceb6abb3435742aaef612e60ae5b3ce704c5af91186dcc0cce99967a5a685429edfcb293cd1eb71f0bb15b4ed69f5e6169fb8a7f74acbb45fd78205603e10a972122e", 0x1, 0x0, 0xfffffff6}, 0x50)

59.806576122s ago: executing program 1 (id=1799):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10)
r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, 0x0)
ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400})

44.268812825s ago: executing program 32 (id=1799):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10)
r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, 0x0)
ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400})

44.268482465s ago: executing program 33 (id=1793):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x7, 0x2036f, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x1}, 0x8, 0x0, 0xf4}, 0x0, 0xffffffffffffffff, r3, 0x8)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000040000000000000000089591f004615f3d667aff0ec6000fa496b934a99a4f06c97aa57694fe18cd80411079814f06cbd7f9df6a3b6c381432a4b479489c025c2be028a050abf9f7c0000c749"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000110000000000000000020018110000", @ANYRES64, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r5)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r7=>0xffffffffffffffff]}}], 0x18}, 0x20)
write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)
r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48)
r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20)
r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
r11 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0)
write$cgroup_type(r11, &(0x7f00000001c0), 0x9)
ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2})
r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000002e75b45ef7201b2109171a591239a80000"], 0x48)
r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='scmi_xfer_response_wait\x00', r13}, 0x33)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast})

41.492445209s ago: executing program 34 (id=1795):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18)
r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff})
sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, <r5=>0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000680)}}, 0x10)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9, '\x00', r5, r4, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10)
close(r4)
r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0)
ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23003f)
r7 = gettid()
perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x6, 0x3, 0x7, 0x0, 0x0, 0x2b, 0x570704df3645dae1, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x3ff}, 0x100055, 0x8000000000000000, 0xa, 0x0, 0x19, 0x8, 0x8, 0x0, 0xff, 0x0, 0x1}, r7, 0xb, 0xffffffffffffffff, 0x1)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880))
ioctl$SIOCSIFHWADDR(r8, 0x8b36, &(0x7f0000000000)={'veth0_to_bridge\x00', @random="0000f80700"})
bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r0, 0x4)

36.738267414s ago: executing program 0 (id=1806):
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async)
write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async)
recvmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r3, @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}) (async)
close(r8) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) (async)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r9=>0xffffffffffffffff]}}], 0x18}, 0x2)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r10=>0xffffffffffffffff, <r11=>0xffffffffffffffff})
close(r11)
recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c76d000000000000008100000081", @ANYRES32=r0, @ANYRESOCT, @ANYBLOB="4730b88e733465b2c3627066a3612c42dc9165b68d2461d7359b55189e09200f323368"], 0x48)

36.737844174s ago: executing program 0 (id=1807):
r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0)
r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x4, 0x0, 0xff, 0x0, 0x0, 0x8, 0x46a04, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x772, 0x2, @perf_config_ext={0x8, 0x80}, 0x1001, 0x4b9d, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x5, 0x0, 0x8001}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1)
r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x9, 0x7, 0x0, 0xff, 0x0, 0x0, 0x40200, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x6389, 0x2, 0xe, 0x8, 0x10, 0x7, 0x3, 0x0, 0x0, 0x0, 0x3}, r0, 0xe, r1, 0xe)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x50000, 0x0)
ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000001c0)={'pimreg\x00'})
r4 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0)
perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0xa, 0x42, 0x35, 0x0, 0x7, 0xc000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x1, 0x10001}, 0x102040, 0xffffffffffff0001, 0x4, 0x5, 0x6, 0x9, 0x9, 0x0, 0x11c, 0x0, 0x6}, 0x0, 0xf, r1, 0x3)
openat$cgroup_type(r0, &(0x7f00000002c0), 0x2, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'rose0\x00', 0x400})
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, <r5=>0xffffffffffffffff}, 0x4)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0x1, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r6=>0x0}}, 0x10)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680), 0x4)
r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, <r9=>0xffffffffffffffff}, 0x4)
r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xbc4f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50)
r11 = openat$cgroup_ro(r0, &(0x7f0000000800)='cgroup.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, <r12=>0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x9, 0x1d, &(0x7f0000000380)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10}, @ldst={0x3, 0x2, 0x2, 0x9, 0x6, 0x4}, @ldst={0x3, 0x0, 0x2, 0x1, 0x8, 0xfffffffffffffff4, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x2, 0x2, 0x1, 0x6, 0xfffffffffffffff0}, @generic={0x0, 0x2, 0x6, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], &(0x7f0000000480)='syzkaller\x00', 0x1, 0xb6, &(0x7f00000004c0)=""/182, 0x41100, 0x8, '\x00', r6, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r8, r9, r10, r4, r11, r12], 0x0, 0x10, 0x10, @void, @value}, 0x94)
ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, &(0x7f0000000a00))
r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40)={r11}, 0x8)
close(r2)
openat$ppp(0xffffffffffffff9c, &(0x7f0000000a80), 0x301082, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x17, 0x1, &(0x7f0000000ac0)=@raw=[@call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000b00)='GPL\x00', 0x1, 0x78, &(0x7f0000000b40)=""/120, 0x0, 0x10, '\x00', 0x0, @cgroup_sysctl, r13, 0x8, &(0x7f0000000bc0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x3, 0x0, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000c40)=[r13], &(0x7f0000000c80)=[{0x4, 0x3, 0x5, 0x7}], 0x10, 0x5, @void, @value}, 0x94)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000d80)={0x1, <r14=>0x0}, 0x8)
r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000dc0)={r14}, 0x4)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r11}, &(0x7f0000000e00), &(0x7f0000000e40)=r15}, 0x20)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f00)=@generic={&(0x7f0000000ec0)='./file0\x00', 0x0, 0x18}, 0x18)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000f80)={0xb0, <r16=>0x0}, 0x8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f40)={@map=r10, r11, 0x25, 0x2020, 0x0, @void, @void, @value=r16}, 0x20)
syz_clone(0x1002000, &(0x7f0000000fc0)="63fe8fec9468189074722054e92b195c1b7da311942ad0505ff152fd2cc2d04ff2635fbb83417bc09acf77230ebd169658235a26fc8fffb518ac14d4a9271e551c32ea84e97ed521268bbf14aaa84fb0d643e3ca3b23f016a80d9ca6b0f373b04e599d2590ee4bb4905315795c613b26b55e6f260029a660600f499e246da7a1764b0f758698b636cce35d84fedcdb9a5fcf738711fc68e195b08a4f04cc6ab1849d92ed1cdc09f93d7de223421c9ad110362bfd", 0xb4, &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)="45a3cec5d242f913f5b81e8bb62e87f60d55abfc7e26fe5456f12a4931f1897eb1b8c54c139bcb7ecdce16cde3dae31b7b2586d12f68efb463abd4cfbecf2d80bf5fc1cc024450cdd11d0b785b3e3faac243437b397ac4451a4db35699807cfb88fe289e3bc20e4911bcb8692f72df6f50c57c6b5938484a3bf67aed3cf67e441dcf192a72ac40321c61c35bc8c7dcb1512264ae1ba9cf13e6")

36.737514954s ago: executing program 0 (id=1808):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=<r2=>0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38)
socketpair(0xa, 0x3, 0x40, &(0x7f0000000280))

20.887979762s ago: executing program 0 (id=1809):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000173114100000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x9, 0x800, 0x7e, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00'})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080))
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20})
socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080))
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x70000000, 0x0, 0x3f00, 0x0, 0x0, 0x1000, 0xff600000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0x3b)
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000020850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x23)
bpf$ENABLE_STATS(0x20, 0x0, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1c, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10)

18.728164106s ago: executing program 0 (id=1810):
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0)
write$cgroup_int(r0, 0x0, 0x0)
ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000020000000200000004"], 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x10)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5, <r6=>0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20)
perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r6, 0x0, 0x20}, 0x38)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0)
close(r3)
sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0)

15.097074433s ago: executing program 0 (id=1811):
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000fdffffffe27f00000200000000000000ded218ea6aef45256191b94ca116e9e4958ce4c289305f376619a30daf4d5b4fe27ba9b374a47ab9355f4c2ce83a0544c88a3cce197f8f6f25d915c93232cc523378042b5ac38cf1823d95565e34068a1af8f0ebc9ca12abaccbdefbd7fe376061101779e525528cc1249493555768ad3abddabf6ab6a6563abfdc4cf35b521475717744589a1ead3f6fbb57541c4bbbbdad433f7e3acab9f26874a41274b647e5ffb660f91a87f62cb512bc0f9cb67901b11d96da8c106ebf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r8=>0xffffffffffffffff, <r9=>0xffffffffffffffff})
close(r8)
r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0)
ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x15)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0)
close(r11)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, <r12=>0xffffffffffffffff})
r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB="09000000006c22e533d88abd0100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
syz_clone(0xc080300, &(0x7f0000000780)="a7508896e1d5dc0760f447ac6c3b4bea3e350d29afce689d656266f26e0f66c7906e78ff2cfef1e0a655a774c8045c0959574fb71b923727680c7bf00228b29e7a33aceb5068a3f73fada55a1bb0791920417a2ea2c52f09991652a4ff117bc6bd7ffcc97b5b84db04f9fff02f", 0x6d, &(0x7f0000000600), &(0x7f0000000680), &(0x7f0000000800)="915e6c2e570717f45fc2476b1adaee5cab4d65de963745e81958783f8ec31c5bc955f66bcfb43603a931e1473da4f860568dd964605809cb21b21a4dca99715f97dfcbafd6a71bb8b7c58b8975f3ac9d0d9e835474fa83209435dd56f6b167c021ddcc2becb6a427f958c617d5ecb375a8a88f4d17739f07a38f1b92969658b54ac0910c34cdad2df6f137a6fbfed81585402b1059f265224bbd33c41adb0c1d3d4bbf")
sendmsg$unix(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)="bad896201b25a500a17880f0ec1142c8ce9c26b253f93debfe031f19c4979bab0e98aa52c9f88cc3f4bc65d2985308c5df1252847b57e15a730ede64b9d220f4e40399a71a6e2bae7f7ed4c92607404865834cdc97518fdd0f90b1aedc02152b99b648b7eb01038a79d2a7ce19b0083966c35dc550cd255c268a91979fabb14d15fcc9d89033e761c6450af1bad60882b6cc28e4ef0cb9d17e2a9316e1f9dc99220f568c4171ca806be64c7b8f3432b652956f4e5d7aa649ac8f1681d511c8a97bb6e72a2a34a0e8f3055410ea5c1ba3d67501", 0xd3}, {&(0x7f00000004c0)="d872d4acb79416dc95c5a166375daff1144e213dfe685a19cc14b0bec7d551509175ad8df7255fe16ae71508c6d0c185b536c708a07503fb20df6f9bda390dd9685c6ff5d3e38915fefc4505b36bb5b12955a81cfe657e5467a823a09b9cd7602b2a0709f73a169ac550ca5a1d63cc959c5340145dba1ab4386fc5c3625684587a3271e4b56a811f54127e99b5ae7be31a6672790ab75a72f3ec8cddec50ea2f805d394c6389db70c2ab05f0878bb6adbd5b887a2ee23490b69508506888", 0xbe}, {&(0x7f0000001340)="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", 0x1000}], 0x3, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r9, r2, r13, r9, r12]}}, @rights={{0x20, 0x1, 0x1, [r0, r8, r11, r6]}}, @rights={{0x18, 0x1, 0x1, [r14, r4]}}, @rights={{0x18, 0x1, 0x1, [r7, r2]}}, @rights={{0x1c, 0x1, 0x1, [r7, r9, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd8, 0x2000e000}, 0x10000841)
ioctl$SIOCSIFHWADDR(r11, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r15=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='\xe4-\x00')
close(0xffffffffffffffff)
sendmsg$unix(r15, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
close(r9)
syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0)

0s ago: executing program 35 (id=1811):
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000fdffffffe27f00000200000000000000ded218ea6aef45256191b94ca116e9e4958ce4c289305f376619a30daf4d5b4fe27ba9b374a47ab9355f4c2ce83a0544c88a3cce197f8f6f25d915c93232cc523378042b5ac38cf1823d95565e34068a1af8f0ebc9ca12abaccbdefbd7fe376061101779e525528cc1249493555768ad3abddabf6ab6a6563abfdc4cf35b521475717744589a1ead3f6fbb57541c4bbbbdad433f7e3acab9f26874a41274b647e5ffb660f91a87f62cb512bc0f9cb67901b11d96da8c106ebf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r8=>0xffffffffffffffff, <r9=>0xffffffffffffffff})
close(r8)
r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0)
ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x15)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0)
close(r11)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, <r12=>0xffffffffffffffff})
r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB="09000000006c22e533d88abd0100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
syz_clone(0xc080300, &(0x7f0000000780)="a7508896e1d5dc0760f447ac6c3b4bea3e350d29afce689d656266f26e0f66c7906e78ff2cfef1e0a655a774c8045c0959574fb71b923727680c7bf00228b29e7a33aceb5068a3f73fada55a1bb0791920417a2ea2c52f09991652a4ff117bc6bd7ffcc97b5b84db04f9fff02f", 0x6d, &(0x7f0000000600), &(0x7f0000000680), &(0x7f0000000800)="915e6c2e570717f45fc2476b1adaee5cab4d65de963745e81958783f8ec31c5bc955f66bcfb43603a931e1473da4f860568dd964605809cb21b21a4dca99715f97dfcbafd6a71bb8b7c58b8975f3ac9d0d9e835474fa83209435dd56f6b167c021ddcc2becb6a427f958c617d5ecb375a8a88f4d17739f07a38f1b92969658b54ac0910c34cdad2df6f137a6fbfed81585402b1059f265224bbd33c41adb0c1d3d4bbf")
sendmsg$unix(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)="bad896201b25a500a17880f0ec1142c8ce9c26b253f93debfe031f19c4979bab0e98aa52c9f88cc3f4bc65d2985308c5df1252847b57e15a730ede64b9d220f4e40399a71a6e2bae7f7ed4c92607404865834cdc97518fdd0f90b1aedc02152b99b648b7eb01038a79d2a7ce19b0083966c35dc550cd255c268a91979fabb14d15fcc9d89033e761c6450af1bad60882b6cc28e4ef0cb9d17e2a9316e1f9dc99220f568c4171ca806be64c7b8f3432b652956f4e5d7aa649ac8f1681d511c8a97bb6e72a2a34a0e8f3055410ea5c1ba3d67501", 0xd3}, {&(0x7f00000004c0)="d872d4acb79416dc95c5a166375daff1144e213dfe685a19cc14b0bec7d551509175ad8df7255fe16ae71508c6d0c185b536c708a07503fb20df6f9bda390dd9685c6ff5d3e38915fefc4505b36bb5b12955a81cfe657e5467a823a09b9cd7602b2a0709f73a169ac550ca5a1d63cc959c5340145dba1ab4386fc5c3625684587a3271e4b56a811f54127e99b5ae7be31a6672790ab75a72f3ec8cddec50ea2f805d394c6389db70c2ab05f0878bb6adbd5b887a2ee23490b69508506888", 0xbe}, {&(0x7f0000001340)="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", 0x1000}], 0x3, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r9, r2, r13, r9, r12]}}, @rights={{0x20, 0x1, 0x1, [r0, r8, r11, r6]}}, @rights={{0x18, 0x1, 0x1, [r14, r4]}}, @rights={{0x18, 0x1, 0x1, [r7, r2]}}, @rights={{0x1c, 0x1, 0x1, [r7, r9, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd8, 0x2000e000}, 0x10000841)
ioctl$SIOCSIFHWADDR(r11, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r15=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='\xe4-\x00')
close(0xffffffffffffffff)
sendmsg$unix(r15, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
close(r9)
syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0)

kernel console output (not intermixed with test programs):

 IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.129856][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.143017][  T289] device veth1_macvtap entered promiscuous mode
[   23.150722][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.159170][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.167169][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   23.176528][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.184966][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.205756][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.213777][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.222334][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.230693][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.239010][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.246738][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.254761][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.263243][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.271570][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.285349][  T292] device veth1_macvtap entered promiscuous mode
[   23.293419][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.302305][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.311236][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.319834][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.328300][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.336338][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.354231][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.362536][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.378172][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.386354][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.396024][  T289] request_module fs-gadgetfs succeeded, but still no fs?
[   23.406918][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.415198][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.448078][  T293] device veth0_vlan entered promiscuous mode
[   23.460647][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.479565][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.489821][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.497510][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.536613][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.545280][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.547284][    C0] hrtimer: interrupt took 181817 ns
[   23.561405][  T293] device veth1_macvtap entered promiscuous mode
[   23.614975][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   23.622808][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.631586][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.649816][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.663845][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.673366][  T329] device veth1_macvtap left promiscuous mode
[   23.927175][  T331] device veth1_macvtap entered promiscuous mode
[   23.939049][  T331] device macsec0 entered promiscuous mode
[   23.951243][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   24.029336][  T322] device veth1_macvtap left promiscuous mode
[   24.035237][  T322] device macsec0 entered promiscuous mode
[   24.058586][  T322] device veth1_macvtap entered promiscuous mode
[   24.444493][  T360] device veth1_macvtap left promiscuous mode
[   24.549208][  T360] device veth1_macvtap entered promiscuous mode
[   24.635479][  T365] device veth1_macvtap left promiscuous mode
[   24.688438][  T365] device macsec0 entered promiscuous mode
[   24.773169][  T368] device veth1_macvtap entered promiscuous mode
[   24.812768][  T373] syz.1.18[373] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   24.813012][  T373] syz.1.18[373] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   24.854261][  T375] device wg2 entered promiscuous mode
[   25.753297][  T391] device veth1_macvtap left promiscuous mode
[   25.786856][  T392] device veth1_macvtap entered promiscuous mode
[   25.924148][  T397] device veth1_macvtap left promiscuous mode
[   25.970622][   T30] kauditd_printk_skb: 39 callbacks suppressed
[   25.970639][   T30] audit: type=1400 audit(1742995951.792:115): avc:  denied  { create } for  pid=404 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[   26.045438][  T397] device macsec0 entered promiscuous mode
[   26.080654][  T406] device veth1_macvtap entered promiscuous mode
[   26.097262][  T414] syz.2.30[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   26.097338][  T414] syz.2.30[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   26.129228][  T408] bridge0: port 2(bridge_slave_1) entered disabled state
[   26.147159][  T408] bridge0: port 1(bridge_slave_0) entered disabled state
[   26.154354][   T30] audit: type=1400 audit(1742995951.982:116): avc:  denied  { cpu } for  pid=410 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   26.533588][   T30] audit: type=1400 audit(1742995952.362:117): avc:  denied  { read } for  pid=421 comm="syz.1.33" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   26.758270][   T30] audit: type=1400 audit(1742995952.362:118): avc:  denied  { open } for  pid=421 comm="syz.1.33" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   26.887317][   T30] audit: type=1400 audit(1742995952.372:119): avc:  denied  { ioctl } for  pid=421 comm="syz.1.33" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   27.059187][   T30] audit: type=1400 audit(1742995952.462:120): avc:  denied  { create } for  pid=423 comm="syz.3.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[   27.254924][   T30] audit: type=1400 audit(1742995953.082:121): avc:  denied  { create } for  pid=441 comm="syz.2.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[   27.290368][   T30] audit: type=1400 audit(1742995953.122:122): avc:  denied  { read } for  pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[   27.769001][  T450] device veth1_macvtap left promiscuous mode
[   27.776669][  T450] device macsec0 entered promiscuous mode
[   27.915415][  T452] device veth1_macvtap left promiscuous mode
[   27.955477][  T455] device veth1_macvtap entered promiscuous mode
[   27.964014][  T456] device veth1_macvtap entered promiscuous mode
[   28.040920][  T355] syz.4.11 (355) used greatest stack depth: 21680 bytes left
[   28.057040][  T324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   28.483002][   T30] audit: type=1400 audit(1742995954.312:123): avc:  denied  { create } for  pid=472 comm="syz.2.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1
[   28.793619][   T30] audit: type=1400 audit(1742995954.342:124): avc:  denied  { create } for  pid=470 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[   29.096711][  T491] device veth1_macvtap left promiscuous mode
[   29.152832][  T491] device veth1_macvtap entered promiscuous mode
[   29.486607][  T510] FAULT_INJECTION: forcing a failure.
[   29.486607][  T510] name fail_usercopy, interval 1, probability 0, space 0, times 1
[   29.547727][  T510] CPU: 0 PID: 510 Comm: syz.4.62 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   29.557207][  T510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   29.567270][  T510] Call Trace:
[   29.570380][  T510]  <TASK>
[   29.573159][  T510]  dump_stack_lvl+0x151/0x1c0
[   29.577672][  T510]  ? io_uring_drop_tctx_refs+0x190/0x190
[   29.583147][  T510]  dump_stack+0x15/0x20
[   29.587128][  T510]  should_fail+0x3c6/0x510
[   29.591384][  T510]  should_fail_usercopy+0x1a/0x20
[   29.596361][  T510]  _copy_from_user+0x20/0xd0
[   29.600777][  T510]  __sys_bpf+0x1e9/0x760
[   29.604859][  T510]  ? fput_many+0x160/0x1b0
[   29.609110][  T510]  ? bpf_link_show_fdinfo+0x300/0x300
[   29.614320][  T510]  ? debug_smp_processor_id+0x17/0x20
[   29.619531][  T510]  ? fpregs_assert_state_consistent+0xb6/0xe0
[   29.625427][  T510]  __x64_sys_bpf+0x7c/0x90
[   29.629681][  T510]  x64_sys_call+0x87f/0x9a0
[   29.634017][  T510]  do_syscall_64+0x3b/0xb0
[   29.638275][  T510]  ? clear_bhb_loop+0x35/0x90
[   29.642788][  T510]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   29.648526][  T510] RIP: 0033:0x7f95e29cc169
[   29.652766][  T510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   29.672211][  T510] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   29.680453][  T510] RAX: ffffffffffffffda RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169
[   29.688271][  T510] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005
[   29.696086][  T510] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000
[   29.703892][  T510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   29.711701][  T510] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188
[   29.719520][  T510]  </TASK>
[   30.010552][  T528] device veth1_macvtap left promiscuous mode
[   30.063664][  T534] device veth1_macvtap entered promiscuous mode
[   30.417165][  T557] FAULT_INJECTION: forcing a failure.
[   30.417165][  T557] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   30.450451][  T557] CPU: 1 PID: 557 Comm: syz.4.79 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   30.459941][  T557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   30.469837][  T557] Call Trace:
[   30.472957][  T557]  <TASK>
[   30.475736][  T557]  dump_stack_lvl+0x151/0x1c0
[   30.480247][  T557]  ? io_uring_drop_tctx_refs+0x190/0x190
[   30.485717][  T557]  ? kstrtouint_from_user+0x20a/0x2a0
[   30.490933][  T557]  ? kstrtol_from_user+0x310/0x310
[   30.495970][  T557]  ? avc_has_perm_noaudit+0x348/0x430
[   30.501346][  T557]  dump_stack+0x15/0x20
[   30.505330][  T557]  should_fail+0x3c6/0x510
[   30.509590][  T557]  should_fail_usercopy+0x1a/0x20
[   30.514534][  T557]  strncpy_from_user+0x24/0x2d0
[   30.519223][  T557]  bpf_prog_load+0x185/0x1b50
[   30.523734][  T557]  ? map_freeze+0x370/0x370
[   30.528089][  T557]  ? selinux_bpf+0xcb/0x100
[   30.532411][  T557]  ? security_bpf+0x82/0xb0
[   30.536751][  T557]  __sys_bpf+0x4bc/0x760
[   30.540828][  T557]  ? fput_many+0x160/0x1b0
[   30.545080][  T557]  ? bpf_link_show_fdinfo+0x300/0x300
[   30.550290][  T557]  ? debug_smp_processor_id+0x17/0x20
[   30.555499][  T557]  ? fpregs_assert_state_consistent+0xb6/0xe0
[   30.561397][  T557]  __x64_sys_bpf+0x7c/0x90
[   30.565652][  T557]  x64_sys_call+0x87f/0x9a0
[   30.569995][  T557]  do_syscall_64+0x3b/0xb0
[   30.574246][  T557]  ? clear_bhb_loop+0x35/0x90
[   30.578761][  T557]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   30.584493][  T557] RIP: 0033:0x7f95e29cc169
[   30.588740][  T557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   30.608179][  T557] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   30.616424][  T557] RAX: ffffffffffffffda RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169
[   30.624243][  T557] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005
[   30.632051][  T557] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000
[   30.639858][  T557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   30.647675][  T557] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188
[   30.655488][  T557]  </TASK>
[   30.683710][  T561] device bridge0 entered promiscuous mode
[   31.045627][  T600] bond_slave_1: mtu less than device minimum
[   31.423288][  T617] FAULT_INJECTION: forcing a failure.
[   31.423288][  T617] name failslab, interval 1, probability 0, space 0, times 1
[   31.450122][  T617] CPU: 0 PID: 617 Comm: syz.3.97 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   31.459590][  T617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   31.469485][  T617] Call Trace:
[   31.472610][  T617]  <TASK>
[   31.475388][  T617]  dump_stack_lvl+0x151/0x1c0
[   31.479900][  T617]  ? io_uring_drop_tctx_refs+0x190/0x190
[   31.485372][  T617]  dump_stack+0x15/0x20
[   31.489379][  T617]  should_fail+0x3c6/0x510
[   31.493619][  T617]  __should_failslab+0xa4/0xe0
[   31.498216][  T617]  should_failslab+0x9/0x20
[   31.502568][  T617]  slab_pre_alloc_hook+0x37/0xd0
[   31.507333][  T617]  kmem_cache_alloc_trace+0x48/0x270
[   31.512454][  T617]  ? __get_vm_area_node+0x117/0x360
[   31.517491][  T617]  ? __kasan_slab_free+0x11/0x20
[   31.522261][  T617]  __get_vm_area_node+0x117/0x360
[   31.527124][  T617]  __vmalloc_node_range+0xe2/0x8d0
[   31.532077][  T617]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.537444][  T617]  ? selinux_capset+0xf0/0xf0
[   31.541964][  T617]  ? kstrtouint_from_user+0x20a/0x2a0
[   31.547170][  T617]  ? kstrtol_from_user+0x310/0x310
[   31.552119][  T617]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.557495][  T617]  __vmalloc+0x7a/0x90
[   31.561400][  T617]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.566803][  T617]  bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.571991][  T617]  ? bpf_prog_alloc+0x15/0x1e0
[   31.576592][  T617]  bpf_prog_alloc+0x1f/0x1e0
[   31.581020][  T617]  bpf_prog_load+0x800/0x1b50
[   31.585621][  T617]  ? map_freeze+0x370/0x370
[   31.590045][  T617]  ? selinux_bpf+0xcb/0x100
[   31.594387][  T617]  ? security_bpf+0x82/0xb0
[   31.598737][  T617]  __sys_bpf+0x4bc/0x760
[   31.602887][  T617]  ? fput_many+0x160/0x1b0
[   31.607142][  T617]  ? bpf_link_show_fdinfo+0x300/0x300
[   31.612437][  T617]  ? debug_smp_processor_id+0x17/0x20
[   31.617641][  T617]  ? fpregs_assert_state_consistent+0xb6/0xe0
[   31.623542][  T617]  __x64_sys_bpf+0x7c/0x90
[   31.627801][  T617]  x64_sys_call+0x87f/0x9a0
[   31.632135][  T617]  do_syscall_64+0x3b/0xb0
[   31.636387][  T617]  ? clear_bhb_loop+0x35/0x90
[   31.640902][  T617]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   31.646630][  T617] RIP: 0033:0x7f7c7a5e4169
[   31.650886][  T617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   31.670335][  T617] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   31.678834][  T617] RAX: ffffffffffffffda RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169
[   31.686645][  T617] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005
[   31.694454][  T617] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000
[   31.702266][  T617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   31.710210][  T617] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28
[   31.718026][  T617]  </TASK>
[   31.727368][  T617] syz.3.97: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0
[   31.743653][  T617] CPU: 1 PID: 617 Comm: syz.3.97 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   31.753114][  T617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   31.763016][  T617] Call Trace:
[   31.766135][  T617]  <TASK>
[   31.768911][  T617]  dump_stack_lvl+0x151/0x1c0
[   31.773420][  T617]  ? io_uring_drop_tctx_refs+0x190/0x190
[   31.778884][  T617]  ? pr_cont_kernfs_name+0xf0/0x100
[   31.783925][  T617]  dump_stack+0x15/0x20
[   31.787916][  T617]  warn_alloc+0x21a/0x390
[   31.792091][  T617]  ? zone_watermark_ok_safe+0x270/0x270
[   31.797459][  T617]  ? kmem_cache_alloc_trace+0x11a/0x270
[   31.802838][  T617]  ? __get_vm_area_node+0x117/0x360
[   31.807876][  T617]  ? __get_vm_area_node+0x347/0x360
[   31.812910][  T617]  __vmalloc_node_range+0x2c1/0x8d0
[   31.817939][  T617]  ? selinux_capset+0xf0/0xf0
[   31.822454][  T617]  ? kstrtouint_from_user+0x20a/0x2a0
[   31.827666][  T617]  ? kstrtol_from_user+0x310/0x310
[   31.832618][  T617]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.837991][  T617]  __vmalloc+0x7a/0x90
[   31.841906][  T617]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.847316][  T617]  bpf_prog_alloc_no_stats+0x3b/0x2f0
[   31.852487][  T617]  ? bpf_prog_alloc+0x15/0x1e0
[   31.857087][  T617]  bpf_prog_alloc+0x1f/0x1e0
[   31.861520][  T617]  bpf_prog_load+0x800/0x1b50
[   31.866029][  T617]  ? map_freeze+0x370/0x370
[   31.870552][  T617]  ? selinux_bpf+0xcb/0x100
[   31.874880][  T617]  ? security_bpf+0x82/0xb0
[   31.879221][  T617]  __sys_bpf+0x4bc/0x760
[   31.883300][  T617]  ? fput_many+0x160/0x1b0
[   31.887563][  T617]  ? bpf_link_show_fdinfo+0x300/0x300
[   31.892765][  T617]  ? debug_smp_processor_id+0x17/0x20
[   31.897965][  T617]  ? fpregs_assert_state_consistent+0xb6/0xe0
[   31.903875][  T617]  __x64_sys_bpf+0x7c/0x90
[   31.908207][  T617]  x64_sys_call+0x87f/0x9a0
[   31.912546][  T617]  do_syscall_64+0x3b/0xb0
[   31.916805][  T617]  ? clear_bhb_loop+0x35/0x90
[   31.921315][  T617]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   31.927059][  T617] RIP: 0033:0x7f7c7a5e4169
[   31.931305][  T617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   31.950737][  T617] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   31.958988][  T617] RAX: ffffffffffffffda RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169
[   31.966968][  T617] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005
[   31.974783][  T617] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000
[   31.982591][  T617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   31.990399][  T617] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28
[   31.998218][  T617]  </TASK>
[   32.007611][  T617] Mem-Info:
[   32.010718][  T617] active_anon:75 inactive_anon:7772 isolated_anon:0
[   32.010718][  T617]  active_file:3400 inactive_file:13641 isolated_file:0
[   32.010718][  T617]  unevictable:0 dirty:911 writeback:0
[   32.010718][  T617]  slab_reclaimable:7601 slab_unreclaimable:72818
[   32.010718][  T617]  mapped:28502 shmem:200 pagetables:577 bounce:0
[   32.010718][  T617]  kernel_misc_reclaimable:0
[   32.010718][  T617]  free:1552817 free_pcp:20836 free_cma:0
[   32.070897][  T617] Node 0 active_anon:300kB inactive_anon:30688kB active_file:13600kB inactive_file:54564kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:113908kB dirty:3644kB writeback:0kB shmem:800kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4040kB pagetables:2008kB all_unreclaimable? no
[   32.121515][   T30] kauditd_printk_skb: 4 callbacks suppressed
[   32.121530][   T30] audit: type=1400 audit(1742995957.952:129): avc:  denied  { create } for  pid=621 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[   32.189212][  T617] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978944kB mlocked:0kB bounce:0kB free_pcp:4268kB local_pcp:0kB free_cma:0kB
[   32.327286][   T30] audit: type=1400 audit(1742995958.152:130): avc:  denied  { create } for  pid=644 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1
[   32.377448][  T617] lowmem_reserve[]: 0 3941 3941
[   32.397376][  T617] Normal free:3236288kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:300kB inactive_anon:20788kB active_file:13600kB inactive_file:54564kB unevictable:0kB writepending:3644kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:92424kB local_pcp:45344kB free_cma:0kB
[   32.501981][  T617] lowmem_reserve[]: 0 0 0
[   32.506204][  T617] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB
[   32.625290][  T617] Normal: 46*4kB (UE) 57*8kB (UM) 129*16kB (UM) 132*32kB (UME) 124*64kB (UME) 14*128kB (UME) 6*256kB (UME) 1*512kB (M) 2*1024kB (UE) 0*2048kB 785*4096kB (M) = 3236112kB
[   32.687344][  T617] 20766 total pagecache pages
[   32.691874][  T617] 0 pages in swap cache
[   32.714872][   T30] audit: type=1400 audit(1742995958.542:131): avc:  denied  { create } for  pid=670 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[   32.734405][  T617] Swap cache stats: add 0, delete 0, find 0/0
[   32.858504][  T617] Free swap  = 124996kB
[   32.862503][  T617] Total swap = 124996kB
[   32.866496][  T617] 2097051 pages RAM
[   32.997284][  T617] 0 pages HighMem/MovableOnly
[   33.001922][  T617] 343419 pages reserved
[   33.005891][  T617] 0 pages cma reserved
[   33.490785][  T698] device veth1_macvtap left promiscuous mode
[   33.563802][  T707] device veth1_macvtap entered promiscuous mode
[   33.674133][  T710] device pim6reg1 entered promiscuous mode
[   33.682630][   T30] audit: type=1400 audit(1742995959.512:132): avc:  denied  { create } for  pid=714 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[   34.109129][   T30] audit: type=1400 audit(1742995959.942:133): avc:  denied  { create } for  pid=716 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[   34.357985][  T757] device veth1_macvtap left promiscuous mode
[   34.396187][  T758] device veth1_macvtap entered promiscuous mode
[   34.562623][   T30] audit: type=1400 audit(1742995960.392:134): avc:  denied  { create } for  pid=763 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[   35.042100][  T777] device syzkaller0 entered promiscuous mode
[   35.086065][  T782] device sit0 entered promiscuous mode
[   35.413356][   T30] audit: type=1400 audit(1742995961.242:135): avc:  denied  { create } for  pid=794 comm="syz.3.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   35.517771][   T30] audit: type=1400 audit(1742995961.302:136): avc:  denied  { ioctl } for  pid=798 comm="syz.2.154" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   35.717657][  T812] device pim6reg1 entered promiscuous mode
[   35.860500][   T30] audit: type=1400 audit(1742995961.692:137): avc:  denied  { write } for  pid=813 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   35.987970][  T829] device syzkaller0 entered promiscuous mode
[   36.992013][  T872] device sit0 entered promiscuous mode
[   37.321192][   T30] audit: type=1400 audit(1742995963.152:138): avc:  denied  { setopt } for  pid=894 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   37.512882][  T907] device pim6reg1 entered promiscuous mode
[   37.678199][   T30] audit: type=1400 audit(1742995963.502:139): avc:  denied  { read } for  pid=910 comm="syz.4.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   38.172842][  T929] device sit0 entered promiscuous mode
[   39.318710][  T974] device veth1_macvtap left promiscuous mode
[   40.115357][ T1014] device veth1_macvtap left promiscuous mode
[   40.273491][ T1020] device syzkaller0 entered promiscuous mode
[   41.180781][ T1081] device veth1_macvtap left promiscuous mode
[   41.267910][ T1084] device pim6reg1 entered promiscuous mode
[   42.167083][ T1114] device veth1_macvtap left promiscuous mode
[   42.196931][  T959] syz.0.203 (959) used greatest stack depth: 21528 bytes left
[   42.335763][ T1131] device pim6reg1 entered promiscuous mode
[   42.448841][ T1134] FAULT_INJECTION: forcing a failure.
[   42.448841][ T1134] name failslab, interval 1, probability 0, space 0, times 0
[   42.486544][ T1134] CPU: 1 PID: 1134 Comm: syz.0.269 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   42.496190][ T1134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   42.506178][ T1134] Call Trace:
[   42.509302][ T1134]  <TASK>
[   42.512079][ T1134]  dump_stack_lvl+0x151/0x1c0
[   42.516589][ T1134]  ? io_uring_drop_tctx_refs+0x190/0x190
[   42.522380][ T1134]  ? kasan_quarantine_put+0x34/0x1a0
[   42.527502][ T1134]  ? kmem_cache_free+0x115/0x330
[   42.532707][ T1134]  ? ____kasan_slab_free+0x131/0x160
[   42.537953][ T1134]  dump_stack+0x15/0x20
[   42.541944][ T1134]  should_fail+0x3c6/0x510
[   42.546209][ T1134]  __should_failslab+0xa4/0xe0
[   42.550791][ T1134]  should_failslab+0x9/0x20
[   42.555136][ T1134]  slab_pre_alloc_hook+0x37/0xd0
[   42.559912][ T1134]  kmem_cache_alloc_trace+0x48/0x270
[   42.565027][ T1134]  ? kobject_uevent_env+0x269/0x700
[   42.570063][ T1134]  kobject_uevent_env+0x269/0x700
[   42.574921][ T1134]  kobject_uevent+0x1f/0x30
[   42.579257][ T1134]  __kobject_del+0xee/0x300
[   42.583611][ T1134]  kobject_put+0x1cc/0x260
[   42.588073][ T1134]  netdev_queue_update_kobjects+0x390/0x400
[   42.593820][ T1134]  ? skb_queue_purge+0x19b/0x1b0
[   42.598921][ T1134]  netif_set_real_num_tx_queues+0x16b/0x7c0
[   42.604649][ T1134]  __tun_detach+0xb78/0x1510
[   42.609081][ T1134]  __tun_chr_ioctl+0xb7c/0x2290
[   42.613938][ T1134]  ? tun_flow_create+0x320/0x320
[   42.618622][ T1134]  ? __fget_files+0x31e/0x380
[   42.623139][ T1134]  tun_chr_ioctl+0x2a/0x40
[   42.627384][ T1134]  ? tun_chr_poll+0x6d0/0x6d0
[   42.631984][ T1134]  __se_sys_ioctl+0x114/0x190
[   42.636509][ T1134]  __x64_sys_ioctl+0x7b/0x90
[   42.640924][ T1134]  x64_sys_call+0x98/0x9a0
[   42.645178][ T1134]  do_syscall_64+0x3b/0xb0
[   42.649429][ T1134]  ? clear_bhb_loop+0x35/0x90
[   42.653943][ T1134]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   42.659671][ T1134] RIP: 0033:0x7fc1394ba169
[   42.663930][ T1134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   42.683366][ T1134] RSP: 002b:00007fc137b24038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[   42.691621][ T1134] RAX: ffffffffffffffda RBX: 00007fc1396d2fa0 RCX: 00007fc1394ba169
[   42.699422][ T1134] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005
[   42.707239][ T1134] RBP: 00007fc137b24090 R08: 0000000000000000 R09: 0000000000000000
[   42.715255][ T1134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   42.723404][ T1134] R13: 0000000000000000 R14: 00007fc1396d2fa0 R15: 00007ffea5e698e8
[   42.731403][ T1134]  </TASK>
[   43.020769][ T1159] ref_ctr_offset mismatch. inode: 0x119 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[   43.069112][ T1155] device syzkaller0 entered promiscuous mode
[   43.515291][ T1181] device wg2 entered promiscuous mode
[   44.208310][   T30] audit: type=1400 audit(1742995970.042:140): avc:  denied  { create } for  pid=1229 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[   44.396284][ T1245] device syzkaller0 entered promiscuous mode
[   44.418256][ T1240] device veth1_macvtap left promiscuous mode
[   45.699902][ T1302] bridge0: port 2(bridge_slave_1) entered disabled state
[   45.710036][ T1302] bridge0: port 1(bridge_slave_0) entered disabled state
[   45.843847][ T1302] device bridge_slave_1 left promiscuous mode
[   45.879940][ T1302] bridge0: port 2(bridge_slave_1) entered disabled state
[   45.897553][ T1302] device bridge_slave_0 left promiscuous mode
[   45.937944][ T1302] bridge0: port 1(bridge_slave_0) entered disabled state
[   46.319605][ T1327] ref_ctr_offset mismatch. inode: 0x178 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[   47.261021][ T1350] device pim6reg1 entered promiscuous mode
[   47.371981][   T30] audit: type=1400 audit(1742995973.202:141): avc:  denied  { create } for  pid=1374 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[   47.594472][ T1390] FAULT_INJECTION: forcing a failure.
[   47.594472][ T1390] name failslab, interval 1, probability 0, space 0, times 0
[   47.627481][ T1390] CPU: 1 PID: 1390 Comm: syz.1.342 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   47.637136][ T1390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   47.647271][ T1390] Call Trace:
[   47.650398][ T1390]  <TASK>
[   47.653161][ T1390]  dump_stack_lvl+0x151/0x1c0
[   47.657678][ T1390]  ? io_uring_drop_tctx_refs+0x190/0x190
[   47.663144][ T1390]  dump_stack+0x15/0x20
[   47.667131][ T1390]  should_fail+0x3c6/0x510
[   47.671420][ T1390]  __should_failslab+0xa4/0xe0
[   47.676174][ T1390]  should_failslab+0x9/0x20
[   47.680502][ T1390]  slab_pre_alloc_hook+0x37/0xd0
[   47.685283][ T1390]  ? alloc_uevent_skb+0x80/0x230
[   47.690047][ T1390]  __kmalloc_track_caller+0x6c/0x2c0
[   47.695171][ T1390]  ? alloc_uevent_skb+0x80/0x230
[   47.699945][ T1390]  ? alloc_uevent_skb+0x80/0x230
[   47.705011][ T1390]  __alloc_skb+0x10c/0x550
[   47.709291][ T1390]  alloc_uevent_skb+0x80/0x230
[   47.713876][ T1390]  kobject_uevent_net_broadcast+0x188/0x590
[   47.719619][ T1390]  kobject_uevent_env+0x525/0x700
[   47.724469][ T1390]  kobject_uevent+0x1f/0x30
[   47.728812][ T1390]  __kobject_del+0xee/0x300
[   47.733141][ T1390]  kobject_put+0x1cc/0x260
[   47.737398][ T1390]  netdev_queue_update_kobjects+0x390/0x400
[   47.743299][ T1390]  ? skb_queue_purge+0x19b/0x1b0
[   47.748070][ T1390]  netif_set_real_num_tx_queues+0x16b/0x7c0
[   47.753805][ T1390]  __tun_detach+0xb78/0x1510
[   47.758230][ T1390]  __tun_chr_ioctl+0xb7c/0x2290
[   47.763185][ T1390]  ? tun_flow_create+0x320/0x320
[   47.767957][ T1390]  ? __fget_files+0x31e/0x380
[   47.772480][ T1390]  tun_chr_ioctl+0x2a/0x40
[   47.776727][ T1390]  ? tun_chr_poll+0x6d0/0x6d0
[   47.781234][ T1390]  __se_sys_ioctl+0x114/0x190
[   47.785858][ T1390]  __x64_sys_ioctl+0x7b/0x90
[   47.790271][ T1390]  x64_sys_call+0x98/0x9a0
[   47.794513][ T1390]  do_syscall_64+0x3b/0xb0
[   47.798774][ T1390]  ? clear_bhb_loop+0x35/0x90
[   47.803279][ T1390]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   47.809009][ T1390] RIP: 0033:0x7fafeefa7169
[   47.813269][ T1390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   47.832810][ T1390] RSP: 002b:00007fafed611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[   47.841047][ T1390] RAX: ffffffffffffffda RBX: 00007fafef1bffa0 RCX: 00007fafeefa7169
[   47.848869][ T1390] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005
[   47.856854][ T1390] RBP: 00007fafed611090 R08: 0000000000000000 R09: 0000000000000000
[   47.864661][ T1390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   47.872833][ T1390] R13: 0000000000000000 R14: 00007fafef1bffa0 R15: 00007fff490919b8
[   47.880641][ T1390]  </TASK>
[   48.021613][ T1404] syz.0.345[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   48.021693][ T1404] syz.0.345[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   48.146196][ T1409] device veth1_macvtap entered promiscuous mode
[   48.179985][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   48.247670][ T1413] device syzkaller0 entered promiscuous mode
[   48.360856][ T1412] device sit0 entered promiscuous mode
[   48.685009][   T30] audit: type=1400 audit(1742995974.512:142): avc:  denied  { create } for  pid=1454 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   49.239943][ T1468] device pim6reg1 entered promiscuous mode
[   49.713872][ T1487] device veth0_vlan left promiscuous mode
[   49.733850][ T1487] device veth0_vlan entered promiscuous mode
[   49.802748][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   49.825750][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   49.887848][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   49.981392][ T1504] device sit0 left promiscuous mode
[   50.168198][ T1516] device sit0 entered promiscuous mode
[   50.395787][   T30] audit: type=1400 audit(1742995976.222:143): avc:  denied  { tracepoint } for  pid=1525 comm="syz.3.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   50.661806][ T1537] device syzkaller0 entered promiscuous mode
[   51.155364][ T1563] device sit0 left promiscuous mode
[   51.269018][ T1563] device sit0 entered promiscuous mode
[   53.836160][ T1653] device veth0_vlan left promiscuous mode
[   53.882781][ T1653] device veth0_vlan entered promiscuous mode
[   53.977076][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   53.990831][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   54.015449][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   54.039808][ T1655] device sit0 entered promiscuous mode
[   54.210027][    C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1
[   54.257669][ T1666] device syzkaller0 entered promiscuous mode
[   54.704192][ T1676] device pim6reg1 entered promiscuous mode
[   55.928909][   T30] audit: type=1400 audit(1742995981.762:144): avc:  denied  { create } for  pid=1700 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1
[   55.949886][ T1706] device sit0 left promiscuous mode
[   55.999179][ T1706] device sit0 entered promiscuous mode
[   56.220037][ T1716] device veth1_macvtap entered promiscuous mode
[   56.235588][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   56.244134][   T30] audit: type=1400 audit(1742995982.082:145): avc:  denied  { ioctl } for  pid=1710 comm="syz.2.437" path="socket:[21251]" dev="sockfs" ino=21251 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   56.516984][ T1715] device veth1_macvtap left promiscuous mode
[   56.648992][ T1720] device veth1_macvtap entered promiscuous mode
[   57.171694][ T1740] device veth1_macvtap left promiscuous mode
[   57.255372][ T1746] device veth1_macvtap entered promiscuous mode
[   57.367439][   T30] audit: type=1400 audit(1742995983.202:146): avc:  denied  { write } for  pid=1747 comm="syz.3.452" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[   57.457174][   T30] audit: type=1400 audit(1742995983.202:147): avc:  denied  { open } for  pid=1747 comm="syz.3.452" path="<too_long>" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[   57.585749][   T30] audit: type=1400 audit(1742995983.412:148): avc:  denied  { read } for  pid=1747 comm="syz.3.452" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[   57.696290][ T1762] device pim6reg1 entered promiscuous mode
[   57.884689][   T30] audit: type=1400 audit(1742995983.712:149): avc:  denied  { create } for  pid=1768 comm="syz.1.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1
[   58.810921][ T1798] syz.0.467[1798] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   58.811012][ T1798] syz.0.467[1798] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   58.830487][ T1796] device macsec0 left promiscuous mode
[   59.057495][ T1803] device veth1_macvtap left promiscuous mode
[   59.116281][ T1804] device veth1_macvtap entered promiscuous mode
[   59.147839][ T1804] device macsec0 entered promiscuous mode
[   59.168003][ T1805] device veth1_macvtap entered promiscuous mode
[   59.218632][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   65.632599][ T1843] ������: renamed from vlan1
[   65.717040][ T1849] device veth1_macvtap left promiscuous mode
[   65.787055][ T1853] device syzkaller0 entered promiscuous mode
[   65.823812][ T1858] device veth1_macvtap entered promiscuous mode
[   65.851303][ T1862] syz.4.485[1862] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   65.856230][ T1862] syz.4.485[1862] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   67.364805][ T1921] device veth1_macvtap left promiscuous mode
[   67.469313][ T1921] device veth1_macvtap entered promiscuous mode
[   67.797147][   T30] audit: type=1400 audit(1742995993.622:150): avc:  denied  { remove_name } for  pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[   67.820848][   T30] audit: type=1400 audit(1742995993.622:151): avc:  denied  { rename } for  pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[   68.023777][ T1968] device wg2 entered promiscuous mode
[   68.440115][   T30] audit: type=1400 audit(1742995994.272:152): avc:  denied  { create } for  pid=1983 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1
[   68.828086][   T30] audit: type=1400 audit(1742995994.662:153): avc:  denied  { create } for  pid=2004 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[   68.877530][ T2003] device sit0 left promiscuous mode
[   68.881413][   T30] audit: type=1400 audit(1742995994.682:154): avc:  denied  { create } for  pid=2004 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1
[   68.995720][ T2017] device pim6reg1 entered promiscuous mode
[   69.119546][ T2028] device syzkaller0 entered promiscuous mode
[   69.456090][ T2052] syz.4.549[2052] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   69.456166][ T2052] syz.4.549[2052] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   69.468052][ T2056] syz.4.549[2056] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   69.482151][ T2056] syz.4.549[2056] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   69.741603][ T2074] device syzkaller0 entered promiscuous mode
[   69.974989][ T2078] device veth0_vlan left promiscuous mode
[   69.993112][ T2078] device veth0_vlan entered promiscuous mode
[   70.168536][   T30] audit: type=1400 audit(1742995996.002:155): avc:  denied  { create } for  pid=2092 comm="syz.1.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1
[   70.440655][ T2113] device veth1_macvtap left promiscuous mode
[   70.509378][ T2117] device veth1_macvtap entered promiscuous mode
[   71.123416][ T2155] device veth1_macvtap left promiscuous mode
[   71.209243][ T2155] device veth1_macvtap entered promiscuous mode
[   71.287608][ T2162] syz.4.585[2162] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   71.287688][ T2162] syz.4.585[2162] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   72.183662][ T2198] device sit0 entered promiscuous mode
[   72.285217][ T2105] syz.1.563 (2105) used greatest stack depth: 21496 bytes left
[   72.366436][ T2205] device veth1_macvtap entered promiscuous mode
[   72.406568][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   74.395056][ T2284] device syzkaller0 entered promiscuous mode
[   75.203377][ T2342] device pim6reg1 entered promiscuous mode
[   75.237294][ T2343] bond_slave_1: mtu greater than device maximum
[   75.354954][ T2351] device syzkaller0 entered promiscuous mode
[   75.406362][ T2353] device veth1_macvtap entered promiscuous mode
[   75.455629][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   75.527388][ T2359] device pim6reg1 entered promiscuous mode
[   75.946247][ T2378] device sit0 left promiscuous mode
[   76.013169][ T2378] device sit0 entered promiscuous mode
[   76.179706][ T2384] device sit0 left promiscuous mode
[   76.244487][ T2389] device sit0 entered promiscuous mode
[   76.371837][ T2390] device syzkaller0 entered promiscuous mode
[   76.438797][ T2397] device syzkaller0 entered promiscuous mode
[   77.037514][ T2432] device syzkaller0 entered promiscuous mode
[   77.076110][ T2453] syz.1.680[2453] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   77.076190][ T2453] syz.1.680[2453] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   77.130839][ T2449] device veth1_macvtap left promiscuous mode
[   77.214195][ T2455] device veth1_macvtap entered promiscuous mode
[   77.231551][ T2458] device veth1_macvtap left promiscuous mode
[   77.304743][ T2462] device veth1_macvtap entered promiscuous mode
[   77.328973][ T2465] device sit0 left promiscuous mode
[   77.374659][ T2465] device sit0 entered promiscuous mode
[   77.467620][ T2467] device wg2 entered promiscuous mode
[   77.488480][ T2472] device veth0_vlan left promiscuous mode
[   77.507688][ T2472] device veth0_vlan entered promiscuous mode
[   77.541850][ T2467] device pim6reg1 entered promiscuous mode
[   77.790878][ T2499] device syzkaller0 entered promiscuous mode
[   78.987199][    C0] sched: RT throttling activated
[   79.818598][ T2498] device veth1_macvtap left promiscuous mode
[   79.856952][ T2503] device veth1_macvtap entered promiscuous mode
[   79.921427][ T2514] device syzkaller0 entered promiscuous mode
[   79.975758][ T2514] device sit0 left promiscuous mode
[   80.016129][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   80.016209][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   80.043193][ T2527] device sit0 entered promiscuous mode
[   80.061467][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   80.061519][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   80.187354][ T2523] device wg2 left promiscuous mode
[   80.233768][ T2529] device wg2 entered promiscuous mode
[   80.418685][   T30] audit: type=1400 audit(1742996006.242:156): avc:  denied  { create } for  pid=2534 comm="syz.2.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1
[   80.688899][ T2552] device syzkaller0 entered promiscuous mode
[   80.990858][ T2559] device veth0_vlan left promiscuous mode
[   81.012274][ T2559] device veth0_vlan entered promiscuous mode
[   81.060143][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   81.072862][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   81.088410][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   81.170833][ T2564] syz.4.714[2564] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   81.170912][ T2564] syz.4.714[2564] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   81.775478][ T2594] device syzkaller0 entered promiscuous mode
[   81.957038][ T2602] syz.1.726[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   81.957118][ T2602] syz.1.726[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   82.002173][ T2604] device veth0_vlan left promiscuous mode
[   82.086677][ T2604] device veth0_vlan entered promiscuous mode
[   82.101109][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   82.127947][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   82.158056][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   82.791003][ T2636] device veth1_macvtap left promiscuous mode
[   82.894920][ T2640] device veth1_macvtap entered promiscuous mode
[   83.216387][ T2663] syz.1.748[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   83.216465][ T2663] syz.1.748[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   83.450572][ T2660] cgroup: fork rejected by pids controller in 
[   83.466123][   T30] audit: type=1400 audit(1742996009.292:157): avc:  denied  { append } for  pid=2671 comm="syz.3.750" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   83.494825][ T2660] /syz0
[   84.311061][ T2784] device pim6reg1 entered promiscuous mode
[   84.490458][ T2792] device veth0_vlan left promiscuous mode
[   84.563624][ T2792] device veth0_vlan entered promiscuous mode
[   84.592502][   T30] audit: type=1400 audit(1742996010.422:158): avc:  denied  { create } for  pid=2807 comm="syz.2.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1
[   84.661048][  T290] syz-executor (290) used greatest stack depth: 19712 bytes left
[   84.791705][ T2815] syz.3.763[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   84.791780][ T2815] syz.3.763[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   84.818333][ T2811] device pim6reg1 entered promiscuous mode
[   85.233293][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state
[   85.242514][ T2817] bridge0: port 1(bridge_slave_0) entered disabled state
[   85.250784][ T2817] device bridge_slave_0 entered promiscuous mode
[   85.260626][ T2817] bridge0: port 2(bridge_slave_1) entered blocking state
[   85.270711][ T2817] bridge0: port 2(bridge_slave_1) entered disabled state
[   85.278388][ T2817] device bridge_slave_1 entered promiscuous mode
[   85.560018][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   85.569914][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   85.625906][  T478] device bridge_slave_1 left promiscuous mode
[   85.636875][  T478] bridge0: port 2(bridge_slave_1) entered disabled state
[   85.649804][  T478] device bridge_slave_0 left promiscuous mode
[   85.656241][  T478] bridge0: port 1(bridge_slave_0) entered disabled state
[   85.665232][  T478] device veth0_vlan left promiscuous mode
[   85.779190][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   85.787680][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   85.796001][    T8] bridge0: port 1(bridge_slave_0) entered blocking state
[   85.802894][    T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[   85.810115][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   85.818556][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   85.826568][    T8] bridge0: port 2(bridge_slave_1) entered blocking state
[   85.833436][    T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[   85.840761][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   85.947339][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   85.957628][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   85.968227][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   85.976218][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   85.991158][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   86.010814][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   86.019960][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   86.027746][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   86.048351][ T2817] device veth0_vlan entered promiscuous mode
[   86.072490][ T2817] device veth1_macvtap entered promiscuous mode
[   86.088888][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   86.125964][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   86.177663][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   86.203958][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   86.212422][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   86.271398][   T30] audit: type=1400 audit(1742996012.102:159): avc:  denied  { mounton } for  pid=2817 comm="syz-executor" path="/root/syzkaller.ps2X9J/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   86.310016][   T30] audit: type=1400 audit(1742996012.132:160): avc:  denied  { mount } for  pid=2817 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   86.381825][   T30] audit: type=1400 audit(1742996012.132:161): avc:  denied  { mounton } for  pid=2817 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   86.732670][ T2866] device syzkaller0 entered promiscuous mode
[   87.087963][ T2876] syz.4.781[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   87.088046][ T2876] syz.4.781[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   87.275453][   T30] audit: type=1400 audit(1742996013.102:162): avc:  denied  { append } for  pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[   87.355491][ T2896] device syzkaller0 entered promiscuous mode
[   87.393092][   T30] audit: type=1400 audit(1742996013.102:163): avc:  denied  { open } for  pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[   87.447540][   T30] audit: type=1400 audit(1742996013.102:164): avc:  denied  { getattr } for  pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[   87.673184][ T2923] syz.0.795[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   87.673265][ T2923] syz.0.795[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   87.773828][ T2930] bridge0: port 2(bridge_slave_1) entered disabled state
[   87.792126][ T2930] bridge0: port 1(bridge_slave_0) entered disabled state
[   87.808280][ T2930] device bridge_slave_1 left promiscuous mode
[   87.814526][ T2930] bridge0: port 2(bridge_slave_1) entered disabled state
[   87.830770][ T2930] device bridge_slave_0 left promiscuous mode
[   87.836997][ T2930] bridge0: port 1(bridge_slave_0) entered disabled state
[   88.467903][ T2961] device syzkaller0 entered promiscuous mode
[   88.580073][ T2961] FAULT_INJECTION: forcing a failure.
[   88.580073][ T2961] name failslab, interval 1, probability 0, space 0, times 0
[   88.619161][ T2961] CPU: 1 PID: 2961 Comm: syz.3.806 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   88.628812][ T2961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   88.638821][ T2961] Call Trace:
[   88.641948][ T2961]  <TASK>
[   88.644909][ T2961]  dump_stack_lvl+0x151/0x1c0
[   88.649414][ T2961]  ? io_uring_drop_tctx_refs+0x190/0x190
[   88.654873][ T2961]  ? exit_to_user_mode_prepare+0x5a/0xa0
[   88.660348][ T2961]  dump_stack+0x15/0x20
[   88.664337][ T2961]  should_fail+0x3c6/0x510
[   88.668675][ T2961]  __should_failslab+0xa4/0xe0
[   88.673276][ T2961]  should_failslab+0x9/0x20
[   88.677717][ T2961]  slab_pre_alloc_hook+0x37/0xd0
[   88.682490][ T2961]  __kmalloc+0x6d/0x2c0
[   88.686482][ T2961]  ? kobject_get_path+0xbc/0x1f0
[   88.691256][ T2961]  kobject_get_path+0xbc/0x1f0
[   88.695853][ T2961]  kobject_uevent_env+0x27f/0x700
[   88.700736][ T2961]  kobject_uevent+0x1f/0x30
[   88.705165][ T2961]  __kobject_del+0xee/0x300
[   88.709498][ T2961]  kobject_put+0x1cc/0x260
[   88.713749][ T2961]  netdev_queue_update_kobjects+0x390/0x400
[   88.719476][ T2961]  ? skb_queue_purge+0x19b/0x1b0
[   88.724250][ T2961]  netif_set_real_num_tx_queues+0x16b/0x7c0
[   88.729982][ T2961]  __tun_detach+0xb78/0x1510
[   88.734410][ T2961]  ? wait_for_completion_killable_timeout+0x10/0x10
[   88.740965][ T2961]  ? tun_chr_open+0x530/0x530
[   88.745470][ T2961]  tun_chr_close+0x92/0x140
[   88.749808][ T2961]  __fput+0x228/0x8c0
[   88.753689][ T2961]  ____fput+0x15/0x20
[   88.757442][ T2961]  task_work_run+0x129/0x190
[   88.761872][ T2961]  exit_to_user_mode_loop+0xc4/0xe0
[   88.766908][ T2961]  exit_to_user_mode_prepare+0x5a/0xa0
[   88.772198][ T2961]  syscall_exit_to_user_mode+0x26/0x160
[   88.777581][ T2961]  do_syscall_64+0x47/0xb0
[   88.781830][ T2961]  ? clear_bhb_loop+0x35/0x90
[   88.786346][ T2961]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   88.792073][ T2961] RIP: 0033:0x7f7c7a5e4169
[   88.796331][ T2961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   88.815775][ T2961] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   88.824014][ T2961] RAX: 0000000000000000 RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169
[   88.831831][ T2961] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a
[   88.839637][ T2961] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000
[   88.847450][ T2961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   88.855269][ T2961] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28
[   88.863076][ T2961]  </TASK>
[   89.186445][ T2977] syz.1.810[2977] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   89.186525][ T2977] syz.1.810[2977] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   89.377315][ T2987] device veth1_macvtap left promiscuous mode
[   89.418262][ T2988] device veth1_macvtap entered promiscuous mode
[   90.146989][ T3010] device syzkaller0 entered promiscuous mode
[   90.183432][ T3005] ref_ctr_offset mismatch. inode: 0x38a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[   90.249781][ T3010] FAULT_INJECTION: forcing a failure.
[   90.249781][ T3010] name failslab, interval 1, probability 0, space 0, times 0
[   90.347289][ T3010] CPU: 0 PID: 3010 Comm: syz.1.822 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   90.356937][ T3010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   90.366832][ T3010] Call Trace:
[   90.369954][ T3010]  <TASK>
[   90.372733][ T3010]  dump_stack_lvl+0x151/0x1c0
[   90.377255][ T3010]  ? io_uring_drop_tctx_refs+0x190/0x190
[   90.382724][ T3010]  dump_stack+0x15/0x20
[   90.386707][ T3010]  should_fail+0x3c6/0x510
[   90.390967][ T3010]  __should_failslab+0xa4/0xe0
[   90.395561][ T3010]  ? __alloc_skb+0xbe/0x550
[   90.399896][ T3010]  should_failslab+0x9/0x20
[   90.404243][ T3010]  slab_pre_alloc_hook+0x37/0xd0
[   90.409021][ T3010]  ? __alloc_skb+0xbe/0x550
[   90.413354][ T3010]  kmem_cache_alloc+0x44/0x250
[   90.417953][ T3010]  __alloc_skb+0xbe/0x550
[   90.422121][ T3010]  alloc_uevent_skb+0x80/0x230
[   90.426720][ T3010]  kobject_uevent_net_broadcast+0x188/0x590
[   90.432470][ T3010]  kobject_uevent_env+0x525/0x700
[   90.437311][ T3010]  kobject_uevent+0x1f/0x30
[   90.441650][ T3010]  __kobject_del+0xee/0x300
[   90.445989][ T3010]  kobject_put+0x1cc/0x260
[   90.450243][ T3010]  netdev_queue_update_kobjects+0x390/0x400
[   90.456237][ T3010]  ? skb_queue_purge+0x19b/0x1b0
[   90.461101][ T3010]  netif_set_real_num_tx_queues+0x16b/0x7c0
[   90.466832][ T3010]  __tun_detach+0xb78/0x1510
[   90.471257][ T3010]  ? wait_for_completion_killable_timeout+0x10/0x10
[   90.477689][ T3010]  ? tun_chr_open+0x530/0x530
[   90.482185][ T3010]  tun_chr_close+0x92/0x140
[   90.486522][ T3010]  __fput+0x228/0x8c0
[   90.490341][ T3010]  ____fput+0x15/0x20
[   90.494159][ T3010]  task_work_run+0x129/0x190
[   90.498585][ T3010]  exit_to_user_mode_loop+0xc4/0xe0
[   90.503708][ T3010]  exit_to_user_mode_prepare+0x5a/0xa0
[   90.509001][ T3010]  syscall_exit_to_user_mode+0x26/0x160
[   90.514391][ T3010]  do_syscall_64+0x47/0xb0
[   90.518641][ T3010]  ? clear_bhb_loop+0x35/0x90
[   90.523325][ T3010]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   90.529057][ T3010] RIP: 0033:0x7fafeefa7169
[   90.533308][ T3010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   90.552765][ T3010] RSP: 002b:00007fafed611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   90.560992][ T3010] RAX: 0000000000000000 RBX: 00007fafef1bffa0 RCX: 00007fafeefa7169
[   90.568802][ T3010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a
[   90.576727][ T3010] RBP: 00007fafed611090 R08: 0000000000000000 R09: 0000000000000000
[   90.584537][ T3010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   90.592354][ T3010] R13: 0000000000000000 R14: 00007fafef1bffa0 R15: 00007fff490919b8
[   90.600171][ T3010]  </TASK>
[   90.792744][ T3022] syz.3.824[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.792824][ T3022] syz.3.824[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.956697][ T3024] device syzkaller0 entered promiscuous mode
[   91.418961][ T3041] device pim6reg1 entered promiscuous mode
[   91.606719][ T3051] device syzkaller0 entered promiscuous mode
[   91.636574][ T3049] device veth1_macvtap left promiscuous mode
[   91.686770][ T3060] device veth1_macvtap entered promiscuous mode
[   91.772726][ T3062] FAULT_INJECTION: forcing a failure.
[   91.772726][ T3062] name failslab, interval 1, probability 0, space 0, times 0
[   91.811813][ T3062] CPU: 1 PID: 3062 Comm: syz.3.835 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   91.821582][ T3062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   91.831488][ T3062] Call Trace:
[   91.834598][ T3062]  <TASK>
[   91.837370][ T3062]  dump_stack_lvl+0x151/0x1c0
[   91.841885][ T3062]  ? io_uring_drop_tctx_refs+0x190/0x190
[   91.847355][ T3062]  dump_stack+0x15/0x20
[   91.851339][ T3062]  should_fail+0x3c6/0x510
[   91.855622][ T3062]  __should_failslab+0xa4/0xe0
[   91.860214][ T3062]  should_failslab+0x9/0x20
[   91.864534][ T3062]  slab_pre_alloc_hook+0x37/0xd0
[   91.869308][ T3062]  ? alloc_uevent_skb+0x80/0x230
[   91.874084][ T3062]  __kmalloc_track_caller+0x6c/0x2c0
[   91.879208][ T3062]  ? alloc_uevent_skb+0x80/0x230
[   91.883976][ T3062]  ? alloc_uevent_skb+0x80/0x230
[   91.888748][ T3062]  __alloc_skb+0x10c/0x550
[   91.893004][ T3062]  alloc_uevent_skb+0x80/0x230
[   91.897600][ T3062]  kobject_uevent_net_broadcast+0x188/0x590
[   91.903330][ T3062]  kobject_uevent_env+0x525/0x700
[   91.908193][ T3062]  kobject_uevent+0x1f/0x30
[   91.912530][ T3062]  __kobject_del+0xee/0x300
[   91.916879][ T3062]  kobject_put+0x1cc/0x260
[   91.921121][ T3062]  netdev_queue_update_kobjects+0x390/0x400
[   91.926848][ T3062]  ? skb_queue_purge+0x19b/0x1b0
[   91.931639][ T3062]  netif_set_real_num_tx_queues+0x16b/0x7c0
[   91.937359][ T3062]  __tun_detach+0xb78/0x1510
[   91.941783][ T3062]  ? wait_for_completion_killable_timeout+0x10/0x10
[   91.948231][ T3062]  ? tun_chr_open+0x530/0x530
[   91.952715][ T3062]  tun_chr_close+0x92/0x140
[   91.957054][ T3062]  __fput+0x228/0x8c0
[   91.960883][ T3062]  ____fput+0x15/0x20
[   91.964697][ T3062]  task_work_run+0x129/0x190
[   91.969119][ T3062]  exit_to_user_mode_loop+0xc4/0xe0
[   91.974155][ T3062]  exit_to_user_mode_prepare+0x5a/0xa0
[   91.979446][ T3062]  syscall_exit_to_user_mode+0x26/0x160
[   91.984827][ T3062]  do_syscall_64+0x47/0xb0
[   91.989086][ T3062]  ? clear_bhb_loop+0x35/0x90
[   91.993604][ T3062]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   91.999329][ T3062] RIP: 0033:0x7f7c7a5e4169
[   92.003578][ T3062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   92.023113][ T3062] RSP: 002b:00007f7c78c2d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   92.031356][ T3062] RAX: 0000000000000000 RBX: 00007f7c7a7fd080 RCX: 00007f7c7a5e4169
[   92.039163][ T3062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a
[   92.046981][ T3062] RBP: 00007f7c78c2d090 R08: 0000000000000000 R09: 0000000000000000
[   92.054784][ T3062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   92.062621][ T3062] R13: 0000000000000000 R14: 00007f7c7a7fd080 R15: 00007ffee4d4ea28
[   92.070424][ T3062]  </TASK>
[   92.407033][ T3097] device sit0 left promiscuous mode
[   92.623570][ T3110] device pim6reg1 entered promiscuous mode
[   92.659826][ T3097] device sit0 entered promiscuous mode
[   93.125327][ T3132] device syzkaller0 entered promiscuous mode
[   93.188438][ T3132] FAULT_INJECTION: forcing a failure.
[   93.188438][ T3132] name failslab, interval 1, probability 0, space 0, times 0
[   93.296310][ T3132] CPU: 1 PID: 3132 Comm: syz.4.858 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   93.305962][ T3132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   93.315857][ T3132] Call Trace:
[   93.318980][ T3132]  <TASK>
[   93.321755][ T3132]  dump_stack_lvl+0x151/0x1c0
[   93.326288][ T3132]  ? io_uring_drop_tctx_refs+0x190/0x190
[   93.331744][ T3132]  dump_stack+0x15/0x20
[   93.335727][ T3132]  should_fail+0x3c6/0x510
[   93.339983][ T3132]  __should_failslab+0xa4/0xe0
[   93.344580][ T3132]  should_failslab+0x9/0x20
[   93.348920][ T3132]  slab_pre_alloc_hook+0x37/0xd0
[   93.353696][ T3132]  kmem_cache_alloc_trace+0x48/0x270
[   93.358813][ T3132]  ? kobject_uevent_env+0x269/0x700
[   93.363863][ T3132]  kobject_uevent_env+0x269/0x700
[   93.368715][ T3132]  kobject_uevent+0x1f/0x30
[   93.373049][ T3132]  __kobject_del+0xee/0x300
[   93.377391][ T3132]  kobject_put+0x1cc/0x260
[   93.381643][ T3132]  net_rx_queue_update_kobjects+0x418/0x490
[   93.387369][ T3132]  ? netif_set_real_num_tx_queues+0x600/0x7c0
[   93.393277][ T3132]  netif_set_real_num_rx_queues+0x105/0x1e0
[   93.399188][ T3132]  __tun_detach+0xbb4/0x1510
[   93.403610][ T3132]  ? wait_for_completion_killable_timeout+0x10/0x10
[   93.410030][ T3132]  ? tun_chr_open+0x530/0x530
[   93.414551][ T3132]  tun_chr_close+0x92/0x140
[   93.418881][ T3132]  __fput+0x228/0x8c0
[   93.422703][ T3132]  ____fput+0x15/0x20
[   93.426529][ T3132]  task_work_run+0x129/0x190
[   93.430949][ T3132]  exit_to_user_mode_loop+0xc4/0xe0
[   93.436163][ T3132]  exit_to_user_mode_prepare+0x5a/0xa0
[   93.441455][ T3132]  syscall_exit_to_user_mode+0x26/0x160
[   93.446834][ T3132]  do_syscall_64+0x47/0xb0
[   93.451086][ T3132]  ? clear_bhb_loop+0x35/0x90
[   93.455597][ T3132]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   93.461328][ T3132] RIP: 0033:0x7f95e29cc169
[   93.465582][ T3132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   93.485036][ T3132] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   93.493272][ T3132] RAX: 0000000000000000 RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169
[   93.501083][ T3132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a
[   93.508895][ T3132] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000
[   93.517141][ T3132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   93.525065][ T3132] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188
[   93.532878][ T3132]  </TASK>
[   93.623807][ T3144] syz.2.863[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   93.623889][ T3144] syz.2.863[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   94.583703][ T3186] device syzkaller0 entered promiscuous mode
[   94.818757][ T3191] syz.3.879[3191] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   94.818837][ T3191] syz.3.879[3191] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   94.919994][   T30] audit: type=1400 audit(1742996020.752:165): avc:  denied  { create } for  pid=3193 comm="syz.0.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1
[   95.224053][ T3207] device syzkaller0 entered promiscuous mode
[   95.383498][ T3207] FAULT_INJECTION: forcing a failure.
[   95.383498][ T3207] name failslab, interval 1, probability 0, space 0, times 0
[   95.423870][ T3207] CPU: 1 PID: 3207 Comm: syz.3.884 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[   95.433523][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   95.443505][ T3207] Call Trace:
[   95.446722][ T3207]  <TASK>
[   95.449578][ T3207]  dump_stack_lvl+0x151/0x1c0
[   95.454098][ T3207]  ? io_uring_drop_tctx_refs+0x190/0x190
[   95.459568][ T3207]  ? do_syscall_64+0x47/0xb0
[   95.463986][ T3207]  dump_stack+0x15/0x20
[   95.467974][ T3207]  should_fail+0x3c6/0x510
[   95.472235][ T3207]  __should_failslab+0xa4/0xe0
[   95.476830][ T3207]  should_failslab+0x9/0x20
[   95.481171][ T3207]  slab_pre_alloc_hook+0x37/0xd0
[   95.485946][ T3207]  __kmalloc+0x6d/0x2c0
[   95.489957][ T3207]  ? kobject_get_path+0xbc/0x1f0
[   95.494714][ T3207]  kobject_get_path+0xbc/0x1f0
[   95.499311][ T3207]  kobject_uevent_env+0x27f/0x700
[   95.504173][ T3207]  kobject_uevent+0x1f/0x30
[   95.508637][ T3207]  __kobject_del+0xee/0x300
[   95.512993][ T3207]  kobject_put+0x1cc/0x260
[   95.517438][ T3207]  net_rx_queue_update_kobjects+0x418/0x490
[   95.523288][ T3207]  ? netif_set_real_num_tx_queues+0x600/0x7c0
[   95.529247][ T3207]  netif_set_real_num_rx_queues+0x105/0x1e0
[   95.535100][ T3207]  __tun_detach+0xbb4/0x1510
[   95.539526][ T3207]  ? wait_for_completion_killable_timeout+0x10/0x10
[   95.545948][ T3207]  ? tun_chr_open+0x530/0x530
[   95.550472][ T3207]  tun_chr_close+0x92/0x140
[   95.554801][ T3207]  __fput+0x228/0x8c0
[   95.558630][ T3207]  ____fput+0x15/0x20
[   95.562443][ T3207]  task_work_run+0x129/0x190
[   95.566866][ T3207]  exit_to_user_mode_loop+0xc4/0xe0
[   95.571897][ T3207]  exit_to_user_mode_prepare+0x5a/0xa0
[   95.577330][ T3207]  syscall_exit_to_user_mode+0x26/0x160
[   95.582706][ T3207]  do_syscall_64+0x47/0xb0
[   95.586958][ T3207]  ? clear_bhb_loop+0x35/0x90
[   95.591472][ T3207]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[   95.597200][ T3207] RIP: 0033:0x7f7c7a5e4169
[   95.601458][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   95.620904][ T3207] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   95.629179][ T3207] RAX: 0000000000000000 RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169
[   95.637560][ T3207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a
[   95.645473][ T3207] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000
[   95.653281][ T3207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   95.661095][ T3207] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28
[   95.668935][ T3207]  </TASK>
[   96.037617][   T30] audit: type=1400 audit(1742996021.862:166): avc:  denied  { create } for  pid=3217 comm="syz.3.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[   96.110079][ T3220] device veth1_macvtap left promiscuous mode
[   96.330971][ T3222] device veth1_macvtap entered promiscuous mode
[   96.525344][ T3229] device sit0 left promiscuous mode
[   96.655935][ T3237] device sit0 entered promiscuous mode
[   97.208543][ T3250] device veth1_macvtap left promiscuous mode
[   97.320524][ T3251] device veth1_macvtap entered promiscuous mode
[   98.246371][ T3279] device veth1_macvtap left promiscuous mode
[   98.312123][ T3279] device macsec0 entered promiscuous mode
[   98.484599][ T3283] device veth1_macvtap entered promiscuous mode
[   98.730992][ T3296] device veth1_macvtap left promiscuous mode
[   98.817484][ T3300] device veth1_macvtap entered promiscuous mode
[   99.418235][ T3314] device sit0 left promiscuous mode
[   99.502738][ T3317] device sit0 entered promiscuous mode
[   99.690571][ T3319] syz.0.921[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   99.692880][ T3319] syz.0.921[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   99.880905][ T3322] device syzkaller0 entered promiscuous mode
[  100.044396][ T3332] device syzkaller0 entered promiscuous mode
[  100.213955][ T3330] device bond_slave_1 entered promiscuous mode
[  100.351479][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready
[  100.359885][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  100.484394][ T3339] device sit0 left promiscuous mode
[  100.587898][ T3342] device veth1_macvtap left promiscuous mode
[  100.661169][ T3339] device sit0 entered promiscuous mode
[  100.753178][ T3344] device veth1_macvtap entered promiscuous mode
[  101.793065][ T3372] syz.3.938[3372] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  101.793134][ T3372] syz.3.938[3372] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  101.865801][ T3376] device sit0 left promiscuous mode
[  101.929420][ T3378] device sit0 entered promiscuous mode
[  102.410575][ T3390] device veth1_macvtap left promiscuous mode
[  102.499604][ T3395] device veth1_macvtap entered promiscuous mode
[  102.575116][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  102.593244][ T3396] device veth1_macvtap left promiscuous mode
[  102.668453][ T3399] device veth1_macvtap entered promiscuous mode
[  102.895854][ T3406] device veth1_macvtap left promiscuous mode
[  102.936029][ T3409] device pim6reg1 entered promiscuous mode
[  102.961937][ T3410] device veth1_macvtap entered promiscuous mode
[  102.990329][ T3414] device syzkaller0 entered promiscuous mode
[  103.084127][   T30] audit: type=1400 audit(1742996028.912:167): avc:  denied  { create } for  pid=3417 comm="syz.3.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[  103.408968][ T3435] device pim6reg1 entered promiscuous mode
[  103.517966][ T3441] device veth1_macvtap left promiscuous mode
[  103.563789][ T3445] device syzkaller0 entered promiscuous mode
[  103.570692][ T3441] device veth1_macvtap entered promiscuous mode
[  103.741206][ T3454] device syzkaller0 entered promiscuous mode
[  103.887258][ T3460] device sit0 left promiscuous mode
[  103.976132][ T3462] device sit0 entered promiscuous mode
[  104.494322][ T3494] device pim6reg1 entered promiscuous mode
[  104.637154][ T3498] device veth1_macvtap left promiscuous mode
[  104.686628][ T3508] device veth1_macvtap entered promiscuous mode
[  105.232640][ T3540] device veth1_macvtap left promiscuous mode
[  105.323549][ T3543] device veth1_macvtap entered promiscuous mode
[  105.653765][ T3552] device syzkaller0 entered promiscuous mode
[  105.671664][ T3555] tap0: tun_chr_ioctl cmd 1074025677
[  105.677290][ T3555] tap0: linktype set to 769
[  106.085603][ T3567] device pim6reg1 entered promiscuous mode
[  106.936040][ T3600] device syzkaller0 entered promiscuous mode
[  108.043444][ T3627] device syzkaller0 entered promiscuous mode
[  108.370711][ T3634] device veth1_macvtap left promiscuous mode
[  108.436837][ T3639] device veth1_macvtap entered promiscuous mode
[  108.706347][ T3646] device syzkaller0 entered promiscuous mode
[  108.723951][ T3649] device sit0 left promiscuous mode
[  109.395198][   T30] audit: type=1400 audit(1742996035.222:168): avc:  denied  { create } for  pid=3702 comm="syz.0.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1
[  109.459086][ T3706] syz.2.1051[3706] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  109.459167][ T3706] syz.2.1051[3706] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  109.904287][ T3737] syz.4.1063[3737] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  109.918146][ T3735] device sit0 entered promiscuous mode
[  109.940396][ T3737] syz.4.1063[3737] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.080117][ T3745] device veth1_macvtap left promiscuous mode
[  110.132416][ T3745] device veth1_macvtap entered promiscuous mode
[  110.417914][ T3766] syz.3.1074[3766] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.420130][ T3766] syz.3.1074[3766] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.568252][ T3776] syz.0.1078[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.580024][ T3776] syz.0.1078[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.615670][ T3775] device syzkaller0 entered promiscuous mode
[  110.673091][ T3780] device veth1_macvtap left promiscuous mode
[  110.724748][ T3782] device veth1_macvtap entered promiscuous mode
[  110.880209][ T3802] syz.2.1086[3802] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  110.880287][ T3802] syz.2.1086[3802] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  111.024657][ T3809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  111.315025][ T3828] device veth1_macvtap left promiscuous mode
[  111.355672][ T3828] device veth1_macvtap entered promiscuous mode
[  111.797849][ T3854] ������: renamed from vlan0
[  112.134999][ T3862] cgroup: fork rejected by pids controller in /syz3
[  112.628900][ T4003] device pim6reg1 entered promiscuous mode
[  112.723338][ T4013] device veth1_macvtap left promiscuous mode
[  112.772121][ T4013] device veth1_macvtap entered promiscuous mode
[  112.836804][ T4015] device veth0_vlan left promiscuous mode
[  112.857976][ T4015] device veth0_vlan entered promiscuous mode
[  113.369552][ T4044] device syzkaller0 entered promiscuous mode
[  113.550910][ T4048] device syzkaller0 entered promiscuous mode
[  113.614864][ T4033] bridge0: port 1(bridge_slave_0) entered blocking state
[  113.640678][ T4033] bridge0: port 1(bridge_slave_0) entered disabled state
[  113.668338][ T4033] device bridge_slave_0 entered promiscuous mode
[  113.676982][ T4033] bridge0: port 2(bridge_slave_1) entered blocking state
[  113.684104][ T4033] bridge0: port 2(bridge_slave_1) entered disabled state
[  113.691613][ T4033] device bridge_slave_1 entered promiscuous mode
[  113.722053][  T312] device bridge_slave_1 left promiscuous mode
[  113.730191][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  113.751179][  T312] device bridge_slave_0 left promiscuous mode
[  113.757163][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  113.766136][  T312] device veth1_macvtap left promiscuous mode
[  113.946290][ T4063] device veth1_macvtap left promiscuous mode
[  113.979148][ T4066] device veth1_macvtap entered promiscuous mode
[  114.130579][   T30] audit: type=1400 audit(1742996039.962:169): avc:  denied  { create } for  pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  114.192744][   T30] audit: type=1400 audit(1742996039.982:170): avc:  denied  { write } for  pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  114.213572][   T30] audit: type=1400 audit(1742996039.992:171): avc:  denied  { read } for  pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  114.248414][ T4090] device syzkaller0 entered promiscuous mode
[  114.344499][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  114.363195][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  114.424244][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  114.459386][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  114.489325][   T45] bridge0: port 1(bridge_slave_0) entered blocking state
[  114.496195][   T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[  114.549226][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  114.567671][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  114.575769][   T45] bridge0: port 2(bridge_slave_1) entered blocking state
[  114.582812][   T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[  114.590600][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  114.628420][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  114.669285][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  114.796047][  T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  114.831596][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  114.846156][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  114.854112][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  114.868607][ T4033] device veth0_vlan entered promiscuous mode
[  114.925610][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  114.937439][ T4033] device veth1_macvtap entered promiscuous mode
[  115.020909][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  115.041220][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  115.165271][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  115.216805][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  115.390332][ T4142] device syzkaller0 entered promiscuous mode
[  115.766785][ T4150] device pim6reg1 entered promiscuous mode
[  116.224177][ T4174] bpf_get_probe_write_proto: 10 callbacks suppressed
[  116.224198][ T4174] syz.3.1175[4174] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  116.269267][ T4174] syz.3.1175[4174] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  116.269283][ T4179] device wg2 left promiscuous mode
[  117.810930][ T4245] device veth1_macvtap left promiscuous mode
[  117.817155][ T4245] device macsec0 entered promiscuous mode
[  117.864556][ T4245] device veth1_macvtap entered promiscuous mode
[  118.042668][ T4248] device sit0 entered promiscuous mode
[  119.496109][ T4332] device pim6reg1 entered promiscuous mode
[  119.584649][ T4338] device sit0 entered promiscuous mode
[  119.675940][ T4342] device veth1_macvtap left promiscuous mode
[  119.754761][ T4342] device veth1_macvtap entered promiscuous mode
[  119.867817][ T4351] bridge0: port 1(bridge_slave_0) entered disabled state
[  119.927956][ T4357] syz.4.1233[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  119.928062][ T4357] syz.4.1233[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  120.089792][ T4362] device pim6reg1 entered promiscuous mode
[  120.180108][ T4377] device veth1_macvtap left promiscuous mode
[  120.267306][ T4381] device veth1_macvtap entered promiscuous mode
[  121.266300][ T4430] device veth1_macvtap left promiscuous mode
[  121.335514][ T4436] device veth1_macvtap entered promiscuous mode
[  121.813159][ T4462] device pim6reg1 entered promiscuous mode
[  121.872802][ T4471] device veth1_macvtap left promiscuous mode
[  121.881785][ T4471] device macsec0 left promiscuous mode
[  122.029897][ T4474] device veth1_macvtap entered promiscuous mode
[  122.057309][ T4474] device macsec0 entered promiscuous mode
[  122.098235][   T30] audit: type=1400 audit(1742996047.932:172): avc:  denied  { create } for  pid=4479 comm="syz.2.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1
[  122.119252][ T4482] device veth1_macvtap left promiscuous mode
[  122.229570][ T4482] device veth1_macvtap entered promiscuous mode
[  122.503911][ T4493] bond_slave_1: mtu less than device minimum
[  123.621043][ T4524] device veth1_macvtap left promiscuous mode
[  123.750742][ T4531] device veth1_macvtap entered promiscuous mode
[  124.489875][ T4562] device veth1_macvtap left promiscuous mode
[  124.577884][ T4574] device veth1_macvtap entered promiscuous mode
[  124.584830][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  124.640952][ T4573] syz.0.1303 (4573) used obsolete PPPIOCDETACH ioctl
[  124.723582][ T4581] device syzkaller0 entered promiscuous mode
[  124.749504][   T30] audit: type=1400 audit(1742996050.582:173): avc:  denied  { create } for  pid=4584 comm="syz.2.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  124.911793][ T4592] device syzkaller0 entered promiscuous mode
[  124.938018][ T4599] syz.1.1310[4599] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  124.939851][ T4599] syz.1.1310[4599] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  125.437773][ T4638] tun0: tun_chr_ioctl cmd 1074025673
[  125.593390][ T4626] device syzkaller0 entered promiscuous mode
[  125.613899][ T4637] tun0: tun_chr_ioctl cmd 1074025678
[  125.621328][ T4637] tun0: group set to 0
[  125.649973][ T4638] tun0: tun_chr_ioctl cmd 1074025678
[  125.678824][ T4638] tun0: group set to 0
[  126.678494][ T4696] ------------[ cut here ]------------
[  126.715027][ T4696] trace type BPF program uses run-time allocation
[  126.765385][ T4696] WARNING: CPU: 1 PID: 4696 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6f1/0x890
[  126.827328][ T4696] Modules linked in:
[  126.836650][ T4696] CPU: 0 PID: 4696 Comm: syz.3.1341 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[  126.907537][ T4696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[  126.917711][ T4696] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890
[  127.010551][ T4696] Code: db e9 f9 fc ff ff e8 de 29 ed ff 31 db e9 ed fc ff ff e8 d2 29 ed ff c6 05 b0 52 a3 05 01 48 c7 c7 a0 f5 87 85 e8 2f 6f be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff
[  127.163780][ T4696] RSP: 0018:ffffc90000aa7328 EFLAGS: 00010246
[  127.197336][ T4696] RAX: 0251e093f062f400 RBX: 0000000000000001 RCX: 0000000000080000
[  127.257281][ T4696] RDX: ffffc900012c9000 RSI: 00000000000009d7 RDI: 00000000000009d8
[  127.297294][ T4696] RBP: ffffc90000aa7370 R08: ffffffff8157a585 R09: ffffed103ee265e8
[  127.367324][ T4696] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011
[  127.425564][ T4696] R13: ffff888112a13000 R14: ffffc900000ac000 R15: dffffc0000000000
[  127.481496][ T4696] FS:  00007ff92dda96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[  127.581919][ T4696] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  127.613416][ T4696] CR2: 00007f95e2a89ea4 CR3: 0000000190de6000 CR4: 00000000003506b0
[  127.621670][ T4696] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
[  127.622096][ T4725] device veth0_vlan left promiscuous mode
[  127.629509][ T4696] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  127.629529][ T4696] Call Trace:
[  127.629536][ T4696]  <TASK>
[  127.629543][ T4696]  ? show_regs+0x58/0x60
[  127.629572][ T4696]  ? __warn+0x160/0x2f0
[  127.629592][ T4696]  ? check_map_prog_compatibility+0x6f1/0x890
[  127.629623][ T4696]  ? report_bug+0x3d9/0x5b0
[  127.629648][ T4696]  ? check_map_prog_compatibility+0x6f1/0x890
[  127.683140][ T4725] device veth0_vlan entered promiscuous mode
[  127.735006][ T4696]  ? handle_bug+0x41/0x70
[  127.741701][ T4696]  ? exc_invalid_op+0x1b/0x50
[  127.746272][ T4696]  ? asm_exc_invalid_op+0x1b/0x20
[  127.751383][ T4696]  ? __wake_up_klogd+0xd5/0x110
[  127.756207][ T4696]  ? check_map_prog_compatibility+0x6f1/0x890
[  127.762363][ T4696]  ? check_map_prog_compatibility+0x6f1/0x890
[  127.768327][ T4696]  resolve_pseudo_ldimm64+0x682/0x1240
[  127.773618][ T4696]  ? check_attach_btf_id+0xef0/0xef0
[  127.820265][  T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  127.828696][  T324] IPv6: ADDRCONF(NETDEV_CHANGE): ������: link becomes ready
[  127.833768][ T4696]  ? __mark_reg_known+0x1b0/0x1b0
[  127.841061][ T4696]  ? security_capable+0x87/0xb0
[  127.846102][ T4696]  bpf_check+0x3190/0x12c60
[  127.849024][  T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  127.850629][ T4696]  ? is_bpf_text_address+0x172/0x190
[  127.862920][ T4696]  ? stack_trace_save+0x1c0/0x1c0
[  127.867878][ T4696]  ? __kernel_text_address+0x9b/0x110
[  127.873076][ T4696]  ? unwind_get_return_address+0x4d/0x90
[  127.878849][ T4696]  ? bpf_get_btf_vmlinux+0x60/0x60
[  127.883812][ T4696]  ? arch_stack_walk+0xf3/0x140
[  127.888523][ T4696]  ? stack_trace_save+0x113/0x1c0
[  127.895772][ T4696]  ? stack_trace_snprint+0xf0/0xf0
[  127.902018][ T4696]  ? stack_trace_snprint+0xf0/0xf0
[  127.928394][ T4696]  ? __stack_depot_save+0x34/0x470
[  127.954288][ T4696]  ? ____kasan_kmalloc+0xed/0x110
[  127.967234][ T4696]  ? ____kasan_kmalloc+0xdb/0x110
[  128.007935][ T4696]  ? __kasan_kmalloc+0x9/0x10
[  128.012480][ T4696]  ? kmem_cache_alloc_trace+0x11a/0x270
[  128.066305][ T4696]  ? selinux_bpf_prog_alloc+0x51/0x140
[  128.100063][ T4696]  ? security_bpf_prog_alloc+0x62/0x90
[  128.111813][ T4696]  ? bpf_prog_load+0x9ee/0x1b50
[  128.116521][ T4696]  ? __sys_bpf+0x4bc/0x760
[  128.139538][ T4768] device syzkaller0 entered promiscuous mode
[  128.153284][ T4696]  ? __x64_sys_bpf+0x7c/0x90
[  128.157946][ T4696]  ? x64_sys_call+0x87f/0x9a0
[  128.162503][ T4696]  ? do_syscall_64+0x3b/0xb0
[  128.166937][ T4696]  ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[  128.177956][ T4696]  ? __kasan_kmalloc+0x9/0x10
[  128.182541][ T4696]  ? memset+0x35/0x40
[  128.188517][ T4696]  ? bpf_obj_name_cpy+0x196/0x1e0
[  128.193643][ T4696]  bpf_prog_load+0x12ac/0x1b50
[  128.199941][ T4696]  ? map_freeze+0x370/0x370
[  128.204345][ T4696]  ? selinux_bpf+0xcb/0x100
[  128.212301][ T4696]  ? security_bpf+0x82/0xb0
[  128.216677][ T4696]  __sys_bpf+0x4bc/0x760
[  128.222095][ T4696]  ? bpf_link_show_fdinfo+0x300/0x300
[  128.227563][ T4696]  ? __kasan_check_write+0x14/0x20
[  128.232506][ T4696]  ? switch_fpu_return+0x15f/0x2e0
[  128.242504][ T4696]  __x64_sys_bpf+0x7c/0x90
[  128.247102][ T4696]  x64_sys_call+0x87f/0x9a0
[  128.257901][ T4696]  do_syscall_64+0x3b/0xb0
[  128.262214][ T4696]  ? clear_bhb_loop+0x35/0x90
[  128.266681][ T4696]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[  128.272952][ T4696] RIP: 0033:0x7ff92f73f169
[  128.277385][ T4696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  128.296946][ T4696] RSP: 002b:00007ff92dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  128.305272][ T4696] RAX: ffffffffffffffda RBX: 00007ff92f957fa0 RCX: 00007ff92f73f169
[  128.313112][ T4696] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005
[  128.321075][ T4696] RBP: 00007ff92f7c02a0 R08: 0000000000000000 R09: 0000000000000000
[  128.328988][ T4696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  128.336872][ T4696] R13: 0000000000000000 R14: 00007ff92f957fa0 R15: 00007ffca98f2d98
[  128.345159][ T4696]  </TASK>
[  128.348071][ T4696] ---[ end trace bb115d9b2e867a25 ]---
[  130.004825][ T4883] ref_ctr_offset mismatch. inode: 0x22d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[  130.089433][ T4884] device veth1_macvtap left promiscuous mode
[  130.121432][ T4883] GPL: port 1(erspan0) entered blocking state
[  130.137702][ T4883] GPL: port 1(erspan0) entered disabled state
[  130.144170][ T4883] device erspan0 entered promiscuous mode
[  130.168500][ T4884] device veth1_macvtap entered promiscuous mode
[  130.223189][ T4878] GPL: port 1(erspan0) entered blocking state
[  130.229400][ T4878] GPL: port 1(erspan0) entered forwarding state
[  130.359994][ T4890] device veth1_macvtap left promiscuous mode
[  130.411430][ T4892] syzkaller0: tun_chr_ioctl cmd 1074025677
[  130.432417][ T4892] syzkaller0: linktype set to 821
[  130.451192][ T4890] device veth1_macvtap entered promiscuous mode
[  130.809313][ T4900] device sit0 left promiscuous mode
[  132.591836][ T4939] device veth1_macvtap left promiscuous mode
[  132.682333][ T4944] device veth1_macvtap entered promiscuous mode
[  132.787957][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  133.112221][ T4955] device veth0_vlan left promiscuous mode
[  133.119494][ T4955] device veth0_vlan entered promiscuous mode
[  133.932316][ T4985] device wg2 entered promiscuous mode
[  134.401042][ T5003] syz.4.1433[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  134.402881][ T5003] syz.4.1433[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  134.455325][ T5008] device veth0_vlan left promiscuous mode
[  134.575976][ T5008] device veth0_vlan entered promiscuous mode
[  134.635745][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  134.648185][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  134.666465][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  134.770812][ T5020] device syzkaller0 entered promiscuous mode
[  134.902934][ T5048] device sit0 left promiscuous mode
[  134.976145][ T5047] device sit0 entered promiscuous mode
[  135.429547][ T5070] device pim6reg1 entered promiscuous mode
[  135.851481][ T5083] device syzkaller0 entered promiscuous mode
[  137.563754][ T5180] device pim6reg1 entered promiscuous mode
[  138.682747][ T5240] device veth1_macvtap left promiscuous mode
[  138.768536][ T5240] device macsec0 left promiscuous mode
[  138.949195][ T5227] device veth1_macvtap entered promiscuous mode
[  138.956557][ T5227] device macsec0 entered promiscuous mode
[  139.068887][   T30] audit: type=1400 audit(1742996064.902:174): avc:  denied  { create } for  pid=5257 comm="syz.3.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1
[  139.159250][   T30] audit: type=1400 audit(1742996064.992:175): avc:  denied  { create } for  pid=5264 comm="syz.0.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[  139.575428][ T5294] device sit0 entered promiscuous mode
[  139.757782][ T5303] syz.3.1527[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  139.757860][ T5303] syz.3.1527[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  139.997491][ T5315] device wg2 entered promiscuous mode
[  140.294970][ T5323] device syzkaller0 entered promiscuous mode
[  141.759031][ T5342] device veth1_macvtap left promiscuous mode
[  141.811201][ T5342] device veth1_macvtap entered promiscuous mode
[  141.894651][ T5347] syz.1.1541[5347] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  141.894771][ T5347] syz.1.1541[5347] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  142.875074][ T5371] device wg2 entered promiscuous mode
[  143.277709][ T5392] ��: port 1(ip6gretap0) entered blocking state
[  143.283876][ T5392] ��: port 1(ip6gretap0) entered disabled state
[  143.290604][ T5392] device ip6gretap0 entered promiscuous mode
[  143.579248][ T5402] device veth1_macvtap left promiscuous mode
[  143.619763][ T5405] device veth1_macvtap entered promiscuous mode
[  144.069944][ T5432] device syzkaller0 entered promiscuous mode
[  144.149751][ T5435] ref_ctr_offset mismatch. inode: 0x6ca offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[  144.489127][ T5451] syz.2.1571 uses obsolete (PF_INET,SOCK_PACKET)
[  144.972630][ T5466] device veth1_macvtap left promiscuous mode
[  145.109701][ T5470] device veth1_macvtap entered promiscuous mode
[  146.529356][ T5532] bridge0: port 1(bridge_slave_0) entered blocking state
[  146.536230][ T5532] bridge0: port 1(bridge_slave_0) entered disabled state
[  146.637444][ T5532] device bridge_slave_0 entered promiscuous mode
[  146.655536][ T5532] bridge0: port 2(bridge_slave_1) entered blocking state
[  146.675014][ T5532] bridge0: port 2(bridge_slave_1) entered disabled state
[  146.694257][ T5532] device bridge_slave_1 entered promiscuous mode
[  147.199418][  T312] device bridge_slave_1 left promiscuous mode
[  147.215573][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  147.244482][  T312] device bridge_slave_0 left promiscuous mode
[  147.263051][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  147.282454][  T312] device veth1_macvtap left promiscuous mode
[  147.297705][  T312] device veth0_vlan left promiscuous mode
[  147.707451][ T5562] device pim6reg1 entered promiscuous mode
[  147.745408][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  147.760445][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  147.781781][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  147.795876][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  147.809678][   T45] bridge0: port 1(bridge_slave_0) entered blocking state
[  147.816570][   T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[  147.832618][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  147.846376][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  147.876150][   T45] bridge0: port 2(bridge_slave_1) entered blocking state
[  147.883059][   T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[  147.944120][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  147.988060][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  148.027479][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  148.078310][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  148.107443][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  148.127892][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  148.148528][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  148.169232][ T5532] device veth0_vlan entered promiscuous mode
[  148.190021][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  148.208342][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  148.239145][ T5532] device veth1_macvtap entered promiscuous mode
[  148.262997][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  148.272060][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  148.291688][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  148.338052][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  148.368123][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  148.379681][ T5568] bond_slave_1: mtu less than device minimum
[  148.397258][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  148.428167][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  148.831943][ T5579] ref_ctr_offset mismatch. inode: 0x5e2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe
[  148.865139][ T5579] GPL: port 1(erspan0) entered blocking state
[  148.871669][ T5579] GPL: port 1(erspan0) entered disabled state
[  148.886344][ T5579] device erspan0 entered promiscuous mode
[  148.936264][ T5584] GPL: port 1(erspan0) entered blocking state
[  148.942212][ T5584] GPL: port 1(erspan0) entered forwarding state
[  149.040822][ T5581] bridge0: port 1(bridge_slave_0) entered blocking state
[  149.083840][ T5581] bridge0: port 1(bridge_slave_0) entered disabled state
[  149.101051][ T5581] device bridge_slave_0 entered promiscuous mode
[  149.119129][ T5581] bridge0: port 2(bridge_slave_1) entered blocking state
[  149.128843][ T5581] bridge0: port 2(bridge_slave_1) entered disabled state
[  149.136282][ T5581] device bridge_slave_1 entered promiscuous mode
[  149.176438][ T5596] device pim6reg1 entered promiscuous mode
[  149.316726][ T5581] bridge0: port 2(bridge_slave_1) entered blocking state
[  149.323628][ T5581] bridge0: port 2(bridge_slave_1) entered forwarding state
[  149.330748][ T5581] bridge0: port 1(bridge_slave_0) entered blocking state
[  149.337610][ T5581] bridge0: port 1(bridge_slave_0) entered forwarding state
[  149.367196][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  149.378007][ T4129] bridge0: port 1(bridge_slave_0) entered disabled state
[  149.385403][ T4129] bridge0: port 2(bridge_slave_1) entered disabled state
[  149.405137][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  149.413354][ T4129] bridge0: port 1(bridge_slave_0) entered blocking state
[  149.420253][ T4129] bridge0: port 1(bridge_slave_0) entered forwarding state
[  149.428486][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  149.436648][ T4129] bridge0: port 2(bridge_slave_1) entered blocking state
[  149.443560][ T4129] bridge0: port 2(bridge_slave_1) entered forwarding state
[  149.475021][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  149.503212][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  149.568226][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  149.613190][ T5581] device veth0_vlan entered promiscuous mode
[  149.720634][ T5601] device syzkaller0 entered promiscuous mode
[  149.735369][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  149.747612][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  149.762780][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  149.795721][ T5581] device veth1_macvtap entered promiscuous mode
[  149.804073][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  149.854032][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  149.882728][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  150.208892][ T5616] device sit0 left promiscuous mode
[  150.336506][  T312] device bridge_slave_1 left promiscuous mode
[  150.342652][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  150.354606][  T312] device bridge_slave_0 left promiscuous mode
[  150.361014][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  150.377695][  T312] device veth1_macvtap left promiscuous mode
[  150.394263][  T312] device veth0_vlan left promiscuous mode
[  150.935590][ T5634] device syzkaller0 entered promiscuous mode
[  150.957305][ T5614] bridge0: port 1(bridge_slave_0) entered blocking state
[  150.964235][ T5614] bridge0: port 1(bridge_slave_0) entered disabled state
[  150.971510][ T5614] device bridge_slave_0 entered promiscuous mode
[  151.031497][ T5614] bridge0: port 2(bridge_slave_1) entered blocking state
[  151.038521][ T5614] bridge0: port 2(bridge_slave_1) entered disabled state
[  151.045860][ T5614] device bridge_slave_1 entered promiscuous mode
[  151.476362][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  151.483948][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  151.504188][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  151.512687][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  151.521853][ T4129] bridge0: port 1(bridge_slave_0) entered blocking state
[  151.528746][ T4129] bridge0: port 1(bridge_slave_0) entered forwarding state
[  151.536328][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  151.545114][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  151.554913][ T4129] bridge0: port 2(bridge_slave_1) entered blocking state
[  151.561834][ T4129] bridge0: port 2(bridge_slave_1) entered forwarding state
[  151.572027][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  151.579622][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  151.656876][ T5614] device veth0_vlan entered promiscuous mode
[  151.664304][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  151.677681][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  151.685690][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  151.693388][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  151.700880][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  151.715824][ T5614] device veth1_macvtap entered promiscuous mode
[  151.745249][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  151.831104][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  151.866067][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  151.891149][ T5684] device sit0 left promiscuous mode
[  152.278320][ T5697] device veth0_vlan left promiscuous mode
[  152.297550][ T5697] device veth0_vlan entered promiscuous mode
[  152.305164][ T5697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  152.314150][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  152.322818][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  152.330103][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  152.348489][  T312] device bridge_slave_1 left promiscuous mode
[  152.354422][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  152.367824][  T312] device bridge_slave_0 left promiscuous mode
[  152.373841][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  152.381940][  T312] device veth1_macvtap left promiscuous mode
[  152.407360][  T312] device veth0_vlan left promiscuous mode
[  152.785951][ T5718] device veth1_macvtap left promiscuous mode
[  152.840155][ T5718] device veth1_macvtap entered promiscuous mode
[  152.869715][ T5708] bridge0: port 1(bridge_slave_0) entered blocking state
[  152.876629][ T5708] bridge0: port 1(bridge_slave_0) entered disabled state
[  152.890643][ T5708] device bridge_slave_0 entered promiscuous mode
[  152.898801][ T5710] device syzkaller0 entered promiscuous mode
[  152.916418][ T5708] bridge0: port 2(bridge_slave_1) entered blocking state
[  152.923541][ T5708] bridge0: port 2(bridge_slave_1) entered disabled state
[  152.931652][ T5708] device bridge_slave_1 entered promiscuous mode
[  153.164832][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  153.175914][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  153.217504][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  153.246036][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  153.307986][   T10] bridge0: port 1(bridge_slave_0) entered blocking state
[  153.314853][   T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[  153.368142][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  153.388815][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  153.417685][   T10] bridge0: port 2(bridge_slave_1) entered blocking state
[  153.424671][   T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[  153.467695][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  153.496085][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  153.504298][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  153.739389][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  153.747459][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  153.832958][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  153.860252][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  153.892394][ T5708] device veth0_vlan entered promiscuous mode
[  153.912490][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  153.925176][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  153.972549][ T5708] device veth1_macvtap entered promiscuous mode
[  153.990864][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  154.018398][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  154.037066][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  154.045796][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  154.055913][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  154.087453][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  154.133901][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  154.142632][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  154.157968][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  154.307990][ T5768] device syzkaller0 entered promiscuous mode
[  154.608246][  T312] device bridge_slave_1 left promiscuous mode
[  154.614232][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  154.655149][  T312] device bridge_slave_0 left promiscuous mode
[  154.683560][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  154.721913][  T312] device veth1_macvtap left promiscuous mode
[  154.752327][  T312] device veth0_vlan left promiscuous mode
[  155.700055][ T5797] bridge0: port 1(bridge_slave_0) entered blocking state
[  155.706929][ T5797] bridge0: port 1(bridge_slave_0) entered disabled state
[  155.714761][ T5797] device bridge_slave_0 entered promiscuous mode
[  155.721774][ T5797] bridge0: port 2(bridge_slave_1) entered blocking state
[  155.728802][ T5797] bridge0: port 2(bridge_slave_1) entered disabled state
[  155.736409][ T5797] device bridge_slave_1 entered promiscuous mode
[  155.808216][ T5832] device pim6reg1 entered promiscuous mode
[  156.381990][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  156.389386][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  156.468719][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  156.482915][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  156.496449][   T10] bridge0: port 1(bridge_slave_0) entered blocking state
[  156.503322][   T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[  156.510879][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  156.527589][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  156.535747][   T10] bridge0: port 2(bridge_slave_1) entered blocking state
[  156.542624][   T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[  156.559985][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  156.578316][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  156.605701][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  156.618911][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  156.670713][ T5797] device veth0_vlan entered promiscuous mode
[  156.680149][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  156.695107][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  156.703699][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  156.712190][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  156.723591][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  156.760417][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  156.814660][ T5797] device veth1_macvtap entered promiscuous mode
[  156.997501][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  157.005688][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  157.015065][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  157.023423][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  157.058209][  T312] device bridge_slave_1 left promiscuous mode
[  157.079890][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  157.120386][  T312] device bridge_slave_0 left promiscuous mode
[  157.154282][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  157.169588][  T312] device veth1_macvtap left promiscuous mode
[  157.175540][  T312] device veth0_vlan left promiscuous mode
[  158.284080][ T5911] bridge0: port 1(bridge_slave_0) entered blocking state
[  158.291459][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state
[  158.318072][ T5911] device bridge_slave_0 entered promiscuous mode
[  158.361009][ T5911] bridge0: port 2(bridge_slave_1) entered blocking state
[  158.380380][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state
[  158.412482][ T5911] device bridge_slave_1 entered promiscuous mode
[  158.421400][  T312] device bridge_slave_1 left promiscuous mode
[  158.439768][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  158.457732][  T312] device bridge_slave_0 left promiscuous mode
[  158.463884][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  158.472647][  T312] device veth1_macvtap left promiscuous mode
[  158.478759][  T312] device veth0_vlan left promiscuous mode
[  158.596334][ T5928] device veth1_macvtap left promiscuous mode
[  158.624882][ T5931] device veth1_macvtap entered promiscuous mode
[  158.708597][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  158.715952][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  158.737430][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  158.747850][   T30] audit: type=1400 audit(1742996084.582:176): avc:  denied  { setattr } for  pid=5938 comm="syz.4.1720" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[  158.748168][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  158.784124][   T10] bridge0: port 1(bridge_slave_0) entered blocking state
[  158.791037][   T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[  158.798392][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  158.807088][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  158.816628][   T10] bridge0: port 2(bridge_slave_1) entered blocking state
[  158.823491][   T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[  158.832408][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  158.844258][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  158.855807][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  158.871189][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  158.884468][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  158.893239][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  158.900572][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  158.910780][ T5911] device veth0_vlan entered promiscuous mode
[  158.930493][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  158.942237][ T5911] device veth1_macvtap entered promiscuous mode
[  158.980257][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  158.991988][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  160.153609][  T312] device bridge_slave_1 left promiscuous mode
[  160.160387][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  160.188460][  T312] device bridge_slave_0 left promiscuous mode
[  160.229953][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  160.278160][  T312] device veth1_macvtap left promiscuous mode
[  160.326346][  T312] device veth0_vlan left promiscuous mode
[  160.663929][ T5967] device pim6reg1 entered promiscuous mode
[  160.809474][ T5963] bridge0: port 1(bridge_slave_0) entered blocking state
[  160.816450][ T5963] bridge0: port 1(bridge_slave_0) entered disabled state
[  160.824103][ T5963] device bridge_slave_0 entered promiscuous mode
[  160.831048][ T5963] bridge0: port 2(bridge_slave_1) entered blocking state
[  160.837987][ T5963] bridge0: port 2(bridge_slave_1) entered disabled state
[  160.846812][ T5963] device bridge_slave_1 entered promiscuous mode
[  161.006873][ T5963] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.013793][ T5963] bridge0: port 2(bridge_slave_1) entered forwarding state
[  161.020890][ T5963] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.027749][ T5963] bridge0: port 1(bridge_slave_0) entered forwarding state
[  161.107054][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  161.119520][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.136969][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.188044][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  161.197457][  T312] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.204330][  T312] bridge0: port 1(bridge_slave_0) entered forwarding state
[  161.222347][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  161.232802][  T312] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.239699][  T312] bridge0: port 2(bridge_slave_1) entered forwarding state
[  161.248404][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  161.265822][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  161.282986][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  161.299897][ T5963] device veth0_vlan entered promiscuous mode
[  161.314031][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  161.334719][ T5963] device veth1_macvtap entered promiscuous mode
[  161.346161][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  161.355289][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  161.363141][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  161.387044][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  161.395500][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  161.562957][ T6018] device bond_slave_1 entered promiscuous mode
[  161.587751][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready
[  161.597685][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  162.581190][ T6029] bridge0: port 1(bridge_slave_0) entered blocking state
[  162.593646][ T6029] bridge0: port 1(bridge_slave_0) entered disabled state
[  162.604107][ T6029] device bridge_slave_0 entered promiscuous mode
[  162.662605][ T6029] bridge0: port 2(bridge_slave_1) entered blocking state
[  162.737263][ T6029] bridge0: port 2(bridge_slave_1) entered disabled state
[  162.744782][ T6029] device bridge_slave_1 entered promiscuous mode
[  162.772671][  T312] device bridge_slave_1 left promiscuous mode
[  162.793848][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  162.811883][  T312] device bridge_slave_0 left promiscuous mode
[  162.817917][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  162.843625][  T312] device veth1_macvtap left promiscuous mode
[  162.855755][  T312] device veth0_vlan left promiscuous mode
[  163.375014][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  163.388024][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  163.398856][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  163.410420][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  163.418973][   T10] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.425960][   T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[  163.469798][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  163.487979][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  163.496272][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  163.504621][   T10] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.511499][   T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[  163.519214][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  163.582396][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  163.652245][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  163.661199][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  163.687370][ T6029] device veth0_vlan entered promiscuous mode
[  163.706665][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  163.719235][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  163.759970][ T6029] device veth1_macvtap entered promiscuous mode
[  163.767916][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  163.775472][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  163.784640][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  163.802566][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  163.832342][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  163.864816][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  163.876011][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  163.886203][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  163.902641][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  163.931517][ T6091] device sit0 entered promiscuous mode
[  165.337455][  T312] device bridge_slave_1 left promiscuous mode
[  165.349752][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[  165.376313][  T312] device bridge_slave_0 left promiscuous mode
[  165.382838][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.408554][  T312] device veth1_macvtap left promiscuous mode
[  165.417951][  T312] device veth0_vlan left promiscuous mode
[  165.693814][ T6113] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.701989][ T6113] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.721388][ T6113] device bridge_slave_0 entered promiscuous mode
[  165.778569][ T6113] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.785550][ T6113] bridge0: port 2(bridge_slave_1) entered disabled state
[  165.802507][ T6113] device bridge_slave_1 entered promiscuous mode
[  165.810190][ T6156] device veth1_macvtap left promiscuous mode
[  165.939637][ T6158] device veth1_macvtap left promiscuous mode
[  165.962528][ T6159] device veth1_macvtap entered promiscuous mode
[  165.972786][ T6160] device veth1_macvtap entered promiscuous mode
[  166.590877][ T6189] device veth0_vlan left promiscuous mode
[  166.596814][ T6189] device veth0_vlan entered promiscuous mode
[  166.603766][ T6189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  166.614034][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  166.625393][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  166.640311][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  166.824602][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.834065][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.862220][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  166.882362][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  166.902384][   T45] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.909276][   T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.946365][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.966519][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.025196][   T45] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.032128][   T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[  167.125458][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  167.160775][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  167.177611][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  167.195730][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  167.212588][   T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  167.898305][ T6199] device veth1_macvtap left promiscuous mode
[  167.908154][ T6202] device veth1_macvtap entered promiscuous mode
[  167.922422][ T6113] device veth0_vlan entered promiscuous mode
[  167.942645][ T6113] device veth1_macvtap entered promiscuous mode
[  193.244196][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  193.252601][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  193.260989][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  193.268945][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  193.276869][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  193.285087][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  193.293222][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  193.300870][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  193.309058][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  193.317386][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  193.325478][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  193.343676][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  193.354113][   T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  208.823409][ T6268] device veth1_macvtap left promiscuous mode
[  208.830633][ T6269] device veth1_macvtap entered promiscuous mode
[  208.900314][ T6286] bridge0: port 3(veth0_to_batadv) entered blocking state
[  208.907624][ T6286] bridge0: port 3(veth0_to_batadv) entered disabled state
[  208.919520][ T6286] device veth0_to_batadv entered promiscuous mode
[  208.926721][ T6286] bridge0: port 3(veth0_to_batadv) entered blocking state
[  208.933952][ T6286] bridge0: port 3(veth0_to_batadv) entered forwarding state
[  237.116781][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  341.717724][   T17] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10240 jiffies s: 40537 root: 0x1/.
[  341.729641][   T17] rcu: blocking rcu_node structures (internal RCU debug):
[  341.736566][   T17] Task dump for CPU 0:
[  341.740494][   T17] task:syz.2.1793      state:R  running task     stack:22864 pid: 6191 ppid:   292 flags:0x0000400c
[  341.751088][   T17] Call Trace:
[  341.754182][   T17]  <TASK>
[  341.756966][   T17]  __schedule+0xcd4/0x1590
[  341.761231][   T17]  ? irqentry_exit+0x30/0x40
[  341.765642][   T17]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  341.771300][   T17]  ? __this_cpu_preempt_check+0x13/0x20
[  341.776661][   T17]  ? sysvec_apic_timer_interrupt+0x89/0xc0
[  341.782339][   T17]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  341.788315][   T17]  ? _raw_spin_lock+0xc0/0x1b0
[  341.792893][   T17]  ? _raw_spin_trylock_bh+0x190/0x190
[  341.798143][   T17]  ? unmap_page_range+0xa6d/0x1ed0
[  341.803062][   T17]  ? mmu_notifier_invalidate_range_end+0xe0/0xe0
[  341.809242][   T17]  ? irqentry_exit+0x30/0x40
[  341.813637][   T17]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  341.819291][   T17]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  341.825274][   T17]  ? uprobe_munmap+0x18d/0x450
[  341.829891][   T17]  ? unmap_vmas+0x389/0x560
[  341.834213][   T17]  ? unmap_page_range+0x1ed0/0x1ed0
[  341.839274][   T17]  ? tlb_gather_mmu_fullmm+0x165/0x210
[  341.844541][   T17]  ? exit_mmap+0x458/0x990
[  341.848801][   T17]  ? exit_aio+0x25e/0x3c0
[  341.852958][   T17]  ? vm_brk+0x30/0x30
[  341.856772][   T17]  ? mutex_unlock+0xb2/0x260
[  341.861221][   T17]  ? uprobe_clear_state+0x2cd/0x320
[  341.866235][   T17]  ? __mmput+0x95/0x310
[  341.870257][   T17]  ? mmput+0x5b/0x170
[  341.874049][   T17]  ? do_exit+0xb9c/0x2ca0
[  341.878226][   T17]  ? __cond_resched+0x20/0x20
[  341.882732][   T17]  ? put_task_struct+0x80/0x80
[  341.887339][   T17]  ? irqentry_exit+0x30/0x40
[  341.891752][   T17]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  341.897419][   T17]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  341.903384][   T17]  ? do_group_exit+0x141/0x310
[  341.907999][   T17]  ? get_signal+0x7a3/0x1630
[  341.912426][   T17]  ? arch_do_signal_or_restart+0xbd/0x1680
[  341.918067][   T17]  ? irqentry_exit+0x30/0x40
[  341.922479][   T17]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  341.928157][   T17]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  341.934109][   T17]  ? get_sigframe_size+0x10/0x10
[  341.938896][   T17]  ? __se_sys_futex+0x37b/0x3e0
[  341.943573][   T17]  ? exit_to_user_mode_loop+0xa0/0xe0
[  341.948792][   T17]  ? exit_to_user_mode_prepare+0x5a/0xa0
[  341.954243][   T17]  ? syscall_exit_to_user_mode+0x26/0x160
[  341.959828][   T17]  ? do_syscall_64+0x47/0xb0
[  341.964227][   T17]  ? clear_bhb_loop+0x35/0x90
[  341.968754][   T17]  ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[  341.974644][   T17]  </TASK>
[  375.033609][    C0] watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.2.1793:6191]
[  375.041687][    C0] Modules linked in:
[  375.045418][    C0] CPU: 0 PID: 6191 Comm: syz.2.1793 Tainted: G        W         5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[  375.056536][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[  375.066708][    C0] RIP: 0010:__dev_queue_xmit+0x1e8/0x2e80
[  375.072255][    C0] Code: c0 0f 85 38 1e 00 00 48 89 5c 24 78 8b 03 49 8d 5c 06 03 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 35 1e 00 00 0f b6 1b <89> de 83 e6 40 31 ff e8 ac e1 87 fd 83 e3 40 0f 85 b7 1a 00 00 e8
[  375.092049][    C0] RSP: 0018:ffffc900000064a0 EFLAGS: 00000246
[  375.097950][    C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1ffff11024490cde
[  375.105888][    C0] RDX: ffff888122486640 RSI: 0000000000000000 RDI: ffff888122486640
[  375.113919][    C0] RBP: ffffc90000006698 R08: ffffffff842649ea R09: ffffed1029b6ac22
[  375.121738][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000006620
[  375.129537][    C0] R13: dffffc0000000000 R14: ffff88814db56000 R15: 1ffff11024490ce2
[  375.137349][    C0] FS:  0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[  375.146121][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  375.152703][    C0] CR2: 00007f610564a8db CR3: 0000000006a0f000 CR4: 00000000003506b0
[  375.160517][    C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
[  375.168325][    C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  375.176137][    C0] Call Trace:
[  375.179528][    C0]  <IRQ>
[  375.182217][    C0]  ? show_regs+0x58/0x60
[  375.186293][    C0]  ? watchdog_timer_fn+0x4b1/0x5f0
[  375.191237][    C0]  ? proc_watchdog_cpumask+0xd0/0xd0
[  375.196665][    C0]  ? __hrtimer_run_queues+0x41a/0xad0
[  375.201982][    C0]  ? hrtimer_interrupt+0xaa0/0xaa0
[  375.206924][    C0]  ? clockevents_program_event+0x236/0x300
[  375.212553][    C0]  ? ktime_get_update_offsets_now+0x2ba/0x2d0
[  375.218462][    C0]  ? hrtimer_interrupt+0x40c/0xaa0
[  375.223408][    C0]  ? __sysvec_apic_timer_interrupt+0xfb/0x3f0
[  375.229303][    C0]  ? sysvec_apic_timer_interrupt+0x53/0xc0
[  375.234949][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.240936][    C0]  ? ip_finish_output2+0xb3a/0xf60
[  375.246088][    C0]  ? __dev_queue_xmit+0x1e8/0x2e80
[  375.251023][    C0]  ? debug_smp_processor_id+0x17/0x20
[  375.256312][    C0]  ? irqtime_account_irq+0xdc/0x3c0
[  375.261348][    C0]  ? dev_queue_xmit+0x20/0x20
[  375.265862][    C0]  ? __irq_exit_rcu+0x5e/0xf0
[  375.270373][    C0]  ? irqentry_exit+0x30/0x40
[  375.274801][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.280441][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.286433][    C0]  ? dev_queue_xmit+0xd/0x20
[  375.290859][    C0]  dev_queue_xmit+0x17/0x20
[  375.295201][    C0]  ip_finish_output2+0xb9f/0xf60
[  375.299974][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.305960][    C0]  ? ip_fragment+0x210/0x210
[  375.310385][    C0]  ? nf_hook_slow+0xd1/0x200
[  375.314839][    C0]  __ip_finish_output+0x162/0x360
[  375.319696][    C0]  ip_finish_output+0x31/0x210
[  375.324281][    C0]  ? ip_output+0x3e1/0x420
[  375.328707][    C0]  ip_output+0x1d6/0x420
[  375.332813][    C0]  ? ip_finish_output+0x210/0x210
[  375.337643][    C0]  ? ip_mc_finish_output+0x3c0/0x3c0
[  375.342811][    C0]  ? nf_hook_slow+0xd1/0x200
[  375.347191][    C0]  __ip_queue_xmit+0x1105/0x1c20
[  375.351963][    C0]  ip_queue_xmit+0x4c/0x70
[  375.356212][    C0]  __tcp_transmit_skb+0x1e84/0x3920
[  375.361391][    C0]  ? __tcp_send_ack+0x710/0x710
[  375.366508][    C0]  ? __kasan_kmalloc+0x9/0x10
[  375.371009][    C0]  ? __kmalloc_track_caller+0x13e/0x2c0
[  375.376394][    C0]  ? __kasan_check_write+0x14/0x20
[  375.381340][    C0]  ? __alloc_skb+0x355/0x550
[  375.385780][    C0]  __tcp_send_ack+0x303/0x710
[  375.390281][    C0]  tcp_send_ack+0x3b/0x60
[  375.394535][    C0]  __tcp_ack_snd_check+0x3fc/0x970
[  375.399481][    C0]  tcp_rcv_established+0x10f1/0x1ac0
[  375.404605][    C0]  ? tcp_check_space+0x9d0/0x9d0
[  375.409380][    C0]  ? __kasan_check_read+0x11/0x20
[  375.414243][    C0]  ? ipv4_dst_check+0xe3/0x150
[  375.418980][    C0]  tcp_v4_do_rcv+0x3d7/0xa00
[  375.423406][    C0]  tcp_v4_rcv+0x23dd/0x2a70
[  375.427950][    C0]  ? irqtime_account_irq+0xdc/0x3c0
[  375.432956][    C0]  ? tcp_filter+0x90/0x90
[  375.437124][    C0]  ip_protocol_deliver_rcu+0x32f/0x710
[  375.442408][    C0]  ip_local_deliver+0x2c6/0x590
[  375.447097][    C0]  ? ip_protocol_deliver_rcu+0x710/0x710
[  375.452648][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.458637][    C0]  ? sock_put+0x5c/0x80
[  375.462628][    C0]  ip_sublist_rcv+0x7e2/0x980
[  375.467143][    C0]  ? irqentry_exit+0x30/0x40
[  375.471712][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.477335][    C0]  ? ip_list_rcv+0x470/0x470
[  375.481776][    C0]  ? memset+0x35/0x40
[  375.485724][    C0]  ? ip_rcv_core+0x736/0xb50
[  375.490347][    C0]  ip_list_rcv+0x422/0x470
[  375.494593][    C0]  ? ip_rcv_finish+0xd0/0xd0
[  375.499137][    C0]  ? ip_rcv_finish+0xd0/0xd0
[  375.503561][    C0]  __netif_receive_skb_list_core+0x6b1/0x890
[  375.509381][    C0]  ? __netif_receive_skb+0x530/0x530
[  375.514496][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.520484][    C0]  ? napi_gro_receive+0x2bc/0x920
[  375.525345][    C0]  netif_receive_skb_list_internal+0x967/0xcc0
[  375.531335][    C0]  ? __kasan_check_read+0x11/0x20
[  375.536197][    C0]  ? netif_receive_skb_list+0x2d0/0x2d0
[  375.541580][    C0]  napi_gro_receive+0x45f/0x920
[  375.546267][    C0]  receive_buf+0x38c2/0x5860
[  375.550780][    C0]  ? irqentry_exit+0x30/0x40
[  375.555451][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.561085][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.567085][    C0]  ? virtnet_poll_tx+0x4d0/0x4d0
[  375.571848][    C0]  ? napi_gro_receive+0x2bc/0x920
[  375.576708][    C0]  ? detach_buf_split+0x5ff/0xae0
[  375.581570][    C0]  ? audit_tree_destroy_watch+0x20/0x20
[  375.587175][    C0]  ? detach_buf_split+0x71a/0xae0
[  375.592011][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.597999][    C0]  ? napi_gro_receive+0x2bc/0x920
[  375.602941][    C0]  ? dwc_tx_submit+0x81/0x210
[  375.607457][    C0]  ? virtqueue_get_buf_ctx+0x6de/0xe30
[  375.612866][    C0]  virtnet_poll+0x615/0x1250
[  375.617269][    C0]  ? refill_work+0x220/0x220
[  375.621691][    C0]  ? __irq_exit_rcu+0x5e/0xf0
[  375.626199][    C0]  ? irqentry_exit+0x30/0x40
[  375.630629][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.636708][    C0]  __napi_poll+0xc4/0x5a0
[  375.640877][    C0]  net_rx_action+0x47d/0xc50
[  375.646059][    C0]  ? net_tx_action+0x550/0x550
[  375.650642][    C0]  handle_softirqs+0x25e/0x5c0
[  375.655259][    C0]  __irq_exit_rcu+0x52/0xf0
[  375.659573][    C0]  irq_exit_rcu+0x9/0x10
[  375.663655][    C0]  sysvec_apic_timer_interrupt+0xa9/0xc0
[  375.669124][    C0]  </IRQ>
[  375.671898][    C0]  <TASK>
[  375.674676][    C0]  asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.680494][    C0] RIP: 0010:_raw_spin_lock+0xc0/0x1b0
[  375.685916][    C0] Code: fc 4c 89 ff be 04 00 00 00 e8 3c be ca fc 43 0f b6 04 26 84 c0 0f 85 aa 00 00 00 8b 44 24 20 b9 01 00 00 00 f0 41 0f b1 4d 00 <75> 33 48 c7 04 24 0e 36 e0 45 49 c7 04 1c 00 00 00 00 65 48 8b 04
[  375.705352][    C0] RSP: 0018:ffffc90000ac7400 EFLAGS: 00000246
[  375.711254][    C0] RAX: 0000000000000000 RBX: 1ffff92000158e80 RCX: 0000000000000001
[  375.719068][    C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffc90000ac7420
[  375.726876][    C0] RBP: ffffc90000ac7490 R08: dffffc0000000000 R09: 0000000000000003
[  375.734688][    C0] R10: fffff52000158e84 R11: dffffc0000000001 R12: dffffc0000000000
[  375.742500][    C0] R13: ffffea00044982e8 R14: 1ffff92000158e84 R15: ffffc90000ac7420
[  375.750321][    C0]  ? _raw_spin_trylock_bh+0x190/0x190
[  375.755526][    C0]  unmap_page_range+0xa6d/0x1ed0
[  375.760301][    C0]  ? mmu_notifier_invalidate_range_end+0xe0/0xe0
[  375.766464][    C0]  ? irqentry_exit+0x30/0x40
[  375.770880][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.776522][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.782549][    C0]  ? uprobe_munmap+0x18d/0x450
[  375.787114][    C0]  unmap_vmas+0x389/0x560
[  375.791280][    C0]  ? unmap_page_range+0x1ed0/0x1ed0
[  375.796313][    C0]  ? tlb_gather_mmu_fullmm+0x165/0x210
[  375.801606][    C0]  exit_mmap+0x458/0x990
[  375.805688][    C0]  ? exit_aio+0x25e/0x3c0
[  375.809853][    C0]  ? vm_brk+0x30/0x30
[  375.813669][    C0]  ? mutex_unlock+0xb2/0x260
[  375.818104][    C0]  ? uprobe_clear_state+0x2cd/0x320
[  375.823131][    C0]  __mmput+0x95/0x310
[  375.826950][    C0]  mmput+0x5b/0x170
[  375.830596][    C0]  do_exit+0xb9c/0x2ca0
[  375.834588][    C0]  ? __cond_resched+0x20/0x20
[  375.839213][    C0]  ? put_task_struct+0x80/0x80
[  375.843811][    C0]  ? irqentry_exit+0x30/0x40
[  375.848234][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.854058][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.860033][    C0]  do_group_exit+0x141/0x310
[  375.864473][    C0]  get_signal+0x7a3/0x1630
[  375.868719][    C0]  arch_do_signal_or_restart+0xbd/0x1680
[  375.874183][    C0]  ? irqentry_exit+0x30/0x40
[  375.878611][    C0]  ? sysvec_apic_timer_interrupt+0x64/0xc0
[  375.884422][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.890401][    C0]  ? get_sigframe_size+0x10/0x10
[  375.895175][    C0]  ? __se_sys_futex+0x37b/0x3e0
[  375.899865][    C0]  exit_to_user_mode_loop+0xa0/0xe0
[  375.904896][    C0]  exit_to_user_mode_prepare+0x5a/0xa0
[  375.910188][    C0]  syscall_exit_to_user_mode+0x26/0x160
[  375.915574][    C0]  do_syscall_64+0x47/0xb0
[  375.919824][    C0]  ? clear_bhb_loop+0x35/0x90
[  375.924336][    C0]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[  375.930066][    C0] RIP: 0033:0x7f49bd842169
[  375.934319][    C0] Code: Unable to access opcode bytes at RIP 0x7f49bd84213f.
[  375.941521][    C0] RSP: 002b:00007f49bbeac0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  375.949768][    C0] RAX: 0000000000000000 RBX: 00007f49bda5afa8 RCX: 00007f49bd842169
[  375.957578][    C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f49bda5afa8
[  375.965391][    C0] RBP: 00007f49bda5afa0 R08: 0000000000000000 R09: 0000000000000000
[  375.973353][    C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49bda5afac
[  375.981166][    C0] R13: 0000000000000000 R14: 00007ffc7d0f47e0 R15: 00007ffc7d0f48c8
[  375.988985][    C0]  </TASK>
[  375.991851][    C0] Sending NMI from CPU 0 to CPUs 1:
[  375.996899][    C1] NMI backtrace for cpu 1
[  375.996911][    C1] CPU: 1 PID: 279 Comm: syz-executor Tainted: G        W         5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
[  375.996933][    C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[  375.996943][    C1] RIP: 0010:kvm_wait+0x147/0x180
[  375.996966][    C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b d9 12 04 fb f4 <e9> 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c
[  375.996981][    C1] RSP: 0018:ffffc900007af5a0 EFLAGS: 00000246
[  375.996997][    C1] RAX: 0000000000000003 RBX: 1ffff920000f5eb8 RCX: ffffffff81553c8f
[  375.997009][    C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88811b2a3148
[  375.997022][    C1] RBP: ffffc900007af650 R08: dffffc0000000000 R09: ffffed102365462a
[  375.997036][    C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  375.997055][    C1] R13: ffff88811b2a3148 R14: 0000000000000003 R15: 1ffff920000f5ebc
[  375.997071][    C1] FS:  0000555579d39500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  375.997087][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  375.997100][    C1] CR2: 00007f7730dd2c58 CR3: 000000011cf02000 CR4: 00000000003506a0
[  375.997116][    C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
[  375.997127][    C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  375.997138][    C1] Call Trace:
[  375.997143][    C1]  <NMI>
[  375.997149][    C1]  ? show_regs+0x58/0x60
[  375.997168][    C1]  ? nmi_cpu_backtrace+0x29f/0x300
[  375.997186][    C1]  ? nmi_trigger_cpumask_backtrace+0x270/0x270
[  375.997206][    C1]  ? kvm_wait+0x147/0x180
[  375.997221][    C1]  ? kvm_wait+0x147/0x180
[  375.997237][    C1]  ? nmi_cpu_backtrace_handler+0xc/0x20
[  375.997258][    C1]  ? nmi_handle+0xa8/0x280
[  375.997276][    C1]  ? kvm_wait+0x147/0x180
[  375.997292][    C1]  ? default_do_nmi+0x69/0x160
[  375.997311][    C1]  ? exc_nmi+0xad/0x100
[  375.997327][    C1]  ? end_repeat_nmi+0x16/0x31
[  375.997347][    C1]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  375.997369][    C1]  ? kvm_wait+0x147/0x180
[  375.997385][    C1]  ? kvm_wait+0x147/0x180
[  375.997401][    C1]  ? kvm_wait+0x147/0x180
[  375.997417][    C1]  </NMI>
[  375.997422][    C1]  <TASK>
[  375.997427][    C1]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.997447][    C1]  ? kvm_arch_para_hints+0x30/0x30
[  375.997465][    C1]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  375.997486][    C1]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  375.997509][    C1]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  375.997532][    C1]  _raw_spin_lock_bh+0x139/0x1b0
[  375.997548][    C1]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  375.997564][    C1]  ? avc_has_perm_noaudit+0x2dd/0x430
[  375.997586][    C1]  lock_sock_nested+0x97/0x300
[  375.997605][    C1]  ? sock_init_data+0xc0/0xc0
[  375.997627][    C1]  tcp_recvmsg+0x226/0x7f0
[  375.997646][    C1]  ? avc_has_perm_noaudit+0x430/0x430
[  375.997666][    C1]  ? tcp_recv_timestamp+0x710/0x710
[  375.997688][    C1]  ? selinux_socket_sendmsg+0x340/0x340
[  375.997708][    C1]  inet_recvmsg+0x158/0x500
[  375.997726][    C1]  ? inet_sendpage+0x120/0x120
[  375.997741][    C1]  ? file_has_perm+0x508/0x6c0
[  375.997759][    C1]  ? security_socket_recvmsg+0x87/0xb0
[  375.997776][    C1]  ? inet_sendpage+0x120/0x120
[  375.997793][    C1]  sock_read_iter+0x353/0x480
[  375.997811][    C1]  ? kernel_sock_ip_overhead+0x280/0x280
[  375.997831][    C1]  ? iov_iter_init+0x53/0x190
[  375.997851][    C1]  vfs_read+0xa81/0xd40
[  375.997868][    C1]  ? kernel_read+0x1f0/0x1f0
[  375.997885][    C1]  ? sigprocmask+0x280/0x280
[  375.997906][    C1]  ? __kasan_check_read+0x11/0x20
[  375.997924][    C1]  ? __fdget_pos+0x209/0x3a0
[  375.997941][    C1]  ksys_read+0x199/0x2c0
[  375.997958][    C1]  ? vfs_write+0x1110/0x1110
[  375.997975][    C1]  ? debug_smp_processor_id+0x17/0x20
[  375.997993][    C1]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  375.998014][    C1]  __x64_sys_read+0x7b/0x90
[  375.998030][    C1]  x64_sys_call+0x28/0x9a0
[  375.998054][    C1]  do_syscall_64+0x3b/0xb0
[  375.998070][    C1]  ? clear_bhb_loop+0x35/0x90
[  375.998086][    C1]  entry_SYSCALL_64_after_hwframe+0x66/0xd0
[  375.998104][    C1] RIP: 0033:0x7f7732f1ab3d
[  375.998120][    C1] Code: a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb b5 e8 a8 48 00 00 0f 1f 84 00 00 00 00 00 80 3d 01 1a 1f 00 00 74 17 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 5b c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec
[  375.998134][    C1] RSP: 002b:00007ffc5a061ca8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  375.998151][    C1] RAX: ffffffffffffffda RBX: 00007ffc5a061db0 RCX: 00007f7732f1ab3d
[  375.998163][    C1] RDX: 0000000000000004 RSI: 00007ffc5a061cbc RDI: 0000000000000003
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[  375.998174][    C1] RBP: 0000000000000000 R08: 00007ffc5a11c080 R09: 00007ffc5a11c0b0
[  375.998186][    C1] R10: 00000000000119e8 R11: 0000000000000246 R12: 00007ffc5a0620d0
[  375.998198][    C1] R13: 0000000000000004 R14: 00007ffc5a061cbc R15: 00007ffc5a061d50
[  375.998214][    C1]  </TASK>
[  376.517159][   T30] audit: type=1400 audit(1742996302.302:177): avc:  denied  { rename } for  pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  376.539019][   T30] audit: type=1400 audit(1742996302.302:178): avc:  denied  { unlink } for  pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  376.561098][   T30] audit: type=1400 audit(1742996302.302:179): avc:  denied  { create } for  pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1