last executing test programs: 3m4.586124528s ago: executing program 3 (id=2508): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x33}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x1a) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x301142, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b400000000090000dd0a00000000000073019d00000000009500000000000000425e494e53a90f38f870e056d03b2010633dee8a3a6601dbd212"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000640)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1bd4000c"], 0xffdd) 3m4.385760745s ago: executing program 3 (id=2513): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0x44) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) (async) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0x44) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) (async) 3m1.212921141s ago: executing program 3 (id=2542): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000500)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010021201000"}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x1, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2f}}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r5, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r5, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) 3m0.400328779s ago: executing program 3 (id=2548): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'vlan0\x00', @multicast}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 3m0.186633886s ago: executing program 3 (id=2551): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1c, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000700850000001700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000040000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) (async) r3 = perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x7, 0x9, 0x80, 0x2, 0x0, 0x6, 0x2001, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x1, @perf_config_ext={0x9, 0x4}, 0x40, 0x1, 0x4, 0x5, 0x80000, 0xffff, 0x8, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, &(0x7f0000000080)="4d3bec220a89039e1aa26ff87cf43a5607ee720f26", 0x15, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0)="4a5ba7b6cfce450c25276db8df0d494ae8f374cd4158b1a7ad4ff63e3d715f731f152ca43982c6664a2c0bcf6542b2ef192664a9f494d5605cad03cc33bfc0c89db41904e1e41bd885e0b2039b281f6516376d72814c79da1bc41659daa28f1a05c0ca9dae3e1afc3550dcecd4e47cb81336261b36c4f1f38a4c3968847bb4352960183c654cd6d7e7879e49d90838ec61fddeee23296cec944ac59732e4a3a4d49a598fcf6740a931cf57ed4025de43") (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x80, 0x2a, 0xca, 0x92, 0x3, 0x0, 0x2d4, 0x10080, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000002c0), 0x1}, 0x182, 0x9, 0xd, 0x5, 0xfffffffffffffff8, 0x2d, 0x7, 0x0, 0x81, 0x0, 0xfffffffffffeffff}, r2, 0xe, r3, 0xf) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xfeffff, 0x0, 0x0, 0x0, 0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x30, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88f7ffff4000630677fbac14142c88a8a0a688a89f4b4d2f87e56dca6aab84fe13f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x43, 0xffffffffffffff11, &(0x7f0000000000), &(0x7f0000000540)="9c18a537674b5d9e9185cd0add6d6d4c9e63ece1b58d7b42c6c27a5f1671fdf94432fc1baaef86573fc9fbb426f9284a6bd47174eb6fb9f893c18421d26d649d633a0f459969df8d3284737c5586cd696884192ce10db91e21fd978337408b7bd1cbb6789b51d63c8e68dab5da01c8e19d572950cfe2142e244990624270eaa2a2ded01d820cec011a6b05192b91cd193b1995bc296c249e1ef1570000000000000f75eec7040de10b5d8c536e5b5ce39ab84e658eb8f02fe112a5136cd3ac5c06848a40ec335a", 0x0, 0x0, 0x800006}, 0x3b) 3m0.110400229s ago: executing program 3 (id=2552): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000000600), 0x0}, 0x20) r3 = syz_clone(0x80000000, &(0x7f0000000080)="ebf4c6dc85a7d5", 0x7, &(0x7f00000000c0), &(0x7f0000000340), &(0x7f0000000500)="c45e0bc4176ec26e9d7a53d85aa0147f44f24d53b755c9eeab3aa421099cc11712d47623313563c30fbefa756359fcc82daf631b4a4532886c9d708e081a9dec95ca78070664d7d100483f80ee1c7e24d21e8f2f") perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r5, &(0x7f0000000140), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x10, 0xf, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x9c}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0xd}, 0x94) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) 2m45.086242832s ago: executing program 32 (id=2552): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000000600), 0x0}, 0x20) r3 = syz_clone(0x80000000, &(0x7f0000000080)="ebf4c6dc85a7d5", 0x7, &(0x7f00000000c0), &(0x7f0000000340), &(0x7f0000000500)="c45e0bc4176ec26e9d7a53d85aa0147f44f24d53b755c9eeab3aa421099cc11712d47623313563c30fbefa756359fcc82daf631b4a4532886c9d708e081a9dec95ca78070664d7d100483f80ee1c7e24d21e8f2f") perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r5, &(0x7f0000000140), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x10, 0xf, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x9c}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0xd}, 0x94) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) 2.573337863s ago: executing program 1 (id=4700): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x17, 0x31, &(0x7f0000000a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe4a}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @exit, @call={0x85, 0x0, 0x0, 0x4f}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x5, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3e}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000bc0)='syzkaller\x00', 0x10, 0x14, &(0x7f0000000c00)=""/20, 0x41000, 0x0, '\x00', r4, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c80)=[0xffffffffffffffff]}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000020c0)={r5, 0xe0, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000001e40)=[0x0, 0x0], &(0x7f0000001e80)=[0x0, 0x0], 0x0, 0x53, &(0x7f0000001ec0)=[{}, {}], 0x10, 0x10, &(0x7f0000001f00), &(0x7f0000001f40), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000001f80)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3, 0x1}}, @volatile={0x2, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x30, 0x5f, 0x71, 0x2e, 0x61, 0x10, 0x0]}}, &(0x7f0000000740)=""/157, 0x45, 0x9d, 0x1, 0x6, 0x10000}, 0x28) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xfffffff9}}]}, {0x0, [0x2e, 0x2e, 0xfc, 0x61, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000dc0)=""/4096, 0x39, 0x1000, 0x0, 0x4}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000080)={r9}, 0x8) setsockopt$sock_attach_bpf(r8, 0x1, 0x14, &(0x7f0000000040)=r10, 0x3b) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x7, 0x5, 0x6, 0x18134, r3, 0x8, '\x00', r4, r6, 0x5, 0x2, 0x4, 0x3, @value=r7, @void, @value=r10}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r2, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd65e0ffff00123c", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85100000010000009500000000000000850000007600000095"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xa6, &(0x7f0000000340)=""/166}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r12, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r13, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x36) 2.472924167s ago: executing program 5 (id=4702): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x1c, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r8}, &(0x7f0000000500), &(0x7f0000000240)=r5}, 0x20) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) (async, rerun: 32) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) close(r2) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x48) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async, rerun: 64) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r11}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r12) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="02000000000000000000000000b70e1401000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r13, &(0x7f0000000380)="6a1cbc6c87"}, 0x20) 2.37807109s ago: executing program 0 (id=4704): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10117, 0x0, 0xa0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.887969186s ago: executing program 5 (id=4709): bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200"/20, @ANYRES32, @ANYBLOB="000000000000000000000000000000000098d1958c20222c8f6def1c829331b68ea31a6bb8d45328fe89fe1bf59203d80880ada5d17cd67e75e8f6f8731380abf8bd47381c151e3865230761e7edec9cd5d9d353f1e291d6231db5abf67cd79caeb29af7bd180d07724af7592b9eb2a09426594411e1693c0f7217aee3932aa4b3a32630b2f3bb609d80d2eb2172127a9204b9eb34418f89487285cba3fb2a000286973d0b8dd8116ca6eb", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xb703, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000023ed0000180100002820702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7", 0x23}], 0x1}, 0x20000000) recvmsg(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)=""/54, 0x36}], 0x1}, 0x2020) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711815000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f00000002c0)=0x7) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000500)={0x3, &(0x7f0000000280)=[{0x0, 0x81, 0x6, 0x8}, {0xa25, 0xd4, 0xf, 0x3}, {0x8001, 0x6, 0xe, 0x401}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x0, 0x60, 0xe5, &(0x7f0000000000)="461f70ae278796c270208e5d522b2a0136948b5c39e08d6f30562d4d005366d20b66ef459193373ed6fe219405cf86dea10a4ec86c1a8ef64cfcbff3192e7360ee751b6ab97ffe83929e2e8e8d09bc48ccb833417da72276e785d3d81be7993b", &(0x7f0000000080)=""/229, 0x208, 0x0, 0xd, 0x4f, &(0x7f0000000180)="e227cb34f14fb5e45489e0786a", &(0x7f0000000200)="a928f9ba218eef27a6e927c4e4166b4b5cb35510c3e1a768d57bd18827ea86b512970d0dc4b1ec668ccaae7a445f7bab55f0d3a74c6321841c8b2b4315976e88c8407b4ca14605b9f4bdda6790ce94", 0x1}, 0x50) 1.887165136s ago: executing program 1 (id=4710): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000fb00"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09800000000000b50901000000000026000000f9ffffff180100002020702500000000002020207b9af8ff00000000bda9dfff0000000037010000f8ffffffb702000008000000b70300000000000004000000060000002d93000000000000b503000000000000850000007600009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32, @ANYRESDEC], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000344a85000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100b702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_clone(0x2000, &(0x7f0000000400)="97cf50d12d6353d6b35c867c5bdc16fdc83d73ddb08676406b387caf78a1222f5077fac5dadee52684533eb5ab95cf19424adf964f3081a4039af17721e81747b4c638351a0df900c2f9db8b1c9ba95abb12b9d76c1d45b8c391f97cfc0771a1e099efe1eb942865766a369e02ccbc9f8e1f4c58d6b88639e6b1395406e504ddb752031eb0b22b4d64769e810151c56e2fac6bc4de3d08991b864d72ee0c0c5bf66e0f6ac7690bfa557a38e0f2bf7ddd20f59a3a78c1c7f497c73e780eaff3f48b674673504446b04abd33e79d306c7ae98ccc65a2cb49eeb4d32c29cd96c0d2e2e6c3ba5484e20d1ff03581cb3dc4055f", 0xf1, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="af47b2a5a3fce10f7fd36d8aee3cbfa527768ec47be20748a92754b9539ba66a7d7bc6d2bd6fcc383e7d2a2bde80332c85") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000003e00)={&(0x7f0000000980)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000003d80)=[{&(0x7f0000000f80)="be4c05bfd4608961229ef8d950702f5461da404389e327dc4b6c1efeeaa4f5fb85d2b240e178cddf309d39417ecde180245b9b8d292482fe2a1ec47b59818824418cf96c7637e03c781bc2ec0057b1a50d662036e50ac9b9a0df7ed23b6a148e89a2dbe437a3b081998bfed9acbe7868d13f46795c211c0073884d595b7e91f62cc42b673c1768c4ae1850c4c4a3f879a774fe721fcfd4ee962d5ea3e534ca", 0x9f}, {&(0x7f0000001040)="dafd5eeb901740ec8892faea422c41271576ffce6565a4c04e367e07121a3ae0b3f16efb3747490c4bad27d66d9b1748a7e9c81973f8f0018dff59f1ea45aea5252294848727f163b42ec36377369a5edc10816bf8722cbee0a14915002ce97a63d8c8b9503354ae605052832f71dc6ed1ef24af6b52d3ae715b26b68cd0ca4b128be15f8d14f8d12141fbe09cabacbbcfe0f5c68d356991ab40e72519bffdb39b1a52ccd30a793c338c59be472ffbdd2f3d854b4e45e292780eebab95978f909b0287f0a619b0da460243e8", 0xcc}, {&(0x7f0000002d00)="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", 0x1000}, {&(0x7f0000003d00)}, {&(0x7f0000003d40)="d60ece4da1d097d62c1afb4910d9863e2821e7eb61eb1809b687414da8e4e7168974e85b69cc6807e125062299284d4f7f94634801325900b4c86b31b31faa", 0x3f}], 0x5}, 0x4000) gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000240), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 1.805667699s ago: executing program 5 (id=4713): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003d40)={r0, 0x20, &(0x7f0000003d00)={&(0x7f0000000640)=""/77, 0x4d, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}}, 0x10) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x19e, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0x6, 0x0, 0x6, 0xffffffffffffffc0, 0xffffffffffffffff}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40e00, 0x23, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x7, 0x8, 0xd4e}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0xffffffffffffffff, r2, r2, r0], &(0x7f0000000500)=[{0x4, 0x1, 0xf, 0x1}, {0x0, 0x4, 0xf, 0x4}, {0x4, 0x4, 0xc}, {0x4, 0x5, 0x3, 0x2}, {0x1, 0x3, 0x1, 0x1a}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1e, 0xf, &(0x7f00000007c0)=@ringbuf={{0x18, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x19}}, {}, [], {{}, {0x5}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x4800, 0x2, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)={[{0x2d, 'perf_event'}, {0x2b, 'blkio'}, {0x2d, 'perf_event'}, {0x2d, 'net_cls'}]}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x2008}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='(())') sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000800)=ANY=[], 0x18}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8971, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1b, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xc, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x6, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x2}, @union={0x1, 0x6, 0x0, 0x5, 0x0, 0x8, [{0x4, 0x1, 0x6}, {0x9, 0x2, 0x2}, {0xf, 0x5, 0x7}, {0xa, 0x4, 0x8f}, {0x10, 0x1, 0x9}, {0xc, 0x4, 0x9495}]}, @enum={0x9, 0x7, 0x0, 0x6, 0x4, [{0x0, 0x6}, {0xb, 0xdbcd}, {0x3, 0x8}, {0x2, 0xb}, {0xd, 0x6}, {0x0, 0x5}, {0x7, 0x4}]}, @struct={0xf, 0x2, 0x0, 0x4, 0x1, 0x93a2, [{0x9, 0x2, 0x1}, {0xc, 0x3, 0x4}]}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x2}, @volatile={0xf, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x2e, 0x3e, 0x5f, 0x30]}}, &(0x7f0000000800)=""/127, 0xfe, 0x7f, 0x1, 0xfff}, 0x28) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x25, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}}, @exit, @call={0x85, 0x0, 0x0, 0x83}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x2, 0x0, 0x8, 0x1, 0xfffffffffffffff8, 0x8}, @ldst={0x3, 0x3, 0x3, 0xa, 0x1, 0xffffffffffffffe6, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1f}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x3d, 0xfa, &(0x7f0000000300)=""/250, 0x40e00, 0x0, '\x00', r3, 0x0, r4, 0x8, &(0x7f00000008c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xc, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r5], 0x0, 0x10, 0x6}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a80)={0x1b, 0x0, 0x0, 0x5, 0x0, r5, 0x5, '\x00', r3, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x50) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x2, '\x00', 0x0, r4, 0x2, 0x4}, 0x50) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000b80)=0x401, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x9, &(0x7f0000000bc0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe30}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000c40)='syzkaller\x00', 0x8292b13, 0x0, 0x0, 0x41000, 0x18, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000cc0)=[r0, r7, r1, r2, r7], &(0x7f0000000d00)=[{0x2, 0x5, 0x2}, {0x0, 0x1, 0xc, 0x4}, {0x2, 0x3, 0x6}, {0x3, 0x4, 0x7, 0x4}, {0x5, 0x5, 0xb, 0xb}, {0x0, 0x5, 0xd, 0x6}, {0x5, 0x1, 0x2, 0xb}, {0x0, 0x1, 0xe, 0x5b4becfd98f7c142}, {0x0, 0x5, 0xf, 0x4}, {0x2, 0x1, 0xf, 0xb}], 0x10, 0x7}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000fc0)={r1, &(0x7f0000000e80)="b0d30ae8ce5381148bbe919cfab25914ace7e675c3cf5712742972bc8f18baef78fa13be4eea9fd992d70ba78b", &(0x7f0000000ec0)=""/194}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x143442, 0x0) r9 = gettid() syz_open_procfs$namespace(r9, &(0x7f0000001040)='ns/time\x00') r10 = perf_event_open(&(0x7f0000001080)={0x5, 0x80, 0x47, 0x34, 0x57, 0xdc, 0x0, 0x7f, 0xc0820, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xca, 0x0, @perf_config_ext={0x800, 0x2}, 0x4, 0x2, 0x647, 0x9, 0x40, 0x4, 0x0, 0x0, 0x7, 0x0, 0x7}, r9, 0x0, 0xffffffffffffffff, 0x825e634bc40f770a) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000001100)='/dev/net/tun\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001240)={@map=r8, 0x20, 0x1, 0xcda, &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001180)=[0x0], &(0x7f00000011c0)=[0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)={@ifindex=r3, r6, 0x25, 0x4, 0x0, @void, @value=r6, @void, @void, r11}, 0x20) r12 = getpid() perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0xd, 0x5, 0x1, 0x8, 0x0, 0x0, 0x22800, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x4184, 0x10001}, 0x288, 0x1, 0x7ff, 0x0, 0x400, 0x7f, 0x5, 0x0, 0x1, 0x0, 0x100}, r12, 0x7, r10, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x0, 0x7, 0xfff, 0x20004, r7, 0x50000, '\x00', r3, r6, 0x5, 0x1, 0x0, 0x7}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=@bloom_filter={0x1e, 0x1ff, 0x100, 0x221, 0x600, 0xffffffffffffffff, 0x101, '\x00', 0x0, r4, 0x5, 0x2, 0x3, 0x1}, 0x50) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000001440), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x40082404, &(0x7f0000001480)=0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000015c0)={r13, 0x0, 0x36, 0x38, &(0x7f00000014c0)="8f8f50f59a8c35a4a485078a3ed00b690eb3ba881300bfec0f7408125c6030bab8107287f4496c938c918e3b2d7dd786bea6f681074c", &(0x7f0000001500)=""/56, 0x7d7, 0x0, 0x0, 0x8, &(0x7f0000001540), &(0x7f0000001580)="99530d1673ba7303", 0x0, 0x0, 0x3}, 0x50) ioctl$PERF_EVENT_IOC_REFRESH(r13, 0x2402, 0x8000000000) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3ff}, 0xc) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000001680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x7, [@ptr={0x8, 0x0, 0x0, 0x2, 0x2}, @var={0xc, 0x0, 0x0, 0xe, 0x5}, @volatile={0x6, 0x0, 0x0, 0x9, 0x5}, @fwd={0xd}, @enum64={0x6, 0x1, 0x0, 0x13, 0x0, 0x4, [{0x1, 0x6, 0xc0000}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}, @ptr={0xb, 0x0, 0x0, 0x2, 0x2}, @typedef={0x3, 0x0, 0x0, 0x8, 0x4}, @fwd={0xe}]}, {0x0, [0x6f, 0x0, 0x61, 0x0, 0x2e]}}, &(0x7f0000001740)=""/42, 0x9b, 0x2a, 0x1, 0x7, 0x10000, @value=r13}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x2, 0x6, 0xfffffff9, 0x6, r14, 0xa, '\x00', r3, r15, 0x1, 0x3, 0x3, 0x8}, 0x50) 1.743001311s ago: executing program 4 (id=4716): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x400, 0xf6104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x10, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x82}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x56, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000001c40)="beb61ec2ca90080239f2a54e2368fa761313c3a024a98109ba1e2e7b780d03c54b7a83d56fce397842e724674507d531762055fca371ea775f418df7bee236c9b9968146efb3232ae3413b617445e98bb644a892b9337f1a9135d9f30457a8ffb21aef4a95a155fab70a40b086056b0f63331a66b3457c", 0x2}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x34, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) close(0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9, r7}, 0xc) sendmsg$inet(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000"], 0x50) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x200, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0xd000, 0x10000, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x538a4b90}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000840)='GPL\x00', 0x3, 0xa4, &(0x7f0000000880)=""/164, 0x41000, 0x10, '\x00', r0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x5, 0x9, 0x104, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100000001, 0x7e}, 0xa140, 0xc8, 0x1000003, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r11, &(0x7f0000000040), 0x0}, 0x20) 1.512097169s ago: executing program 2 (id=4719): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x30}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x8e, &(0x7f0000000080)=""/142}, 0x82) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1a41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="9601"], 0x6e8a) 1.510756579s ago: executing program 4 (id=4720): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}, @func_proto, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000100)=""/223, 0x3e, 0xdf, 0x1}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, r0, 0x0, 0x1, 0x2000000}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000001c0)}, 0xfffffef3) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x6) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@o_path={&(0x7f00000004c0)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2}, &(0x7f0000000080), &(0x7f0000000540)=r6}, 0x20) 1.509331319s ago: executing program 4 (id=4721): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan1\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00', 0x2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x891d, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000002090000850000004300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x13bb711e) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'veth0_to_team\x00', 0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0xb, 0x80000001, 0xffff, 0x2000, r0, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x7fffffff, 0x20, r3, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x1, 0xa}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000000000000001ccc81cb0aef2e0246b4dbf0e802b78f3000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) 1.389051073s ago: executing program 2 (id=4722): r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2405, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000376123beee1dfd0000"], 0x48) close(r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xcc, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, r2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xffffffffffffff6a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0}}, 0x27) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r5, 0x4) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x6, 0x0, &(0x7f0000000040)="ded6e0966ec1", &(0x7f0000000380), 0x0, 0x3}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="130000000800000008"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000001080)='syzkaller\x00'}, 0x83) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002a00000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x17, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="fb58060005000000185000000d0000000000000000000000d08b20001000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000f00000085000000060000003900f0fff0ffffff85a810000800000018330000020000000000000000000000a5f2cdb2d0c0c8c2e9e47523103cc615ca153c77d5730afc6431fe"], &(0x7f0000000240)='GPL\x00', 0x1000, 0x91, &(0x7f0000000280)=""/145, 0x41000, 0x10, '\x00', r3, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0xc, 0x0, 0x4}, 0x10, r5, r2, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, r6, 0xffffffffffffffff], &(0x7f0000000900), 0x10, 0x4}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) 1.347576394s ago: executing program 0 (id=4723): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x12, 0x4, 0x4, 0x12}, 0x48) perf_event_open(&(0x7f0000000240)={0x2, 0x78, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x200040c4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff0e, 0x0, 0x0, 0xffffffffffffffff, 0x100}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000600), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x5, 0xc, &(0x7f00000002c0)=@framed={{}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ff}}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x40f00}, 0x94) 1.230876318s ago: executing program 0 (id=4724): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYRES16=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x420d08c01c1ac566}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x2e0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008001be0ffff00fe4000631177fbac141432e000031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000, 0x0, 0x50}, 0x1e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000380), 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r9) close(r9) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r10, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r11}, 0xc) close(r12) 1.032122125s ago: executing program 1 (id=4725): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1001a8, 0x0, 0x0, 0x4, 0x0, 0xffff0000, 0x9, 0x0, 0xffffbffe, 0x0, 0xfffffffffffffff1}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='ip6gre0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 1.024869476s ago: executing program 2 (id=4726): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004", @ANYRES16=0x0], 0x0, 0x26, 0x68, 0x0, 0xfffffffd}, 0x28) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000005fdb2971dfa2bff372df8cdbeb318ab2bec8fc36903c0ec359ca9daf3c914019395cc154010c693709800000000000000016a85adef34bf78c76e6222337923e1bea6ef682cc4375f594425d408ccc58187feb0e3d43347f989007a7c63f6dae682acb4af936461f34a8a32a50bbbb69ec85168947b86df9f2609bf93f7a1be259621818c3c75da30000bce645451b851111dd98ac4d8da9317c2c082020e0b2d6340809000000000000008e053645cc413790faf7e229c782845b5bb774f7f154263178151ea93ff2cac4b181332c9c9a1c7d85616c8100000000000000d8300d19d585000000fc005774b56a7142047326f940e95b8489e1c5650f5c61299a295f39c88456521cffdef93e29f10f4a11f0cfbfc0ff976b20fe"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 992.260386ms ago: executing program 0 (id=4727): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000dd5243eb2c9c729c120026dac5230cec9d71e10eab8a4184012590b7b320cf7467ed7591fd39", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) close(0x3) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003460200bfa30000000000001702000000feffff7a0a00fe14ffffff79a4f0ff00000000b7060000ff0800007e640200000000005502faff037202000404000001007d60a6040000001000006a0a58fe39000f00850000005b000000bc600000000000009500000000000000a81bbfa32d51a7d0679fd43041097666ab982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c4580034fb000000e3a94bd24d2eb3860d808922433e3e0f242a46b3009a54f4077db0d4968a384b0559c7919b893d3b72cd6c832e986440ff0a7e8620cb231ccd00000000000000000000007777e2704653f620b2272c3c7fea60491073847c4b7bbaed91f33fb382d91ae8e18c9b6c9f0322ec5f1c7cc5869ff455896712198c4e2ddf8b86e714229527ca40b24cfd6a1f00e891728807982d90e116bba29bb70900000000000000c63ad2e7402f9cb424ac416e66af9ebbfea905d37cf226312cb81ec8439cea06e7fa5e5b3596301460142f83b464d9e57dfdb06dcf9101000100130033d649d2110cf2e1f4682c24a314447c5e0807f0b1766ebdecbd061772daa52a38539295d3fea7a7e669441e1ff04114dfa904fb43897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd3339d32a5796cbe8925efd0c81af69a3e97588878d7ce18b68bc37e061d33357d6a39d33c702576cc2a8891663e3776c7a37c5c962e12102f237bbf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d432e968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a90000000000a2a283801ff218538cb12c72b56ffb6b7a062581ec749f5700000000009f1f5ab2e02739ccd50523d3360300005cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ffb0e97628a88a5e37032f1e8f6c893e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2816e301fc8a24dba6fca8b270d44fe65e7bd90a5fc16387bcb5e3df18d7d2a33c72cfda827b8926a6dc6bc19ce398cb8fe48b11b7f93e6fdfb040283c9627bd40909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9598eb067b21111dbaa58b19a52f3f12880128d08eb477ad349ca214bc7f80000000000ffb52da89cff41552996e20a585c7d265bd749eeba040fa7111c84142757709d7c475fac2839beb833327db41c6b647c7ee9ad419a6c68dd5c2ce4fa23c280518fc6e54d1b055cae5492e8c4cdd314a49631a15de2bffc920dd74e670794acec7a9da17d809bf956f1af51cf3c0711792d3071dfdaec3c66053cdb00028f6fba8da8f53de39a5999e56fc26ae866674627c8a53d3fd245050060ed40782d1d98bf1e1f5dfd4d1fb399624c12732e300818b222ce029ce01055f941721226e3e5f05d2837240f8f6831b6ef2a02ec64aae1eea9cfac06d8b7042e8ebdc6cb0d4a140e1e631d06afc99d397c5b67b290344e347c953806b298f288884335f624378b3748a4a86bbd0a62127b2c28ce3737661b98bd45965b537ece7bd4e365ffd5567df4d02034c8d488a49c6fb1a0a02eaab2f271d3a14e44211e4ff602d146f72355972860bdd14719d65301964d022819b75696ce47534c9d989d69a445095ff8fbebd2c84635acc333f2aca4623cfe9f9e6c3f9fbb4374c08e1be5eec12c329a87d335fd7a52a4e4e7c2e57fa2f0df9500347b300f84230783cb665f3fa44f5d6fa987aa93c2619ef4977f9e4d38adec323778f3bc987533ffd85fe5417398a3001b394fccbd2faee83b5e2b8a2dd18cf067b619a82c4706531b3ef336a84e825c63b9bc7b98b4ad6a471692224adef86f4c9930169dfa133e22929d5a27e10bfbcfe7c02ca451afd74d26f489e0e09cf1b596ae0c959cf26cb0c8114a9311b7f2fe2ad977074ff5f62f6777a20700414ed03ba3d7404eadd43a62ad1173491a5c099290393e1f85aeb3886fbb7f6646212054a850d58a71c6d6027cd3a5ff22e98672349f9bddb23622e2f19b39e51ced84524567ec1fcb233a2fb85371e9b08b6fd4adcd4db148ed26757123a0e604bcf6ffdcc303956e1805f1746361bd3eeb55d3fefe6ac274c2e6c78963430118942d62a465698e600dadd81a53ffd29358746e8db2499e3fca62b0ff660b0aaeedadeb194a9217e9fed2ce04cc24451871d5bcd76173ab7123cc27eef33dbb4d3c3bf1fc2df68a98345c15667388c5000000000000000000000015000000c0459f900702908d4979288d06c7159ef2663dc7ea9302b10bf2da21e3990ddf20a38adc1fd15124310daf2461224cfbfd5e6265d012d60fc9e39209ce3209720f8d7bf39bf71d0d46ed6d51eede797da70cf0b7463cffc80a7a56eeb25ed0adfb146a3221c20d51f172cf2eefe1e6b28cffc1e40a789d5513626f5c4fbf65a2b5a093634b806b7ee570f70f624ce8c02d4c1ec7a9370f42a807f1d46fe77be0637a8007343b7771788f64b36cab94a99243bc780702f98f34a80f81aeb853f97c3e9586805d1a240d7e870b15defbc6b21fdc98a79759c9b8375313deea0000000009e38e9539d6b9507b6f3f8d29992d080a13aed8879a1f2cf352fb5a376427f89d432f7fe7c0cad2ce38427fc773cef47e00000000000000000000000000000000000d09b8ee6321377ffcb6cc386f8704ae9ce6c11b4bb91d0097ef2b77e0cd28af1222e68c2745eca64fa40db07f6e5925224069d14395f7170ab9c2d396f7510f65ce5b0405d8951a70a37117d13c5b2f684c52bff2dc895f5e06e497adee9de0012dd140c592137c90319f8a578007b57aaba3fb93d29a6584313e5b58f8a71cebf77a0891f3633dba69588ec728e785e6e4431fce5a143451c7a51c22b1b605347db811eb9a461f4ef2612181aa8cafc33a2047b7ba57a5"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x10}, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x7, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0xeaf}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0afeff00000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) 897.23738ms ago: executing program 0 (id=4728): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x17, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a655, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe85, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x14}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 896.66402ms ago: executing program 2 (id=4729): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@cgroup, r0, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x19, &(0x7f00000002c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5b}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x14, 0x4, 0x8, 0x8001, 0x4}, 0x50) (async, rerun: 64) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r4], &(0x7f00000003c0)=""/162, 0x3e, 0xa2, 0x1, 0x4}, 0x28) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (async, rerun: 64) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1a9) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r2, r1}, 0xc) 895.0744ms ago: executing program 4 (id=4730): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x108000, 0xffffffffffffffff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg(r4, &(0x7f00000004c0)={&(0x7f0000000140)=@ll={0x11, 0xf6, r5, 0x1, 0xff, 0x6, @random="8bee61618eba"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="e9a90a2d929dfebc0fd3c3a52b400ed0afa1e07d2579e888179c365ccecfdb34356174c7d6c99b0f8eb7b2", 0x2b}, {&(0x7f0000000380)="5bfc599c8ea20b33dbfdf84625940b95fccea21f326cf3fab8710fa10eac3d4852323b2667a271797990b387c076c38587925689853f24fff5ff891cef57d2c7259957399961dcab5e9848a55fe876f4fb0caf36634ff3afc26950900ef5e481ace37528da0e73a53840bf76ce65c6cb081f32ea43c9faa7e72f1438b183c71b02d40fca27f6a3", 0x87}, {&(0x7f0000000440)="da", 0x1}], 0x3}, 0x20000088) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) sendmsg$sock(r4, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000680)="6479b2abdfde8c0f43c658ae6d7cf88bb3721e148c6f9db7a2f714e8962a1f4db5caeadb1e25be347413878556051cc15e68ba54f82115867ce06e15dbb636ee1a72832136d3f217fe4ccffe9c796dd01cff95f4d591a6e258c50870de6496b51f3e9e0d0e71995d0196e918ca6555c44cebe54382fddcf4c27b73462edbd4fc32a70b953ef6c34e86acb1542c0d0480d862b404eaf5d92471dc39c3e3d9e0f83b46a0182c5fdecc397e1c7587d3bb26d4a1e8d62167f98aa4a42a3fbd26026e", 0xc0}, {&(0x7f0000000840)="89094b05add25dc9682e1bb630c3da899f004a30ea3576b42d8b096de627cdafaa972215f2efd96eea9040a4b05938296175f52bdabd13b094692586e8a75eea2d865c6f276b2583e82e9bbeb678161663333bdae6acd16964e14879f1d2d80729a9893e40d6d46408e24f9b2fefc37627247158f95bdcb5f9ffcf96d0481edf7ed980b36b0f021f9315d0b6bf0a09ca56e85b6c495098adacaafa11b5757be80ce9d19d5518bb14fb1fa0cee6462d34838fbb540f86dba45cbe02a5153a1b50ab0f8b1c0fdf05446dee150be835e32ad3b041cbd318aea35569530fde0e8770a1f55d6d6c137e763feb023d7b", 0xed}, {&(0x7f0000000940)="a3de8fc6cbb0c8cc17740a134c", 0xd}, {&(0x7f0000000980)="a3e6d6b9aef9eb7e3cfa172dc9fb1b86b3424b", 0x13}, {&(0x7f00000009c0)="2e98355cdbbba800580c591797e5dcf0c165158f1ac39d7b27b074aa8d49c05e0a24a5ec1d094b7e54a5ce88acc9c29e1135a14857f9bdb5b893f1afa427b3f3a663f452ae", 0x45}], 0x5, &(0x7f0000001440)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xd7}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x520}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xd8}, 0x40005) 894.56854ms ago: executing program 2 (id=4731): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f00000001c0)=r2, 0x11) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8, 0x5, 0x7, 0xc1}, 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0), 0x0, 0x6, r5}, 0x38) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="0100002010fd"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711809000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x16}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) (async) gettid() (async) write$cgroup_pid(r1, &(0x7f00000001c0)=r2, 0x11) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8, 0x5, 0x7, 0xc1}, 0x50) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0), 0x0, 0x6, r5}, 0x38) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="0100002010fd"}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711809000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x16}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) 889.74933ms ago: executing program 1 (id=4732): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@fallback=0xffffffffffffffff, 0x0, 0x1, 0x40, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@fallback, r0, 0x36, 0x34, 0xffffffffffffffff, @void, @void, @void, @value=r3, r2}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pS \x00'}, 0x20) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x17, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@generic={0x9, 0xf, 0x3, 0x9, 0xa}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @jmp={0x5, 0x0, 0xb, 0x8, 0xc, 0x20, 0x10}, @generic={0x7, 0x2, 0x7, 0x6, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0x1b, &(0x7f00000003c0)=""/27, 0x40f00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x2eeffa0, 0x40}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000540)=[r1, r1, r1, r1, r1, r1, r1, r1, r5], &(0x7f0000000580)=[{0x1, 0x1, 0xa, 0x8}, {0x5, 0x4, 0x2, 0x1}, {0x4, 0x1, 0x8, 0x7}, {0x2, 0x3, 0xb, 0x8}, {0x4, 0x3, 0xd, 0x2}, {0x1, 0x5, 0x7, 0x1}, {0x1, 0x5, 0x8, 0xa}, {0x1, 0x5, 0x8}, {0x3, 0x4, 0x0, 0x3}], 0x10, 0x3}, 0x94) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, r4, 0x0, '\x00', 0x0, r1, 0x0, 0x2, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000880)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@bloom_filter={0x1e, 0x8ed9, 0x4, 0x27f, 0x128, r7, 0x1, '\x00', r8, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x2}, 0x50) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80000000, '\x00', 0x0, r9, 0x5, 0x2, 0x4}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000c00)=@generic={&(0x7f0000000b40)='./file0\x00', r10}, 0x18) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000c40)) syz_clone(0xb4918bc087eecdaf, &(0x7f0000000c80)="d0700402c9ed53afe3ba7c7a065f5b36ef5880719dedddc85740526304609ebd795a717810ec0db9aa18bf3ef39c9e7f04ec9ce971ec0adbd2bf469d567d2ad75800acb9433055ee5e749d1a4e181b92fe1175d31a857c597793ca4b1513530024536561d7cb812cb0de3c4b3b159174d773183c4db913624e74696b84e83dc02c208d927659cf1a73918e087a7070243c5a72880ee5ba88c6eb4ad91c24a21ddfcad80ea7eff23c2bb23a1a808f6ebc0b659415d07b5256d269366d", 0xbc, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="e3c6b924b13f0f8f7c192d1581a33a46c31d511167e9b687642b3a8e9b9ee91e8ee733326a75b19fbeeb217bbfd814ed9b905a02ef454fffb3e1d132217a4c60fdeebbf119c05a0dfd071b27a1ee38d2893802da9b84a577ea695af37c89d90d51a25cc01a1b13eaeb660636d53ba02ac888203c409bf7ecca379adf8572bbf3e50c0f2e225eb44a8ae2b65030c1") syz_clone(0x500300, &(0x7f0000000e80)="6107e33327be62f9dadf4816a76e5d99505199b6f303ecb89ad1d3a33c74a1cae831c33ca714280ac9360ec1175ab063cd68d854c937f5a9842826d2125a19e5f07556368592537e0f7ac43a51342c31fceec6e57da13930148b3821a8a7b03a2e1673", 0x63, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="0ee63475204709270bb303b40b939af971472aa9ccac903486d0e72f01676deb5d4e720ae4961d9b271ccfbd27fa") (async) r11 = getpid() perf_event_open(&(0x7f0000000fc0)={0x0, 0x80, 0x35, 0x2, 0x0, 0x81, 0x0, 0x2, 0x2804, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x100000001, 0x9}, 0x88, 0x7, 0x7, 0x3, 0x3, 0x1549, 0xc40, 0x0, 0x1, 0x0, 0x3a1}, r11, 0xe, 0xffffffffffffffff, 0xf) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001140)={@cgroup=r1, 0x2e, 0x0, 0x401, &(0x7f0000001040)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001080)=[0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001180)={@fallback=r6, r0, 0x0, 0x1c, r0, @void, @value=r1, @void, @void, r13}, 0x20) (async) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000011c0)='./cgroup/syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f0000001200)='memory.events\x00', 0x0, 0x0) openat$cgroup_pressure(r10, &(0x7f0000001240)='io.pressure\x00', 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(r12, &(0x7f0000001280), 0x2, 0x0) (async) write$cgroup_subtree(r15, &(0x7f00000012c0)={[{0x2d, 'cpuset'}, {0x2b, 'io'}, {0x2b, 'net'}, {0x2b, 'pids'}, {0x2d, 'io'}, {0x2b, 'net_prio'}, {0x2d, 'memory'}, {0x2b, 'rlimit'}, {0x2b, 'pids'}]}, 0x3b) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000014c0)={r15, 0x20, &(0x7f0000001480)={&(0x7f0000001300)=""/218, 0xda, 0x0, &(0x7f0000001400)=""/123, 0x7b}}, 0x10) (async) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xf, 0x202, r4, 0x6ff, '\x00', 0x0, r15, 0x4, 0x5, 0x5, 0x9}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001580)={0x2, 0x4, 0x8, 0x1, 0x80, r16, 0x7dc7a2c4, '\x00', r8, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r5, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9c, &(0x7f00000027c0)=[{}], 0x8, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0x14, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002a00)={r15}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002b40)=@bpf_lsm={0x1d, 0xb, &(0x7f0000001600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff}, [@tail_call, @map_fd={0x18, 0x4, 0x1, 0x0, r15}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000001680)='GPL\x00', 0x5, 0x1000, &(0x7f00000016c0)=""/4096, 0x41100, 0x3c, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000026c0)={0x4, 0x5, 0xe, 0x1}, 0x10, r17, 0x0, 0x6, &(0x7f0000002a80)=[r18, 0xffffffffffffffff, r4, r10], &(0x7f0000002ac0)=[{0x2, 0x1, 0x5, 0x6}, {0x0, 0x5, 0xc, 0x4}, {0x3, 0x5, 0xe}, {0x0, 0x3, 0xd, 0x5}, {0x1, 0x2, 0x4}, {0x0, 0x3, 0x5, 0x6}], 0x10, 0x3b}, 0x94) 777.240993ms ago: executing program 2 (id=4733): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88502, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0xc11, 0x2000000, 0x0, 0x9, 0x0, 0x5, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 668.707897ms ago: executing program 1 (id=4734): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71ef2685634a8270e7123c00000000000000000001000000ac1414cf14"], 0xffdd) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/1810], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x35}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="3823f3a448e2f9fb057a4e99f9eecc76134f88bd83f57cedfe2cf1f8424163f983be3c051dc73bc761b875a40aba8ac8f31a4def11a8d7cdcb858d9b9b923e4078a1c79e3c2aa5abc59d76e16c866a03cca2d7b28b7f1265816c651b12c019ae0af7292bd6309274c0f87cc28350cbea9ef26a5afb9164b61a0a136d47780937afe2", 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[], 0x9) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x63, 0xa, 0xff00}, [@call={0x55}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x8, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) mkdir(&(0x7f00000009c0)='./file0\x00', 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x6, 0x9, 0x8, 0x40}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={&(0x7f0000000280)="69e6a6045f", 0x0, 0x0, 0x0, 0x5, r8}, 0x38) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0xc8, 0x6, 0x7}]}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001000)={'veth1_virt_wifi\x00', 0x200}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) 634.403679ms ago: executing program 5 (id=4735): bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da5f", @ANYRES16], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000001480)=[0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000001500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001540), &(0x7f0000001580), 0x8, 0xae, 0x8, 0x8, &(0x7f00000015c0)}}, 0x10) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0xd, &(0x7f0000000000)=@raw=[@exit, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff6b42}}, @call={0x85, 0x0, 0x0, 0x6b}, @exit, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000440)=""/4096, 0x40f00, 0x46, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000001740)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001780)={0x3, 0xe, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000017c0)=[{0x0, 0x1, 0x6, 0x5}, {0x1, 0x4}, {0x4, 0x3, 0x4, 0xc}], 0x10, 0xfffffe01}, 0x94) 613.442259ms ago: executing program 4 (id=4736): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x21}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000800)="0000000000000000606b53cc7273", 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003800)=@base={0x6, 0x4, 0x4, 0x9, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r3}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000ffffffd4123300000000009500000000000000554b8b955e7a1748b529a72befafa3a996f854539ebc1e97df1d6a912a2c7bd03fb87b1a8613493ca111f9d7ab1e54dd7802a1c5cd187516f81a40f6a065f4a9c112426ce8e56170e37543bf9450fc8315ef180556c07170c2a7ce1745d85c74db850deb31b6c863e31a2460"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 520.175242ms ago: executing program 5 (id=4737): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x9, 0x1, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0, 0x42}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 388.997996ms ago: executing program 0 (id=4738): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2a}]}, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000f85702255bda98c611c3046f4bd0889676f1ff35a8bab09fb4fa8f86b57b021b6b88bcf0772091f825ce37e2bd02c2fc51ae5b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000040), 0x4) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 344.558288ms ago: executing program 5 (id=4739): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0xe}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x6, 0x80, 0x0, 0x0, 0x40, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec850000000200000085000000080000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r3}, 0x94) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000ffffffd4123300000000009500000000000000554b8b955e7a1748b529a72befafa3a996f854539ebc1e97df1d6a912a2c7bd03fb87b1a8613493ca111f9d7ab1e54dd7802a1c5cd187516f81a40f6a065f4a9c112426ce8e56170e37543bf9450fc8315ef180556c07170c2a7ce1745d85c74db850deb31b6c863e31a2460"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r5, 0x400454d9, 0x0) write$cgroup_int(r5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 0s ago: executing program 1 (id=4740): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xa, 0x13, 0x20, 0xbc, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4d}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x70) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001340)={&(0x7f0000000100)="c08eb19808d2e44024d5afbcfb87d6d183a36b7f0565369d029883c2a5f760c2483e47894cf551283689add2d3372b7c26f8cb8186c624b0c27d7c675fca0783aa18f843a5b2910f513449e6cfe371d98607c63520fde06357f63bfea15f6fbebc4826ad1b585cc429b83769c12387cfe6", &(0x7f0000000180)=""/69, &(0x7f0000001200)="69b6e1dd99abd750f48b36580a1cb49c2ec49f65f0996705e7158ace9a0c4301d6fcb216cde2bc618a841524e3836e56040843b4dd00ae435e6c0e4d73bb59cfbf127a914166dd1983b1ffa6e8dd33a4d807e5a22a6f41980d6f9c53fe", &(0x7f0000001280)="720d30d02c310c200330deac2c55750e8703ca1795f1937ffd164bad5d4506643281cd4cbc9f3bdf1d7ba06fedd7275f80b7096b8ef64e8e68ee2d5a977d762e9418734ddf8a63e60e4ef838b2dfd14350a6c60e6aba5278f96b4fb2379a249c861d076a5fd4d3030dd09ec1b81646ff2ddca1086237b563a7af5e049fa11f3126d0359fae51da026d586b0957f0cebcb1a2d2b9046e3d141869f9a7e1e8b932cfb1519262b9984e", 0x2e1, r0}, 0x38) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f00000003c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit], &(0x7f0000000480)='syzkaller\x00', 0x1, 0xe0, &(0x7f00000004c0)=""/224}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19e9b5381791cbf0ceb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c008fc6da4fb2e98e5083aa3c0ad0d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r2, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000633277fbac141411e0000601be3e7d2a", 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. [ 20.512980][ T24] audit: type=1400 audit(1775161633.619:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.513952][ T267] cgroup: Unknown subsys name 'net' [ 20.535638][ T24] audit: type=1400 audit(1775161633.619:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.562870][ T24] audit: type=1400 audit(1775161633.649:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.563072][ T267] cgroup: Unknown subsys name 'devices' [ 20.790799][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.796373][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.933003][ T24] audit: type=1400 audit(1775161634.039:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.956589][ T24] audit: type=1400 audit(1775161634.039:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.981283][ T24] audit: type=1400 audit(1775161634.039:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.987069][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.013167][ T24] audit: type=1400 audit(1775161634.119:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.038544][ T24] audit: type=1400 audit(1775161634.119:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.072710][ T24] audit: type=1400 audit(1775161634.179:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.098182][ T24] audit: type=1400 audit(1775161634.179:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.098212][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.457190][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.476791][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.484339][ T275] device bridge_slave_0 entered promiscuous mode [ 21.520402][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.527433][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.534862][ T275] device bridge_slave_1 entered promiscuous mode [ 21.606519][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.613638][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.621080][ T280] device bridge_slave_0 entered promiscuous mode [ 21.628957][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.636102][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.643397][ T280] device bridge_slave_1 entered promiscuous mode [ 21.688994][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.696062][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.703475][ T279] device bridge_slave_0 entered promiscuous mode [ 21.712565][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.719611][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.726921][ T279] device bridge_slave_1 entered promiscuous mode [ 21.765155][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.772282][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.779670][ T282] device bridge_slave_0 entered promiscuous mode [ 21.788864][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.795917][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.803167][ T281] device bridge_slave_0 entered promiscuous mode [ 21.809954][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.816997][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.824327][ T281] device bridge_slave_1 entered promiscuous mode [ 21.840382][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.847403][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.854703][ T282] device bridge_slave_1 entered promiscuous mode [ 21.895698][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.902749][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.910041][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.917039][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.961990][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.969023][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.976282][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.983295][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.031496][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.038531][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.045780][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.052791][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.073737][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.080992][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.088168][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.095336][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.102602][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.110207][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.118035][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.125473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.151007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.158596][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.166664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.174960][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.181994][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.189972][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.198036][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.205056][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.212404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.220583][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.227575][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.234865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.242943][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.249955][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.282263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.290337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.298143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.306085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.314293][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.321309][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.329129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.337328][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.344340][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.351671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.359774][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.366764][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.374108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.381990][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.389947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.413128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.421249][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.428239][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.435668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.443680][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.451829][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.458820][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.466230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.474628][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.481670][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.488931][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.496840][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.504731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.512716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.520699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.529177][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.544801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.553206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.561268][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.570147][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.578305][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.586391][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.604131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.612556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.621057][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.628794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.637017][ T280] device veth0_vlan entered promiscuous mode [ 22.647830][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.655471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.662896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.671376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.679721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.687461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.696036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.703412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.712281][ T281] device veth0_vlan entered promiscuous mode [ 22.719366][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.727306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.735825][ T282] device veth0_vlan entered promiscuous mode [ 22.743482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.750862][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.760774][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.768599][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.778910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.786419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.793892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.802171][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.814686][ T281] device veth1_macvtap entered promiscuous mode [ 22.821419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.829745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.837731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.845470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.853605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.863547][ T275] device veth0_vlan entered promiscuous mode [ 22.870582][ T282] device veth1_macvtap entered promiscuous mode [ 22.880121][ T280] device veth1_macvtap entered promiscuous mode [ 22.886735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.894509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.902486][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.910832][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.918994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.927444][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.938242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.946517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.960380][ T279] device veth0_vlan entered promiscuous mode [ 22.970767][ T275] device veth1_macvtap entered promiscuous mode [ 22.981579][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.989169][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.997620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.006483][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.014975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.023430][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.031253][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.039089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.047314][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.055605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.063859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.072233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.079924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.098711][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 23.103686][ T279] device veth1_macvtap entered promiscuous mode [ 23.115017][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.124464][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.132846][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.141240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.149738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.157813][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.166173][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.174378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.182581][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.197494][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.205752][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.214042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.222543][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.231233][ T282] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.369287][ C0] hrtimer: interrupt took 20430 ns [ 23.649376][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.656570][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.629539][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 26.629549][ T24] audit: type=1400 audit(1775161639.739:114): avc: denied { ioctl } for pid=362 comm="syz.3.15" path="socket:[15542]" dev="sockfs" ino=15542 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.011411][ T24] audit: type=1400 audit(1775161640.119:115): avc: denied { relabelfrom } for pid=367 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.071371][ T24] audit: type=1400 audit(1775161640.119:116): avc: denied { relabelto } for pid=367 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.217401][ T24] audit: type=1400 audit(1775161640.299:117): avc: denied { create } for pid=388 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.254541][ T397] cgroup: syz.1.22 (397) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.360327][ T24] audit: type=1400 audit(1775161640.359:118): avc: denied { create } for pid=396 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 27.449347][ T397] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 27.849271][ T24] audit: type=1400 audit(1775161640.949:119): avc: denied { read } for pid=413 comm="syz.3.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.012502][ T24] audit: type=1400 audit(1775161641.099:120): avc: denied { create } for pid=416 comm="syz.4.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.213826][ T420] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 29.346656][ T24] audit: type=1400 audit(1775161642.449:121): avc: denied { create } for pid=455 comm="syz.3.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 30.129885][ T504] ------------[ cut here ]------------ [ 30.199864][ T504] trace type BPF program uses run-time allocation [ 30.230760][ T504] WARNING: CPU: 0 PID: 504 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 30.241912][ T504] Modules linked in: [ 30.249510][ T504] CPU: 0 PID: 504 Comm: syz.4.52 Not tainted syzkaller #0 [ 30.256670][ T504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 30.280815][ T504] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 30.320101][ T512] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.370377][ T504] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 30.489815][ T504] RSP: 0018:ffffc90001237448 EFLAGS: 00010246 [ 30.686397][ T24] audit: type=1400 audit(1775161643.779:122): avc: denied { ioctl } for pid=525 comm="syz.0.56" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.709313][ T504] RAX: ecf2805d4a0dc600 RBX: 0000000000000001 RCX: 0000000000080000 [ 30.737345][ T504] RDX: ffffc90004d68000 RSI: 0000000000002e28 RDI: 0000000000002e29 [ 30.745498][ T504] RBP: ffffc90001237490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 30.754001][ T504] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888115170000 [ 30.769346][ T504] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88813276b000 [ 30.787467][ T504] FS: 00007fcb2d6b96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 30.800173][ T504] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.806756][ T504] CR2: 00007f837b8fcdac CR3: 0000000132313000 CR4: 00000000003506a0 [ 30.839328][ T504] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.857461][ T504] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 30.877629][ T504] Call Trace: [ 30.889335][ T504] ? __fdget+0x1a1/0x230 [ 30.893615][ T504] resolve_pseudo_ldimm64+0x55e/0x1060 [ 30.913913][ T504] ? bpf_check+0xdb10/0xdb10 [ 30.945318][ T504] ? kvmalloc_node+0x88/0x130 [ 30.950103][ T504] bpf_check+0x9058/0xdb10 [ 30.954518][ T504] ? bpf_get_btf_vmlinux+0x60/0x60 [ 30.959757][ T504] ? 0xffffffffa0028024 [ 30.963942][ T504] ? is_bpf_text_address+0x177/0x190 [ 30.969214][ T504] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.974739][ T504] ? __kernel_text_address+0xa0/0x100 [ 30.980115][ T504] ? unwind_get_return_address+0x4d/0x90 [ 30.985780][ T504] ? stack_trace_save+0xf0/0xf0 [ 30.990848][ T504] ? arch_stack_walk+0xee/0x140 [ 30.995885][ T504] ? stack_trace_save+0xa6/0xf0 [ 31.000964][ T504] ? stack_trace_snprint+0xf0/0xf0 [ 31.006115][ T504] ? __kasan_slab_alloc+0x69/0xf0 [ 31.026202][ T504] ? pcpu_block_update+0x3ec/0x900 [ 31.034861][ T504] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.072588][ T504] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.078075][ T504] ? __kasan_kmalloc+0xec/0x110 [ 31.089437][ T504] ? __kasan_kmalloc+0xda/0x110 [ 31.112602][ T504] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 31.118165][ T504] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.199342][ T504] ? security_bpf_prog_alloc+0x62/0x90 [ 31.204840][ T504] ? bpf_prog_load+0x9d8/0x14a0 [ 31.219341][ T504] ? __se_sys_bpf+0x49a/0x740 [ 31.224048][ T504] ? __x64_sys_bpf+0x7b/0x90 [ 31.228630][ T504] ? do_syscall_64+0x31/0x40 [ 31.279629][ T504] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.309415][ T504] ? memset+0x35/0x40 [ 31.336872][ T504] ? bpf_obj_name_cpy+0x193/0x1e0 [ 31.362207][ T504] bpf_prog_load+0xfca/0x14a0 [ 31.387578][ T504] ? map_freeze+0x320/0x320 [ 31.417800][ T504] ? selinux_bpf+0xc7/0xf0 [ 31.458961][ T504] ? security_bpf+0x82/0xa0 [ 31.491805][ T504] __se_sys_bpf+0x49a/0x740 [ 31.560373][ T504] ? __x64_sys_bpf+0x90/0x90 [ 31.599756][ T504] ? asm_sysvec_reschedule_ipi+0xa/0x20 [ 31.729402][ T504] ? __kasan_check_read+0x11/0x20 [ 31.734465][ T504] ? asm_sysvec_reschedule_ipi+0xa/0x20 [ 31.816932][ T504] __x64_sys_bpf+0x7b/0x90 [ 31.919335][ T504] do_syscall_64+0x31/0x40 [ 31.929500][ T504] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.031237][ T504] RIP: 0033:0x7fcb2ec7f819 [ 32.035789][ T504] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.199086][ T504] RSP: 002b:00007fcb2d6b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.260327][ T504] RAX: ffffffffffffffda RBX: 00007fcb2eef9090 RCX: 00007fcb2ec7f819 [ 32.289345][ T504] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 32.349446][ T24] audit: type=1400 audit(1775161645.459:123): avc: denied { create } for pid=544 comm="syz.3.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.443471][ T504] RBP: 00007fcb2ed15c91 R08: 0000000000000000 R09: 0000000000000000 [ 32.579455][ T504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.619370][ T504] R13: 00007fcb2eef9128 R14: 00007fcb2eef9090 R15: 00007ffef0168508 [ 32.707327][ T504] ---[ end trace 3f4f70f73ed53ff2 ]--- [ 33.770762][ T24] audit: type=1400 audit(1775161646.879:124): avc: denied { ioctl } for pid=620 comm="syz.1.84" path="pid:[4026532281]" dev="nsfs" ino=4026532281 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 33.864841][ T624] device syzkaller0 entered promiscuous mode [ 33.895136][ T617] device syzkaller0 entered promiscuous mode [ 34.069134][ T24] audit: type=1400 audit(1775161647.169:125): avc: denied { create } for pid=650 comm="syz.3.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.456452][ T694] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.463650][ T694] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.559988][ T699] device syzkaller0 entered promiscuous mode [ 34.754846][ T24] audit: type=1400 audit(1775161647.859:126): avc: denied { create } for pid=710 comm="syz.4.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 34.809472][ T24] audit: type=1400 audit(1775161647.909:127): avc: denied { create } for pid=720 comm="syz.3.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 34.897089][ T24] audit: type=1400 audit(1775161647.999:128): avc: denied { create } for pid=714 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.954768][ T729] device syzkaller0 entered promiscuous mode [ 35.085007][ T736] device syzkaller0 entered promiscuous mode [ 35.572875][ T24] audit: type=1400 audit(1775161648.679:129): avc: denied { create } for pid=762 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 35.612842][ T759] device syzkaller0 entered promiscuous mode [ 36.718753][ T24] audit: type=1400 audit(1775161649.819:130): avc: denied { create } for pid=827 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 36.924250][ T848] device syzkaller0 entered promiscuous mode [ 36.952504][ T853] device syzkaller0 entered promiscuous mode [ 37.090922][ T857] device syzkaller0 entered promiscuous mode [ 37.459186][ T878] device syzkaller0 entered promiscuous mode [ 37.874237][ T900] batadv0: tun_chr_ioctl cmd 2148553947 [ 38.039937][ T907] device syzkaller0 entered promiscuous mode [ 38.403822][ T24] audit: type=1400 audit(1775161651.509:131): avc: denied { create } for pid=931 comm="syz.4.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 38.627792][ T275] cgroup: fork rejected by pids controller in /syz1 [ 38.644307][ T948] device syzkaller0 entered promiscuous mode [ 38.940573][ T24] audit: type=1400 audit(1775161652.049:132): avc: denied { create } for pid=965 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 39.127498][ T974] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.134628][ T974] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.142085][ T974] device bridge_slave_0 entered promiscuous mode [ 39.153902][ T974] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.161105][ T974] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.168449][ T974] device bridge_slave_1 entered promiscuous mode [ 39.608707][ T24] audit: type=1400 audit(1775161652.709:133): avc: denied { create } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.629175][ T24] audit: type=1400 audit(1775161652.709:134): avc: denied { write } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.649953][ T24] audit: type=1400 audit(1775161652.709:135): avc: denied { read } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.702637][ T974] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.709711][ T974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.716957][ T974] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.723993][ T974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.800492][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.817810][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.934378][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.942002][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.047563][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.072477][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.086713][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.093767][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.128857][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.145673][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.154357][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.161392][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.180636][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.188733][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.216535][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.226754][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.254864][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.264266][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.282740][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.292041][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.305774][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.313380][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.323386][ T974] device veth0_vlan entered promiscuous mode [ 40.334841][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.343619][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.360351][ T974] device veth1_macvtap entered promiscuous mode [ 40.400646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.414833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.431207][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.456473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.471357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.922242][ T296] device bridge_slave_1 left promiscuous mode [ 40.978395][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.029945][ T296] device bridge_slave_0 left promiscuous mode [ 41.036108][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.044287][ T296] device veth1_macvtap left promiscuous mode [ 41.180032][ T1092] device syzkaller0 entered promiscuous mode [ 41.524322][ T1113] device sit0 entered promiscuous mode [ 42.617984][ T1159] device syzkaller0 entered promiscuous mode [ 42.800967][ T24] audit: type=1400 audit(1775161655.899:136): avc: denied { create } for pid=1161 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 43.057894][ T24] audit: type=1400 audit(1775161656.159:137): avc: denied { create } for pid=1211 comm="syz.1.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 44.449689][ T1280] tap0: tun_chr_ioctl cmd 1074025692 [ 45.457866][ T1326] geneve0: tun_chr_ioctl cmd 1074025677 [ 45.490791][ T1326] geneve0: linktype set to 1 [ 45.900371][ T24] audit: type=1400 audit(1775161659.009:138): avc: denied { create } for pid=1343 comm="syz.4.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 46.207832][ T1369] device syzkaller0 entered promiscuous mode [ 47.146658][ T1403] device syzkaller0 entered promiscuous mode [ 47.504275][ T1430] 6±ÿ: renamed from team_slave_1 [ 48.862848][ T1498] device wg2 entered promiscuous mode [ 49.536097][ T1520] device syzkaller0 entered promiscuous mode [ 50.664593][ T1568] device vlan0 entered promiscuous mode [ 51.546021][ T1604] device syzkaller0 entered promiscuous mode [ 51.952384][ T24] audit: type=1400 audit(1775161665.059:139): avc: denied { create } for pid=1638 comm="syz.2.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 52.022340][ T1660] device syzkaller0 left promiscuous mode [ 52.034646][ T24] audit: type=1400 audit(1775161665.139:140): avc: denied { create } for pid=1655 comm="syz.3.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 52.056766][ T1664] device pim6reg1 entered promiscuous mode [ 52.596067][ T1692] device syzkaller0 entered promiscuous mode [ 52.775737][ T1713] device syzkaller0 entered promiscuous mode [ 52.816142][ T24] audit: type=1400 audit(1775161665.919:141): avc: denied { create } for pid=1723 comm="syz.4.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 52.950638][ T24] audit: type=1400 audit(1775161666.059:142): avc: denied { create } for pid=1739 comm="syz.0.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 53.234455][ T1740] device syzkaller0 entered promiscuous mode [ 53.339893][ T1751] ÿÿÿÿÿÿ: renamed from bond_slave_0 [ 53.943218][ T24] audit: type=1400 audit(1775161667.029:143): avc: denied { append } for pid=1779 comm="syz.4.424" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 55.868889][ T1882] device syzkaller0 entered promiscuous mode [ 56.076581][ T1895] device syzkaller0 entered promiscuous mode [ 56.190770][ T24] audit: type=1400 audit(1775161669.299:144): avc: denied { create } for pid=1907 comm="syz.4.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 56.315076][ T1910] device syzkaller0 entered promiscuous mode [ 56.405172][ T1932] nr0: port 1(macsec0) entered blocking state [ 56.472701][ T1932] nr0: port 1(macsec0) entered disabled state [ 56.559951][ T1932] device macsec0 entered promiscuous mode [ 56.725655][ T1928] device pim6reg1 entered promiscuous mode [ 57.895145][ T1993] cgroup: fork rejected by pids controller in /syz3 [ 57.930995][ T1991] device syzkaller0 entered promiscuous mode [ 58.960876][ T2038] device syzkaller0 entered promiscuous mode [ 59.092264][ T2029] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.109312][ T2029] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.119829][ T2029] device bridge_slave_0 entered promiscuous mode [ 59.147718][ T2029] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.155579][ T2029] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.174338][ T2029] device bridge_slave_1 entered promiscuous mode [ 59.609415][ T2074] tap0: tun_chr_ioctl cmd 1074025677 [ 59.614876][ T2074] tap0: linktype set to 805 [ 59.710453][ T2029] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.717524][ T2029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.724787][ T2029] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.731805][ T2029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.904933][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.915161][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.923706][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.028189][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.036895][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.055323][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.062376][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.071774][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.080176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.088310][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.095352][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.143387][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.167172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.194597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.202688][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.220432][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 60.228742][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.322232][ T2029] device veth0_vlan entered promiscuous mode [ 60.388449][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 60.396376][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.437030][ T2029] device veth1_macvtap entered promiscuous mode [ 60.478747][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.486556][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.494160][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 60.502232][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.510398][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.536180][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.545488][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.568024][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.591117][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.615324][ T9] device bridge_slave_1 left promiscuous mode [ 60.625137][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.663881][ T9] device bridge_slave_0 left promiscuous mode [ 60.670695][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.678621][ T9] device veth1_macvtap left promiscuous mode [ 60.697075][ T9] device veth0_vlan left promiscuous mode [ 60.844386][ T2139] device syzkaller0 entered promiscuous mode [ 60.864375][ T2128] tun0: tun_chr_ioctl cmd 1074025677 [ 60.870051][ T2128] tun0: linktype set to 820 [ 60.892953][ T2149] device syzkaller0 entered promiscuous mode [ 60.927255][ T2149] syzkaller0: tun_net_xmit 1280 [ 60.947122][ T2135] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.954263][ T2135] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.961924][ T2135] device bridge_slave_0 entered promiscuous mode [ 60.968748][ T2135] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.975890][ T2135] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.983737][ T2135] device bridge_slave_1 entered promiscuous mode [ 61.101677][ T2135] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.108771][ T2135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.116033][ T2135] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.123059][ T2135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.456256][ T2180] device syzkaller0 entered promiscuous mode [ 62.140699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.160467][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.211560][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.302742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.312892][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.340034][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.347105][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.358260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.366762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.375318][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.382374][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.420000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.434043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.443736][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.452556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.469532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.479900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.501162][ T2135] device veth0_vlan entered promiscuous mode [ 62.537014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.553511][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.580790][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.589576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.619252][ T2135] device veth1_macvtap entered promiscuous mode [ 62.630490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.643132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.680253][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.709541][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.717888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.749695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.767998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.827356][ T2246] device syzkaller0 entered promiscuous mode [ 62.867997][ T2256] device syzkaller0 entered promiscuous mode [ 63.213854][ T9] device bridge_slave_1 left promiscuous mode [ 63.251246][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.259843][ T9] device bridge_slave_0 left promiscuous mode [ 63.272268][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.280336][ T9] device veth1_macvtap left promiscuous mode [ 63.714719][ T2336] device wg2 left promiscuous mode [ 63.814451][ T2336] device wg2 entered promiscuous mode [ 64.181660][ T24] audit: type=1400 audit(1775161677.289:145): avc: denied { create } for pid=2379 comm="syz.2.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 64.678734][ T2422] batadv0: tun_chr_ioctl cmd 2148553947 [ 64.890148][ T2459] device syzkaller0 entered promiscuous mode [ 64.904196][ T2459] syzkaller0: tun_net_xmit 1280 [ 64.913037][ T2459] syzkaller0: tun_net_xmit 1280 [ 64.921579][ T2459] syzkaller0: create flow: hash 2780713892 index 2 [ 64.970113][ T2458] syzkaller0: delete flow: hash 2780713892 index 2 [ 65.657661][ T2501] device syzkaller0 entered promiscuous mode [ 65.692135][ T24] audit: type=1400 audit(1775161678.799:146): avc: denied { create } for pid=2474 comm="syz.2.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 66.977711][ T2513] : port 1(ip6gretap0) entered blocking state [ 66.999228][ T2513] : port 1(ip6gretap0) entered disabled state [ 67.012227][ T2513] device ip6gretap0 entered promiscuous mode [ 68.190586][ T24] audit: type=1400 audit(1775161681.299:147): avc: denied { setattr } for pid=2571 comm="syz.0.634" path="pipe:[14380]" dev="pipefs" ino=14380 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 69.344722][ T24] audit: type=1400 audit(1775161682.449:148): avc: denied { create } for pid=2624 comm="syz.4.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 72.521776][ T2754] batadv0: tun_chr_ioctl cmd 1074025677 [ 72.569302][ T2754] batadv0: linktype set to 2 [ 72.589584][ T2747] batadv0: tun_chr_ioctl cmd 2148553947 [ 72.685954][ T2765] device wg2 entered promiscuous mode [ 74.180425][ T2810] bridge0: port 3(gretap0) entered blocking state [ 74.245293][ T2810] bridge0: port 3(gretap0) entered disabled state [ 74.391775][ T2810] device gretap0 entered promiscuous mode [ 74.449278][ T2810] bridge0: port 3(gretap0) entered blocking state [ 74.458737][ T2810] bridge0: port 3(gretap0) entered forwarding state [ 74.859796][ T24] audit: type=1400 audit(1775161687.959:149): avc: denied { create } for pid=2840 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 75.019971][ T24] audit: type=1400 audit(1775161688.129:150): avc: denied { create } for pid=2858 comm="syz.4.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 75.369961][ T2862] device syzkaller0 entered promiscuous mode [ 76.279716][ T2882] syz.1.718[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.279788][ T2882] syz.1.718[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.443775][ T2970] device syzkaller0 entered promiscuous mode [ 80.609817][ T2970] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 81.773416][ T3004] device syzkaller0 entered promiscuous mode [ 82.117184][ T3027] ³þ: renamed from bond_slave_0 [ 84.599138][ T3084] batadv0: tun_chr_ioctl cmd 2147767521 [ 84.624594][ T3084] batadv0: tun_chr_ioctl cmd 1074025677 [ 84.759776][ T3084] batadv0: linktype set to 512 [ 85.773913][ T3149] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.888776][ T3179] device syzkaller0 entered promiscuous mode [ 85.952397][ T3190] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.959581][ T3190] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.985945][ T3190] device bridge_slave_1 left promiscuous mode [ 85.996149][ T3190] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.025100][ T3190] device bridge_slave_0 left promiscuous mode [ 86.035192][ T3190] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.119824][ T3265] device syzkaller0 entered promiscuous mode [ 87.189364][ T3277] device veth0_vlan left promiscuous mode [ 87.230763][ T3277] device veth0_vlan entered promiscuous mode [ 87.335259][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.344147][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.351751][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.501357][ T3295] device syzkaller0 entered promiscuous mode [ 87.840226][ T3318] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 88.239544][ T3318] device syzkaller0 entered promiscuous mode [ 88.461865][ T3356] device sit0 entered promiscuous mode [ 88.605941][ T3370] device syzkaller0 entered promiscuous mode [ 88.991228][ T3385] tap0: tun_chr_ioctl cmd 1074812118 [ 89.399764][ T3392] device syzkaller0 entered promiscuous mode [ 89.695382][ T3410] device syzkaller0 entered promiscuous mode [ 90.322816][ T3448] device syzkaller0 entered promiscuous mode [ 90.882584][ T24] audit: type=1400 audit(1775161703.989:151): avc: denied { create } for pid=3510 comm="syz.3.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 91.017053][ T3514] device veth0_vlan left promiscuous mode [ 91.154923][ T3514] device veth0_vlan entered promiscuous mode [ 91.351333][ T3573] device bridge0 entered promiscuous mode [ 92.378952][ T3622] device syzkaller0 entered promiscuous mode [ 94.086414][ T3701] device syzkaller0 entered promiscuous mode [ 94.512770][ T24] audit: type=1400 audit(1775161707.619:152): avc: denied { create } for pid=3728 comm="syz.2.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 95.594153][ T24] audit: type=1400 audit(1775161708.699:153): avc: denied { associate } for pid=3809 comm="syz.0.990" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 95.696638][ T3825] -1: renamed from syzkaller0 [ 95.760368][ T3827] device syzkaller0 entered promiscuous mode [ 95.785475][ T3827] Â: renamed from pim6reg1 [ 96.534997][ T3867] device syzkaller0 entered promiscuous mode [ 96.545400][ T24] audit: type=1400 audit(1775161709.649:154): avc: denied { create } for pid=3871 comm="syz.3.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 96.701845][ T3892] device syzkaller0 entered promiscuous mode [ 96.931354][ T24] audit: type=1400 audit(1775161710.039:155): avc: denied { read } for pid=3900 comm="syz.1.1019" dev="nsfs" ino=4026532839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 97.007709][ T24] audit: type=1400 audit(1775161710.079:156): avc: denied { open } for pid=3900 comm="syz.1.1019" path="uts:[4026532839]" dev="nsfs" ino=4026532839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.165619][ T3957] €Â0: renamed from pim6reg1 [ 101.406148][ T4083] device syzkaller0 entered promiscuous mode [ 104.865621][ T4150] q: renamed from team_slave_1 [ 107.460981][ T4240] ±ÿ: renamed from team_slave_1 [ 108.809878][ T4273] device syzkaller0 entered promiscuous mode [ 108.839016][ T4277] device syzkaller0 entered promiscuous mode [ 110.781328][ T4434] device syzkaller0 entered promiscuous mode [ 110.789179][ T4411] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.796478][ T4411] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.808480][ T4411] device bridge_slave_0 entered promiscuous mode [ 110.815538][ T4411] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.831758][ T4411] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.850756][ T4411] device bridge_slave_1 entered promiscuous mode [ 111.675226][ T7] device bridge_slave_1 left promiscuous mode [ 111.685063][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.697561][ T7] device bridge_slave_0 left promiscuous mode [ 111.703784][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.721433][ T7] device veth1_macvtap left promiscuous mode [ 111.727499][ T7] device veth0_vlan left promiscuous mode [ 111.884106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.892601][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.926092][ T24] audit: type=1400 audit(1775161725.029:157): avc: denied { attach_queue } for pid=4493 comm="syz.0.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 111.951240][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.959952][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.968078][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.975152][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.989331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.996870][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.005156][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.013382][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.020419][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.037204][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.045303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.062450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.074439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.086667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.102584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.119199][ T4411] device veth0_vlan entered promiscuous mode [ 112.138310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.149672][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.157707][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.165390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.178046][ T4411] device veth1_macvtap entered promiscuous mode [ 112.191139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.199441][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.207604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.227104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.235601][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.245304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.254501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.774293][ T4609] device syzkaller0 entered promiscuous mode [ 114.033188][ T4616] IPv6: pim6reg1: Disabled Multicast RS [ 116.227614][ T4647] device syzkaller0 entered promiscuous mode [ 116.415435][ T4653] -: renamed from syzkaller0 [ 118.811286][ T4734] syz.3.1220[4734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.811418][ T4734] syz.3.1220[4734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.896016][ T4736] sock: sock_set_timeout: `syz.2.1221' (pid 4736) tries to set negative timeout [ 119.223418][ T4758] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.114910][ T4842] device syzkaller0 entered promiscuous mode [ 121.950552][ T4892] device macsec0 entered promiscuous mode [ 122.196566][ T4899] device syzkaller0 entered promiscuous mode [ 124.376280][ T4984] device syzkaller0 entered promiscuous mode [ 124.389540][ T4987] syz.2.1288 (4987) used obsolete PPPIOCDETACH ioctl [ 124.668960][ T5004] syz.3.1294[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.669015][ T5004] syz.3.1294[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.335668][ T5033] bridge0: port 3(gretap0) entered disabled state [ 125.353438][ T5033] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.407754][ T5033] device gretap0 left promiscuous mode [ 125.413467][ T5033] bridge0: port 3(gretap0) entered disabled state [ 125.421202][ T5033] device bridge_slave_1 left promiscuous mode [ 125.427405][ T5033] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.448874][ T5033] device bridge_slave_0 left promiscuous mode [ 125.472719][ T5033] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.442396][ T5078] device syzkaller0 entered promiscuous mode [ 126.616408][ T5074] 6±ÿ: renamed from team_slave_1 [ 127.029343][ T5094] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.036549][ T5094] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.045979][ T5094] device bridge_slave_1 left promiscuous mode [ 127.052207][ T5094] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.079730][ T5094] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.008997][ T24] audit: type=1400 audit(1775161741.109:158): avc: denied { create } for pid=5118 comm="syz.3.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 128.630589][ T5151] sit0: mtu greater than device maximum [ 128.754141][ T5146] bridge0: port 3(veth0_vlan) entered blocking state [ 128.761855][ T5146] bridge0: port 3(veth0_vlan) entered disabled state [ 128.801165][ T5146] bridge0: port 3(veth0_vlan) entered blocking state [ 128.808014][ T5146] bridge0: port 3(veth0_vlan) entered forwarding state [ 130.198674][ T5214] -: renamed from syzkaller0 [ 130.320753][ T5235] batadv0: tun_chr_ioctl cmd 2148553947 [ 130.501815][ T5250] device syzkaller0 entered promiscuous mode [ 131.147803][ T5297] tun0: tun_chr_ioctl cmd 1074025676 [ 131.153964][ T5297] tun0: owner set to 0 [ 131.167807][ T5297] tun0: tun_chr_ioctl cmd 1074025680 [ 132.616295][ T5369] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 133.175821][ T24] audit: type=1400 audit(1775161746.279:159): avc: denied { ioctl } for pid=5388 comm="syz.0.1396" path="mnt:[4026532391]" dev="nsfs" ino=4026532391 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 133.304511][ T5414] batadv0: tun_chr_ioctl cmd 1074025692 [ 133.813773][ T5444] device dummy0 entered promiscuous mode [ 133.868112][ T5441] device syzkaller0 entered promiscuous mode [ 134.253701][ T5476] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 134.262363][ T5476] device syzkaller0 entered promiscuous mode [ 134.390728][ T24] audit: type=1400 audit(1775161747.499:160): avc: denied { create } for pid=5495 comm="syz.4.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 134.691662][ T5505] 6±ÿ: renamed from team_slave_1 [ 135.985424][ T5549] device syzkaller0 entered promiscuous mode [ 136.024291][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 136.174555][ T5558] syz.0.1444 uses obsolete (PF_INET,SOCK_PACKET) [ 136.310542][ T5564] device syzkaller0 entered promiscuous mode [ 136.719765][ T5578] bridge0: port 3(veth0_vlan) entered disabled state [ 136.726531][ T5578] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.971222][ T5587] device syzkaller0 entered promiscuous mode [ 137.429635][ T5613] device syzkaller0 entered promiscuous mode [ 138.313188][ T5638] device syzkaller0 entered promiscuous mode [ 138.953863][ T5655] ªªªªªª™™: renamed from vlan0 [ 139.468695][ T24] audit: type=1400 audit(1775161752.569:161): avc: denied { create } for pid=5718 comm="syz.4.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 139.729181][ T5727] device syzkaller0 entered promiscuous mode [ 140.707236][ T5784] device syzkaller0 entered promiscuous mode [ 141.613932][ T5862] device syzkaller0 entered promiscuous mode [ 144.356924][ T5973] bridge0: port 3(veth0_vlan) entered disabled state [ 144.680872][ T5973] device bridge_slave_1 left promiscuous mode [ 144.687048][ T5973] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.761660][ T5973] device bridge_slave_0 left promiscuous mode [ 144.780513][ T5973] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.320119][ T6123] device pim6reg1 entered promiscuous mode [ 148.778217][ T6140] device syzkaller0 entered promiscuous mode [ 148.792520][ T6140] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 153.073090][ T6288] device syzkaller0 entered promiscuous mode [ 153.985933][ T6316] device syzkaller0 entered promiscuous mode [ 154.872692][ T6337] device syzkaller0 entered promiscuous mode [ 156.272907][ T6371] device wg2 left promiscuous mode [ 156.425743][ T6371] device wg2 entered promiscuous mode [ 156.499647][ T6371] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 158.337997][ T6425] device syzkaller0 entered promiscuous mode [ 158.389588][ T6436] device syzkaller0 entered promiscuous mode [ 158.481436][ T6454] -1: renamed from syzkaller0 [ 159.180964][ T6473] device sit0 entered promiscuous mode [ 160.964259][ T6535] device syzkaller0 entered promiscuous mode [ 160.979866][ T6535] device syzkaller0 left promiscuous mode [ 163.672425][ T6667] device syzkaller0 entered promiscuous mode [ 163.912278][ T6697] 7B’ç÷ï: renamed from syzkaller0 [ 164.248276][ T6715] device syzkaller0 entered promiscuous mode [ 164.965134][ T6751] device syzkaller0 entered promiscuous mode [ 165.183530][ T6764] device syzkaller0 entered promiscuous mode [ 166.229190][ T6845] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 166.249425][ T6844] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 166.967395][ T6893] tun0: tun_chr_ioctl cmd 1074025677 [ 167.048722][ T6893] tun0: linktype set to 820 [ 167.393823][ T6906] device syzkaller0 entered promiscuous mode [ 169.810626][ T7041] device veth1_macvtap left promiscuous mode [ 169.833854][ T7041] device veth1_macvtap entered promiscuous mode [ 169.840787][ T7041] device macsec0 entered promiscuous mode [ 169.958087][ T7043] device syzkaller0 entered promiscuous mode [ 169.990352][ T5320] syzkaller0: tun_net_xmit 48 [ 170.035756][ T7043] syzkaller0: create flow: hash 3559355800 index 2 [ 170.181959][ T7042] syzkaller0: delete flow: hash 3559355800 index 2 [ 170.789787][ T7072] device syzkaller0 entered promiscuous mode [ 171.054093][ T7093] syz.4.1871[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.054145][ T7093] syz.4.1871[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.256319][ T7176] device syzkaller0 entered promiscuous mode [ 172.597657][ T7216] syz.2.1909[7216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.597709][ T7216] syz.2.1909[7216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.972247][ T7229] device syzkaller0 entered promiscuous mode [ 173.133268][ T7246] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 173.139123][ T7246] syzkaller0: linktype set to 773 [ 173.308043][ T7269] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 173.359969][ T7269] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 173.880051][ T7278] device syzkaller0 entered promiscuous mode [ 174.270545][ T7284] device syzkaller0 entered promiscuous mode [ 175.415688][ T7366] device syzkaller0 entered promiscuous mode [ 175.452972][ T7366] syzkaller0: create flow: hash 632797656 index 2 [ 175.474548][ T7371] device syzkaller0 entered promiscuous mode [ 175.513037][ T7366] syzkaller0: delete flow: hash 632797656 index 2 [ 176.887985][ T7420] device syzkaller0 entered promiscuous mode [ 177.851647][ T7480] device syzkaller0 entered promiscuous mode [ 181.528985][ T7616] syz.4.2023[7616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.529029][ T7616] syz.4.2023[7616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.153099][ T7736] device syzkaller0 entered promiscuous mode [ 185.273456][ T7738] device veth0_vlan left promiscuous mode [ 185.324785][ T7738] device veth0_vlan entered promiscuous mode [ 185.389687][ T7738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.451785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.465113][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.485392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.479984][ T7784] batadv0: tun_chr_ioctl cmd 1074025677 [ 186.488550][ T7784] batadv0: linktype set to 804 [ 186.704076][ T7812] device syzkaller0 entered promiscuous mode [ 187.199600][ T7850] device syzkaller0 entered promiscuous mode [ 188.388385][ T7921] device syzkaller0 entered promiscuous mode [ 188.739427][ T7970] device syzkaller0 entered promiscuous mode [ 189.701780][ T8026] device syzkaller0 entered promiscuous mode [ 190.106893][ T8063] device syzkaller0 entered promiscuous mode [ 191.252052][ T8145] device syzkaller0 entered promiscuous mode [ 191.608035][ T8161] device syzkaller0 entered promiscuous mode [ 191.641079][ T8163] device syzkaller0 entered promiscuous mode [ 191.690606][ T8167] device syzkaller0 entered promiscuous mode [ 191.704047][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 192.097500][ T8198] nr0: port 1(macsec0) entered blocking state [ 192.104422][ T8198] nr0: port 1(macsec0) entered disabled state [ 193.819150][ T8257] device wg2 left promiscuous mode [ 194.990437][ T8339] syz.2.2229[8339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.990516][ T8339] syz.2.2229[8339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.389795][ T8377] device lo entered promiscuous mode [ 196.430451][ T8377] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 197.933614][ T8426] device sit0 left promiscuous mode [ 201.116175][ T8559] device syzkaller0 entered promiscuous mode [ 203.527561][ T8652] device syzkaller0 entered promiscuous mode [ 203.776439][ T8657] device syzkaller0 entered promiscuous mode [ 204.736981][ T8714] device syzkaller0 entered promiscuous mode [ 204.804969][ T8731] device syzkaller0 entered promiscuous mode [ 205.095670][ T24] audit: type=1400 audit(1775161818.199:162): avc: denied { create } for pid=8750 comm="syz.4.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 206.001859][ T8805] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 206.011031][ T8805] device syzkaller0 entered promiscuous mode [ 206.420847][ T8817] device syzkaller0 entered promiscuous mode [ 206.622094][ T8842] Ÿë: port 1(vlan1) entered blocking state [ 206.628071][ T8842] Ÿë: port 1(vlan1) entered disabled state [ 206.634408][ T8842] device vlan1 entered promiscuous mode [ 206.726350][ T8851] device syzkaller0 entered promiscuous mode [ 208.537331][ T8933] device wg2 entered promiscuous mode [ 208.548476][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 208.772980][ T8951] device syzkaller0 entered promiscuous mode [ 209.153564][ T8973] device syzkaller0 entered promiscuous mode [ 209.224372][ T8985] device bridge_slave_0 left promiscuous mode [ 209.780339][ T9012] device syzkaller0 entered promiscuous mode [ 210.586374][ T9055] device syzkaller0 entered promiscuous mode [ 210.985955][ T9076] device syzkaller0 entered promiscuous mode [ 212.128139][ T9173] tap1: tun_chr_ioctl cmd 1074025677 [ 212.133664][ T9173] tap1: linktype set to 6 [ 216.106259][ T9301] device syzkaller0 entered promiscuous mode [ 216.276004][ T9314] device syzkaller0 entered promiscuous mode [ 216.288849][ T9314] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 216.786585][ T9335] device syzkaller0 entered promiscuous mode [ 218.151711][ T9386] device wg2 left promiscuous mode [ 218.243524][ T9386] device wg2 entered promiscuous mode [ 219.056544][ T9399] device syzkaller0 entered promiscuous mode [ 219.358427][ T9406] device sit0 entered promiscuous mode [ 220.414698][ T9455] device vlan0 entered promiscuous mode [ 221.855803][ T9531] tap0: tun_chr_ioctl cmd 1074812118 [ 221.967952][ T24] audit: type=1400 audit(1775161835.069:163): avc: denied { create } for pid=9540 comm="syz.0.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 222.080745][ T9551] ÿÿÿÿÿÿ: renamed from vlan1 [ 224.779690][ T9699] device syzkaller0 entered promiscuous mode [ 225.112191][ T9710] @0Ù: renamed from bond_slave_1 [ 226.166461][ T24] audit: type=1400 audit(1775161839.269:164): avc: denied { create } for pid=9775 comm="syz.4.2637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 227.371497][ T9882] device syzkaller0 entered promiscuous mode [ 228.261533][ T9912] device veth1_macvtap left promiscuous mode [ 228.279034][ T9912] device veth1_macvtap entered promiscuous mode [ 228.285552][ T9912] device macsec0 entered promiscuous mode [ 228.539045][ T9913] device syzkaller0 entered promiscuous mode [ 229.434118][ T9959] device syzkaller0 entered promiscuous mode [ 232.086244][T10044] device sit0 left promiscuous mode [ 232.512480][ T24] audit: type=1400 audit(1775161845.619:165): avc: denied { setattr } for pid=10056 comm="syz.4.2721" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 233.524297][T10094] device syzkaller0 entered promiscuous mode [ 236.154329][ T24] audit: type=1400 audit(1775161849.259:166): avc: denied { mounton } for pid=10235 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 236.557421][T10235] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.613825][T10235] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.649647][T10235] device bridge_slave_0 entered promiscuous mode [ 236.656685][T10235] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.663783][T10235] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.671548][T10235] device bridge_slave_1 entered promiscuous mode [ 236.991203][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.018505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.040772][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.060555][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.068716][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.075770][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.083774][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.092208][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.100702][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.107724][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.115346][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.129742][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.210907][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.333294][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.422538][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.486347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.571404][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.649539][T10235] device veth0_vlan entered promiscuous mode [ 237.777968][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.814432][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.016883][T10235] device veth1_macvtap entered promiscuous mode [ 238.027528][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.035627][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.044145][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.235437][ T24] audit: type=1400 audit(1775161851.339:167): avc: denied { unmount } for pid=10235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 238.257572][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.276436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.422709][ T7] device veth1_macvtap left promiscuous mode [ 240.798023][T10378] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.840119][T10378] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.864317][T10378] device bridge_slave_0 entered promiscuous mode [ 241.023631][T10378] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.035313][T10378] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.047087][T10378] device bridge_slave_1 entered promiscuous mode [ 241.273422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.281050][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.294066][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.304589][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.313194][ T1043] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.320239][ T1043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.338520][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.346232][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.354554][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.362838][ T1043] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.369875][ T1043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.377335][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.386145][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.399661][T10421] device veth1 entered promiscuous mode [ 241.427939][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.495374][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.505621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.520684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.536536][T10378] device veth0_vlan entered promiscuous mode [ 241.560774][T10378] device veth1_macvtap entered promiscuous mode [ 241.577698][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.616767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.644035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.658563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.666923][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.942293][T10462] device syzkaller0 entered promiscuous mode [ 241.970516][T10466] device syzkaller0 entered promiscuous mode [ 241.977478][T10463] device veth1_macvtap left promiscuous mode [ 242.112029][T10478] device syzkaller0 entered promiscuous mode [ 244.867538][ T24] audit: type=1400 audit(1775161857.969:168): avc: denied { write } for pid=10625 comm="syz.2.2887" name="cgroup.subtree_control" dev="cgroup2" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 244.923917][ T24] audit: type=1400 audit(1775161857.969:169): avc: denied { open } for pid=10625 comm="syz.2.2887" path="" dev="cgroup2" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 245.204305][T10639] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 245.459747][T10664] device syzkaller0 entered promiscuous mode [ 245.547647][T10676] device sit0 entered promiscuous mode [ 246.375154][T10724] device syzkaller0 entered promiscuous mode [ 247.550991][T10823] device wg2 left promiscuous mode [ 247.951656][T10843] device syzkaller0 entered promiscuous mode [ 248.986359][T10890] device sit0 entered promiscuous mode [ 249.333709][T10917] geneve0: tun_chr_ioctl cmd 1074025677 [ 249.339399][T10917] geneve0: linktype set to 1 [ 249.396284][T10923] device syzkaller0 entered promiscuous mode [ 249.664390][T10938] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.671509][T10938] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.678748][T10938] device bridge_slave_0 entered promiscuous mode [ 249.688447][T10938] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.695706][T10938] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.703130][T10938] device bridge_slave_1 entered promiscuous mode [ 249.749123][T10938] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.756174][T10938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.763428][T10938] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.770460][T10938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.790607][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.797840][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.819505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.833328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.841547][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.849911][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.858142][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.865197][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.872772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.881340][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.889567][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.896593][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.904259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.912689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.920919][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.934028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.958634][T10938] device veth0_vlan entered promiscuous mode [ 249.974896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.988718][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.005759][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.022304][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.038916][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.053543][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.076551][T10938] device veth1_macvtap entered promiscuous mode [ 250.085077][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.093560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.102055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.142161][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.160560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.183370][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.191685][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.471361][T10990] -1: renamed from syzkaller0 [ 250.486778][T10986] device vlan0 entered promiscuous mode [ 251.102721][T11021] device sit0 left promiscuous mode [ 251.226757][T11021] device sit0 entered promiscuous mode [ 251.934673][T11063] device syzkaller0 entered promiscuous mode [ 252.011305][T11079] device syzkaller0 entered promiscuous mode [ 253.065933][T11162] device syzkaller0 entered promiscuous mode [ 253.092644][T11158] device veth1_macvtap left promiscuous mode [ 253.112178][T11165] device wg2 left promiscuous mode [ 253.160144][T11165] device wg2 entered promiscuous mode [ 253.298748][T11179] device syzkaller0 entered promiscuous mode [ 253.315139][T11182] device pim6reg1 entered promiscuous mode [ 254.039370][T11222] device syzkaller0 entered promiscuous mode [ 255.004302][T11255] device syzkaller0 entered promiscuous mode [ 255.308194][T11266] device syzkaller0 entered promiscuous mode [ 255.747600][T11317] device syzkaller0 entered promiscuous mode [ 257.488043][T11404] device syzkaller0 entered promiscuous mode [ 258.447579][T11445] device syzkaller0 entered promiscuous mode [ 258.480092][T11442] tap0: tun_chr_ioctl cmd 1074025677 [ 258.506049][T11442] tap0: linktype set to 6 [ 259.505679][T11483] geneve1: tun_chr_ioctl cmd 1074025672 [ 259.600911][T11483] geneve1: ignored: set checksum enabled [ 260.502945][T11554] batadv0: tun_chr_ioctl cmd 2148553947 [ 260.526054][T11557] batadv0: tun_chr_ioctl cmd 1074025677 [ 260.545601][T11557] batadv0: linktype set to 260 [ 260.878617][T11564] device lo entered promiscuous mode [ 260.891917][T11564] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 261.458904][T11633] device syzkaller0 entered promiscuous mode [ 262.041784][T11644] device wg2 entered promiscuous mode [ 262.417354][T11664] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 262.607943][T11692] device sit0 entered promiscuous mode [ 262.915412][T11706] device syzkaller0 entered promiscuous mode [ 263.527360][T11725] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.534678][T11725] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.548429][T11725] device bridge_slave_0 entered promiscuous mode [ 263.560399][T11725] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.622694][T11725] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.647119][T11725] device bridge_slave_1 entered promiscuous mode [ 263.733035][T11725] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.740108][T11725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.747367][T11725] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.754413][T11725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.773973][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.781822][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.793001][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.810638][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.818992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.828235][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.835292][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.843268][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.852259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.860623][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.867660][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.881688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.889816][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.897794][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.906308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.944606][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 263.956890][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.975392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.985513][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.993914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.008832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.022527][T11725] device veth0_vlan entered promiscuous mode [ 264.066909][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.075212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.089539][T11725] device veth1_macvtap entered promiscuous mode [ 264.354238][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.364478][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.377431][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.444294][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.459889][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.955073][T11812] FAULT_INJECTION: forcing a failure. [ 264.955073][T11812] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 265.163480][T11812] CPU: 0 PID: 11812 Comm: syz.4.3240 Tainted: G W syzkaller #0 [ 265.172346][T11812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 265.182391][T11812] Call Trace: [ 265.185682][T11812] __dump_stack+0x21/0x24 [ 265.190004][T11812] dump_stack_lvl+0x1a7/0x208 [ 265.194671][T11812] ? show_regs_print_info+0x18/0x18 [ 265.199855][T11812] ? vfs_write+0xb27/0xdc0 [ 265.204258][T11812] dump_stack+0x15/0x1c [ 265.208396][T11812] should_fail+0x3c1/0x510 [ 265.212799][T11812] should_fail_usercopy+0x1a/0x20 [ 265.217807][T11812] _copy_from_user+0x20/0xd0 [ 265.222382][T11812] __se_sys_bpf+0x1bb/0x740 [ 265.226867][T11812] ? __x64_sys_bpf+0x90/0x90 [ 265.231456][T11812] ? debug_smp_processor_id+0x17/0x20 [ 265.236811][T11812] __x64_sys_bpf+0x7b/0x90 [ 265.241212][T11812] do_syscall_64+0x31/0x40 [ 265.245614][T11812] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.251486][T11812] RIP: 0033:0x7f790a449819 [ 265.255903][T11812] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.275495][T11812] RSP: 002b:00007f7908ea4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.283895][T11812] RAX: ffffffffffffffda RBX: 00007f790a6c2fa0 RCX: 00007f790a449819 [ 265.291853][T11812] RDX: 0000000000000050 RSI: 0000200000000040 RDI: 0000000000000000 [ 265.299810][T11812] RBP: 00007f7908ea4090 R08: 0000000000000000 R09: 0000000000000000 [ 265.307768][T11812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.315730][T11812] R13: 00007f790a6c3038 R14: 00007f790a6c2fa0 R15: 00007fff67fdcb08 [ 265.628271][T11815] device syzkaller0 entered promiscuous mode [ 266.241172][ T9] device macsec0 left promiscuous mode [ 266.246776][ T9] nr0: port 1(macsec0) entered disabled state [ 266.334524][ T9] device veth1_macvtap left promiscuous mode [ 266.812820][T11906] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 266.924616][T11923] tap0: tun_chr_ioctl cmd 1074025677 [ 266.960266][T11923] tap0: linktype set to 270 [ 267.040464][T11927] device syzkaller0 entered promiscuous mode [ 267.436203][T12002] device syzkaller0 entered promiscuous mode [ 268.504022][T12039] device veth1_macvtap entered promiscuous mode [ 268.589838][T12039] device macsec0 entered promiscuous mode [ 268.624783][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.047177][T12071] FAULT_INJECTION: forcing a failure. [ 269.047177][T12071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.175226][T12071] CPU: 1 PID: 12071 Comm: syz.1.3325 Tainted: G W syzkaller #0 [ 269.184093][T12071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 269.194135][T12071] Call Trace: [ 269.197419][T12071] __dump_stack+0x21/0x24 [ 269.201744][T12071] dump_stack_lvl+0x1a7/0x208 [ 269.206408][T12071] ? thaw_kernel_threads+0x220/0x220 [ 269.211679][T12071] ? vsnprintf+0x189c/0x1990 [ 269.216264][T12071] ? show_regs_print_info+0x18/0x18 [ 269.221453][T12071] dump_stack+0x15/0x1c [ 269.225596][T12071] should_fail+0x3c1/0x510 [ 269.230001][T12071] should_fail_usercopy+0x1a/0x20 [ 269.235015][T12071] _copy_to_user+0x20/0x90 [ 269.239421][T12071] simple_read_from_buffer+0xe9/0x160 [ 269.244782][T12071] proc_fail_nth_read+0x1a6/0x220 [ 269.249791][T12071] ? proc_fault_inject_write+0x310/0x310 [ 269.255418][T12071] ? rw_verify_area+0x1c0/0x360 [ 269.260257][T12071] ? proc_fault_inject_write+0x310/0x310 [ 269.265875][T12071] vfs_read+0x209/0xa60 [ 269.270016][T12071] ? kernel_read+0x70/0x70 [ 269.274419][T12071] ? __kasan_check_write+0x14/0x20 [ 269.279518][T12071] ? mutex_lock+0x92/0xf0 [ 269.283835][T12071] ? mutex_trylock+0xa0/0xa0 [ 269.288409][T12071] ? __fget_files+0x2c4/0x320 [ 269.293071][T12071] ? __fdget_pos+0x2d2/0x380 [ 269.297647][T12071] ? ksys_read+0x71/0x250 [ 269.301964][T12071] ksys_read+0x149/0x250 [ 269.306191][T12071] ? vfs_write+0xdc0/0xdc0 [ 269.310594][T12071] ? __kasan_check_read+0x11/0x20 [ 269.315609][T12071] __x64_sys_read+0x7b/0x90 [ 269.320099][T12071] do_syscall_64+0x31/0x40 [ 269.324508][T12071] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 269.330385][T12071] RIP: 0033:0x7fdf4d05c04e [ 269.334790][T12071] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 269.354380][T12071] RSP: 002b:00007fdf4baf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 269.362787][T12071] RAX: ffffffffffffffda RBX: 00007fdf4baf66c0 RCX: 00007fdf4d05c04e [ 269.370748][T12071] RDX: 000000000000000f RSI: 00007fdf4baf60a0 RDI: 0000000000000003 [ 269.378714][T12071] RBP: 00007fdf4baf6090 R08: 0000000000000000 R09: 0000000000000000 [ 269.386674][T12071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.394642][T12071] R13: 00007fdf4d315038 R14: 00007fdf4d314fa0 R15: 00007fffffd95858 [ 269.698076][T12090] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 269.705271][T12090] syzkaller0: persist enabled [ 269.728231][T12090] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 270.085008][T12135] device syzkaller0 entered promiscuous mode [ 270.097277][ T1011] syzkaller0: tun_net_xmit 48 [ 270.320965][T12138] device syzkaller0 entered promiscuous mode [ 270.763710][T12179] device veth0_vlan left promiscuous mode [ 270.836439][T12179] device veth0_vlan entered promiscuous mode [ 271.607891][T12272] device syzkaller0 entered promiscuous mode [ 272.050231][T12319] syz.0.3397[12319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.050297][T12319] syz.0.3397[12319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.514144][T12394] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 273.549515][T12392] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 273.572094][T12399] device syzkaller0 entered promiscuous mode [ 274.869824][T12471] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.877026][T12471] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.895464][T12471] device bridge_slave_1 left promiscuous mode [ 274.920470][T12471] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.930716][T12471] device bridge_slave_0 left promiscuous mode [ 274.944743][T12471] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.152278][T12491] device syzkaller0 entered promiscuous mode [ 278.869991][T12642] device syzkaller0 entered promiscuous mode [ 279.231936][T12667] device syzkaller0 entered promiscuous mode [ 279.341991][T12671] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 279.350680][T12670] device syzkaller0 left promiscuous mode [ 280.823677][T12745] ÿÿÿÿÿÿ: renamed from vlan1 [ 282.053466][T12785] device syzkaller0 entered promiscuous mode [ 283.022692][T12829] device wg2 left promiscuous mode [ 283.096424][T12829] device wg2 entered promiscuous mode [ 284.322885][T12882] device syzkaller0 entered promiscuous mode [ 285.377062][T12910] device macsec0 entered promiscuous mode [ 285.863125][T12930] device syzkaller0 entered promiscuous mode [ 286.023315][T12938] cgroup: fork rejected by pids controller in /syz4 [ 286.087535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.099741][T12944] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.155687][T12944] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.175711][T12944] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 286.204922][T12943] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.230319][T12943] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.251440][T13049] @ÿ: renamed from bond_slave_0 [ 286.258780][T12943] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.612445][T13049] device syzkaller0 entered promiscuous mode [ 286.678370][T13063] tap0: tun_chr_ioctl cmd 1074812118 [ 286.966121][T13085] device syzkaller0 entered promiscuous mode [ 286.993693][T13081] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.000839][T13081] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.008292][T13081] device bridge_slave_0 entered promiscuous mode [ 287.040112][T13081] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.047891][T13081] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.055563][T13081] device bridge_slave_1 entered promiscuous mode [ 287.233364][T13081] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.240449][T13081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.247689][T13081] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.254729][T13081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.437582][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.445286][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.454120][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.585824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.619576][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.626632][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.804314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.890456][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.013979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.126857][T13081] device veth0_vlan entered promiscuous mode [ 288.209257][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.224926][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.276783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.301476][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.354164][T13141] device syzkaller0 left promiscuous mode [ 288.389931][T13081] device veth1_macvtap entered promiscuous mode [ 288.403482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.419607][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.427812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.461028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.481678][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.499244][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.517701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.674690][ T9] device bridge_slave_1 left promiscuous mode [ 288.682667][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.763997][ T9] device bridge_slave_0 left promiscuous mode [ 288.770259][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.802859][ T9] device veth0_vlan left promiscuous mode [ 289.372324][T13162] device syzkaller0 entered promiscuous mode [ 289.663056][T13192] device syzkaller0 entered promiscuous mode [ 291.557553][T13258] @ÿ: renamed from bond_slave_0 [ 294.231577][T13429] syz.2.3683[13429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.069631][T13499] device wg2 entered promiscuous mode [ 295.090444][T13498] device syzkaller0 entered promiscuous mode [ 295.609404][T13551] device syzkaller0 entered promiscuous mode [ 295.646984][T13556] ÿÿÿÿÿÿ: renamed from vlan1 [ 295.706731][T13574] device syzkaller0 entered promiscuous mode [ 295.917468][T13604] tap0: tun_chr_ioctl cmd 1074025677 [ 295.924033][T13604] tap0: linktype set to 769 [ 295.934969][T13610] device syzkaller0 entered promiscuous mode [ 296.001049][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 297.804734][ T24] audit: type=1400 audit(1775161910.909:170): avc: denied { create } for pid=13696 comm="syz.2.3760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 299.456701][ T24] audit: type=1400 audit(1775161912.559:171): avc: denied { create } for pid=13745 comm="syz.2.3773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 300.881830][T13610] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 300.891994][T13610] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 301.455626][T13833] ip6tnl0: mtu greater than device maximum [ 301.529316][T13843] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 301.557430][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 301.974898][T13884] ªªªªªª™™: renamed from vlan0 [ 302.147902][T13913] device syzkaller0 entered promiscuous mode [ 302.238817][T13926] device syzkaller0 entered promiscuous mode [ 302.348683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 302.357490][T13956] device syzkaller0 left promiscuous mode [ 302.363741][T13956] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 302.445570][T13953] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 302.941036][T13978] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.948081][T13978] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.956067][T13978] device bridge_slave_0 entered promiscuous mode [ 302.975797][T13978] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.026292][T13978] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.046882][T13978] device bridge_slave_1 entered promiscuous mode [ 303.150501][T13978] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.157559][T13978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.164806][T13978] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.171838][T13978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.273195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.299979][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.369545][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.440068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.455901][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.462976][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.471314][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.479694][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.486730][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.498441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.728380][T14014] device wg2 left promiscuous mode [ 303.751866][T14013] device wg2 entered promiscuous mode [ 303.806011][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.819122][T13978] device veth0_vlan entered promiscuous mode [ 303.869130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.880258][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.887666][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.008624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.104501][T13978] device veth1_macvtap entered promiscuous mode [ 304.116465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.127082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.145442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.194049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.223679][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.256070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.265457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.951329][T14072] device syzkaller0 entered promiscuous mode [ 304.997730][T14076] device syzkaller0 entered promiscuous mode [ 305.004740][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 305.150475][T14085] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.175114][T14089] device macsec0 entered promiscuous mode [ 305.298726][ T9] nr0: port 1(macsec0) entered disabled state [ 305.382306][ T9] device veth1_macvtap left promiscuous mode [ 306.627964][T14191] device veth0_vlan left promiscuous mode [ 306.640379][T14191] device veth0_vlan entered promiscuous mode [ 306.651531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.669824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.692423][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 313.764640][T14354] device syzkaller0 entered promiscuous mode [ 314.988590][T14432] geneve0: tun_chr_ioctl cmd 1074025677 [ 314.994500][T14432] geneve0: linktype set to 1 [ 317.095429][T14524] device syzkaller0 entered promiscuous mode [ 317.592308][T14535] device syzkaller0 entered promiscuous mode [ 319.763955][T14586] device syzkaller0 entered promiscuous mode [ 322.170316][T14694] device sit0 entered promiscuous mode [ 322.735759][T14711] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 322.744728][T14711] device syzkaller0 entered promiscuous mode [ 322.855682][T14722] device wg2 left promiscuous mode [ 322.883575][T14723] device wg2 entered promiscuous mode [ 324.333449][T14795] lo: mtu less than device minimum [ 324.347629][T14792] device syzkaller0 entered promiscuous mode [ 324.853740][T14841] device syzkaller0 entered promiscuous mode [ 324.946798][T14844] device syzkaller0 entered promiscuous mode [ 328.858492][T15039] device syzkaller0 entered promiscuous mode [ 332.191415][T15100] batadv0: tun_chr_ioctl cmd 1074025677 [ 332.196989][T15100] batadv0: linktype set to 776 [ 335.484983][T15252] device wg2 entered promiscuous mode [ 338.585882][T15373] IPv6: pim6reg1: Disabled Multicast RS [ 338.768998][T15377] : port 1(syz_tun) entered blocking state [ 338.838348][T15377] : port 1(syz_tun) entered disabled state [ 339.056497][T15377] device syz_tun entered promiscuous mode [ 339.740677][T15413] sock: sock_set_timeout: `syz.0.4253' (pid 15413) tries to set negative timeout [ 344.997286][T15548] device xfrm0 entered promiscuous mode [ 345.991047][T15601] device syzkaller0 entered promiscuous mode [ 346.491431][T15614] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.498645][T15614] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.559522][T15615] device bridge_slave_1 left promiscuous mode [ 346.565673][T15615] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.600177][T15615] device bridge_slave_0 left promiscuous mode [ 346.657422][T15615] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.198712][T15722] device syzkaller0 entered promiscuous mode [ 352.497568][T15757] device syzkaller0 entered promiscuous mode [ 352.579597][T15764] device syzkaller0 entered promiscuous mode [ 352.613355][T15764] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 354.563173][T15844] device syzkaller0 entered promiscuous mode [ 355.844663][T15893] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.859189][T15893] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.866674][T15893] device bridge_slave_0 entered promiscuous mode [ 355.877061][T15893] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.887372][T15893] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.896938][T15893] device bridge_slave_1 entered promiscuous mode [ 356.471457][T15893] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.478512][T15893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.485796][T15893] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.492830][T15893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.699795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.708377][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.720784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.739016][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.747225][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.759481][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.884344][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.897307][T15893] device veth0_vlan entered promiscuous mode [ 356.956799][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 356.965056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.148839][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.156851][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.164472][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.180188][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.201205][T15893] device veth1_macvtap entered promiscuous mode [ 357.223614][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.231778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.245541][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.439756][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.530489][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.900734][ T7] device bridge_slave_1 left promiscuous mode [ 357.954996][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.009412][ T7] device bridge_slave_0 left promiscuous mode [ 358.034769][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.056638][ T7] device veth1_macvtap left promiscuous mode [ 358.062706][ T7] device veth0_vlan left promiscuous mode [ 359.950862][ C0] Illegal XDP return value 16128, expect packet loss! [ 362.023890][T15998] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.031084][T15998] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.485044][T16003] ³þ: renamed from bond_slave_0 [ 365.066958][T16116] device wg2 entered promiscuous mode [ 365.369010][T16137] device syzkaller0 entered promiscuous mode [ 365.840206][T16150] device syzkaller0 entered promiscuous mode [ 366.668442][T16178] device syzkaller0 entered promiscuous mode [ 370.650499][T16343] device syzkaller0 entered promiscuous mode [ 370.712526][T16342] device syzkaller0 entered promiscuous mode [ 371.093111][T16375] device syzkaller0 entered promiscuous mode [ 371.272261][T16383] device syzkaller0 entered promiscuous mode [ 371.777911][T16410] device syzkaller0 entered promiscuous mode [ 371.805265][T16419] sock: sock_set_timeout: `syz.2.4528' (pid 16419) tries to set negative timeout [ 374.116966][T16480] device syzkaller0 entered promiscuous mode [ 380.163692][T16567] device syzkaller0 entered promiscuous mode [ 380.940020][T16607] device wg2 left promiscuous mode [ 380.947574][T16613] bridge0: port 3(veth1_macvtap) entered blocking state [ 381.012501][T16613] bridge0: port 3(veth1_macvtap) entered disabled state [ 381.063304][T16604] device wg2 entered promiscuous mode [ 383.377089][T16686] device syzkaller0 entered promiscuous mode [ 385.499000][T16736] device syzkaller0 entered promiscuous mode [ 390.535441][T16811] bridge0: port 3(veth1) entered blocking state [ 390.609411][T16811] bridge0: port 3(veth1) entered disabled state [ 390.616207][T16811] device veth1 entered promiscuous mode [ 390.709315][T16811] bridge0: port 3(veth1) entered blocking state [ 390.715590][T16811] bridge0: port 3(veth1) entered forwarding state [ 390.872175][T16813] device veth1 left promiscuous mode [ 390.877596][T16813] bridge0: port 3(veth1) entered disabled state [ 391.227006][T16823] device syzkaller0 entered promiscuous mode [ 391.250526][T16824] device syzkaller0 entered promiscuous mode [ 391.270090][T16336] syzkaller0: tun_net_xmit 76 [ 391.274846][T16336] syzkaller0: tun_net_xmit 48 [ 391.299220][ C0] syzkaller0: tun_net_xmit 76 [ 394.540712][T16959] device syzkaller0 entered promiscuous mode [ 398.506636][T17071] device syzkaller0 entered promiscuous mode [ 398.551577][T17081] device bridge_slave_1 left promiscuous mode [ 398.566273][T17081] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.646620][T17081] device bridge_slave_0 left promiscuous mode [ 398.663481][T17081] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.865268][T17089] bridge0: port 3(gretap0) entered blocking state [ 398.875688][T17089] bridge0: port 3(gretap0) entered disabled state [ 398.892030][T17089] device gretap0 entered promiscuous mode [ 398.898538][T17089] bridge0: port 3(gretap0) entered blocking state [ 398.905042][T17089] bridge0: port 3(gretap0) entered forwarding state [ 400.347574][T17172] device syzkaller0 entered promiscuous mode [ 400.887033][T17168] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 400.898767][T17168] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 400.907174][T17168] CPU: 0 PID: 17168 Comm: syz.2.4733 Tainted: G W syzkaller #0 [ 400.916006][T17168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 400.926089][T17168] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 400.932062][T17168] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 400.951664][T17168] RSP: 0018:ffffc90000c87400 EFLAGS: 00010202 [ 400.957735][T17168] RAX: 0000000000000004 RBX: 1ffff11023868679 RCX: 0000000000000000 [ 400.965708][T17168] RDX: 0000000000000008 RSI: 0000000000000000 RDI: ffffc90000c873f0 [ 400.973681][T17168] RBP: ffffc90000c87500 R08: ffffc90000c873ef R09: ffffc90000c873e8 [ 400.981648][T17168] R10: dffffc0000000000 R11: fffff52000190e7e R12: 00000000fffffff2 [ 400.989601][T17168] R13: 0000000000000020 R14: 1ffff92000190e88 R15: dffffc0000000000 [ 400.997551][T17168] FS: 00007fc6fe6036c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 401.006451][T17168] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.013007][T17168] CR2: 0000000000a50000 CR3: 00000001287cc000 CR4: 00000000003506b0 [ 401.020960][T17168] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.028907][T17168] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 401.036846][T17168] Call Trace: [ 401.040119][T17168] ? perf_pending_event+0x560/0x560 [ 401.045292][T17168] ? __this_cpu_preempt_check+0x13/0x20 [ 401.050809][T17168] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 401.057024][T17168] __perf_event_overflow+0x1b3/0x340 [ 401.062288][T17168] perf_swevent_event+0x2f7/0x530 [ 401.067288][T17168] ___perf_sw_event+0x3aa/0x4d0 [ 401.072115][T17168] ? xas_create+0x12ce/0x1450 [ 401.076768][T17168] ? __memcg_kmem_charge+0x150/0x150 [ 401.082032][T17168] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 401.088420][T17168] ? xas_nomem+0x6b/0x1d0 [ 401.092723][T17168] ? shmem_add_to_page_cache+0xc93/0xe30 [ 401.098332][T17168] __perf_sw_event+0x134/0x270 [ 401.103166][T17168] do_user_addr_fault+0xc76/0xc90 [ 401.108168][T17168] ? do_kern_addr_fault+0x80/0x80 [ 401.113165][T17168] exc_page_fault+0x5a/0xc0 [ 401.117641][T17168] asm_exc_page_fault+0x1e/0x30 [ 401.122467][T17168] RIP: 0010:__get_user_nocheck_1+0x6/0x10 [ 401.128159][T17168] Code: d0 73 64 48 19 d2 48 21 d0 0f 01 cb 48 8b 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb 0f ae e8 <0f> b6 10 31 c0 0f 01 ca c3 90 0f 01 cb 0f ae e8 0f b7 10 31 c0 0f [ 401.147736][T17168] RSP: 0018:ffffc90000c87a40 EFLAGS: 00050293 [ 401.153778][T17168] RAX: 00002000000ef000 RBX: 00000000000ef000 RCX: ffff888120acbb40 [ 401.161723][T17168] RDX: 0000000000000002 RSI: 0000000000001000 RDI: 0000000000000000 [ 401.169668][T17168] RBP: ffffc90000c87a90 R08: ffff888120acbb40 R09: 0000000000000002 [ 401.177613][T17168] R10: 0000000000000040 R11: 0000000000000002 R12: 00002000000effff [ 401.185560][T17168] R13: 00002000000f0000 R14: 00002000000ef000 R15: 00000000ffffffff [ 401.193521][T17168] ? iov_iter_fault_in_readable+0x13e/0x320 [ 401.199391][T17168] generic_perform_write+0x1ab/0x540 [ 401.204651][T17168] ? grab_cache_page_write_begin+0xb0/0xb0 [ 401.210432][T17168] ? file_remove_privs+0x5b0/0x5b0 [ 401.215515][T17168] ? __generic_file_write_iter+0xcb/0x480 [ 401.221214][T17168] __generic_file_write_iter+0x24b/0x480 [ 401.226817][T17168] ? generic_write_checks+0x3d4/0x480 [ 401.232162][T17168] generic_file_write_iter+0xa9/0x1d0 [ 401.237504][T17168] vfs_write+0x758/0xdc0 [ 401.241719][T17168] ? kernel_write+0x3c0/0x3c0 [ 401.246369][T17168] ? __irq_exit_rcu+0x40/0x150 [ 401.251117][T17168] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 401.257248][T17168] ksys_write+0x149/0x250 [ 401.261551][T17168] ? __ia32_sys_read+0x90/0x90 [ 401.266289][T17168] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 401.272327][T17168] ? __kasan_check_read+0x11/0x20 [ 401.277326][T17168] __x64_sys_write+0x7b/0x90 [ 401.281889][T17168] do_syscall_64+0x31/0x40 [ 401.286283][T17168] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 401.292147][T17168] RIP: 0033:0x7fc6ffba8819 [ 401.296537][T17168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 401.316116][T17168] RSP: 002b:00007fc6fe603028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 401.324542][T17168] RAX: ffffffffffffffda RBX: 00007fc6ffe21fa0 RCX: 00007fc6ffba8819 [ 401.332486][T17168] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000009 [ 401.340431][T17168] RBP: 00007fc6ffc3ec91 R08: 0000000000000000 R09: 0000000000000000 [ 401.348377][T17168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 401.356321][T17168] R13: 00007fc6ffe22038 R14: 00007fc6ffe21fa0 R15: 00007ffd53a40de8 [ 401.364279][T17168] Modules linked in: [ 401.368372][T17168] ---[ end trace 3f4f70f73ed53ff3 ]--- [ 401.373871][T17168] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 401.379851][T17168] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 401.399482][T17168] RSP: 0018:ffffc90000c87400 EFLAGS: 00010202 [ 401.405532][T17168] RAX: 0000000000000004 RBX: 1ffff11023868679 RCX: 0000000000000000 [ 401.413528][T17168] RDX: 0000000000000008 RSI: 0000000000000000 RDI: ffffc90000c873f0 [ 401.421518][T17168] RBP: ffffc90000c87500 R08: ffffc90000c873ef R09: ffffc90000c873e8 [ 401.429514][T17168] R10: dffffc0000000000 R11: fffff52000190e7e R12: 00000000fffffff2 [ 401.437486][T17168] R13: 0000000000000020 R14: 1ffff92000190e88 R15: dffffc0000000000 [ 401.445497][T17168] FS: 00007fc6fe6036c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 401.454596][T17168] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.461229][T17168] CR2: 0000000000a50000 CR3: 00000001287cc000 CR4: 00000000003506b0 [ 401.469238][T17168] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.477208][T17168] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 401.485219][T17168] Kernel panic - not syncing: Fatal exception [ 401.491541][T17168] Kernel Offset: disabled [ 401.495844][T17168] Rebooting in 86400 seconds..