last executing test programs: 6m54.823546797s ago: executing program 3 (id=3968): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2, @perf_config_ext={0x1, 0x80000de}, 0x0, 0xc8, 0x0, 0x7, 0x4000000000, 0x2, 0x6, 0x0, 0x20, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)="22b3f059c0753c", 0x0, 0x0, r0}, 0x38) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x2) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce2200fc00000000000000000000000000007f"], 0xfdef) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x2f, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000000c0)={0x0, 0x2, [@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r5, &(0x7f0000000040)='FROZEN\x00', 0x7) (async) r6 = openat$cgroup_procs(r4, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) (async) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000180)=r7, 0x12) (async) write$cgroup_freezer_state(r5, &(0x7f0000000080)='THAWED\x00', 0x7) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0xcfa4) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x8, 0x1, 0x0, 0xb, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x4043, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x3, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x6) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r2, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)=r2}, 0x20) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x1d, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}}, @call={0x85, 0x0, 0x0, 0x43}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='syzkaller\x00', 0x7fff, 0x19, &(0x7f00000005c0)=""/25, 0x41100, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)=[r2, r9], &(0x7f0000000680)=[{0x4, 0x5, 0x8, 0x3}, {0x0, 0x3, 0xe, 0x6}], 0x10, 0x2}, 0x94) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff55, 0x20000040}, 0x20044800) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000a00000000000000100080026b1108000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6m54.553632624s ago: executing program 3 (id=3969): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x18, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b708000000000e007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000182300", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='+cpu'], 0xb) close(r1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x33}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x1a) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x8, 0x7, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0xfffffffd}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000140)="eededa05bc2b", &(0x7f00000007c0)=""/4096, &(0x7f0000000240), &(0x7f00000002c0), 0x78, r5}, 0x38) r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f00000001c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r9}, 0x8) socketpair(0x10, 0xa, 0x7, &(0x7f0000001980)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r9, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009e00000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r12, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13, r12, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r9, &(0x7f0000001940)={[{0x2d, 'blkio'}, {0x2d, 'cpuset'}]}, 0xf) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8001}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000500)='GPL\x00', 0xffff, 0xfd, &(0x7f0000000540)=""/253, 0x40f00, 0x74, '\x00', r10, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x6, 0x87}, 0x10, r13, 0x0, 0x8, &(0x7f00000017c0)=[r5, r5, r7], &(0x7f0000001800)=[{0x4, 0x1, 0x10, 0x8}, {0x2, 0x4, 0xa, 0x2}, {0x4, 0x4, 0xa, 0x9}, {0x1, 0x5, 0xf, 0x1}, {0x2, 0x3, 0x9, 0xa}, {0x5, 0x4, 0x6, 0xa}, {0x0, 0x5, 0x1, 0xc}, {0x4, 0x2, 0x8}], 0x10, 0x7ff}, 0x94) 6m54.288599421s ago: executing program 3 (id=3970): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6m54.182286769s ago: executing program 3 (id=3971): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xa, 0x42, 0x40, 0xc2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000240)=0xffffffffffffffff, 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xf, &(0x7f00000002c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff5f48}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x1}], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x40f00, 0x4a, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x0, 0x2ce8, 0x1}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000480)=[{0x3, 0x2, 0xb, 0x3}, {0x4, 0x5, 0x6, 0x3}, {0x5, 0x2, 0x5, 0x7}, {0x5, 0x2, 0x5, 0x8}], 0x10, 0x1}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000000880)=ANY=[@ANYRES16=0x0], &(0x7f0000000140)='GPL\x00', 0x80000, 0x0, 0x0, 0x81f00, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000040)={0x400}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0x5e, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xc69a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6m53.712172146s ago: executing program 3 (id=3973): socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000500)="173d880db56f9fb87f49a8a8292eb6c26a90c5ccb41f926c6d43a18e047c991cf1bd52045ff0169d69896c2c06ff2af06ea2fb0c72d813089adf6ff9a246e7b7d8630215af924b1fe1aaabdb8ec309aae30a8e7e2ab01720e0db9402bbb1adb86c1e13a4dd43e294eb8935713b9edc955a51e5b4ee4967430aa5eb1a4fff890a223233d5193321be3d02d76c5f11ba4079f1dd0424f4a836d15bb6ec792f4f60fb924906895be816c9fc284a50cf88fbe3f0d16c10373b111d3cf9fda91a5284efc6027e50ecfa591b102724b0f622b8cf11a72d883e", 0xd6}, {&(0x7f0000000780)="b0e6479e8ed483153dec5e5ded5b0e27f98d93525cb29d03960bbd96005e43089b23779b0ea2a710ea80b1c2dd0271ad3e209a0c7238fc51e04f47cb0893192687f49d9a798a856b7295cf0a5013725fe0b882738cecbbafb41b6a3c6d5f9eb6b81e7f1ee34794d9826c66966ac7e06eed06173b", 0x74}], 0x2, &(0x7f0000000a00)=ANY=[], 0x170}, 0x4040014) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r2, r5}, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="db17e8", 0x3}], 0x1}, 0x80000e4) ioctl$SIOCSIFHWADDR(r7, 0x541b, &(0x7f0000000340)={'syzkaller1\x00', @remote}) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000000), 0x0}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100000001) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 6m52.841072543s ago: executing program 3 (id=3979): bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYRESDEC=0x0], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x71, 0x4, 0x3, 0x200, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x50) close(0xffffffffffffffff) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000010c0)=ANY=[@ANYBLOB="9feb010018002100000000001c0000001c00000002000000090000100000000f0300000048c36b00000001000000ab00000000000000804623886d37608e5e95abf78003b89cac2dbe5de18d4843e4c24fe0daa385546a67054adb0d68db3392f9e2b73233b05d8a64259d0242acf3"], 0x0, 0x36}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1600000000000000008400000100000010"], 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000a8f63080fdc496fa53259e3c94eae0b1d9d369be0c7be2586214bcb5"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000180), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 6m37.743041606s ago: executing program 32 (id=3979): bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYRESDEC=0x0], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x71, 0x4, 0x3, 0x200, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x50) close(0xffffffffffffffff) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000010c0)=ANY=[@ANYBLOB="9feb010018002100000000001c0000001c00000002000000090000100000000f0300000048c36b00000001000000ab00000000000000804623886d37608e5e95abf78003b89cac2dbe5de18d4843e4c24fe0daa385546a67054adb0d68db3392f9e2b73233b05d8a64259d0242acf3"], 0x0, 0x36}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e170000000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb9aaa57a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff559973c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511732f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db55474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a8340000000000000008029be3788dd8422b1ab7b4c9d5b7d8682fd750947109c713108e1386f5843a9ee29af30ecbeb26ff81f0921be501ade32a81aa175f4f8f117fc23b2adb38200f0f360e213534e14fae98502f92017d32f29777b6890ad5a103352dd80f036db18220932a2d26e0f9f807c4eb9ae9ba0b77c54bcf501873ce30286cdd633346bc11ed2259ab31f0bc2630a23738a646833b4d03f0028835f71cee1a5bafec9de0cfe4b5f0197fa9c7f5bcac99dbd85fb924db68d7384d4c5ab1087e4464592f278036d2b81e02a3be90a6b8757ece967569d66c8399796825e80f4dc6b3920ed9813a259de560000000000000000000000000000aeecc3447c907474d2129496fc6f6bc804965f8caaac7e2ef733f77708d618dbeae5352a5bc32d826a1b62cd698b4cfdc74ba5e8f18e808783fd5f32ef793a3069ac0906609aa9ca7dca982d6e903aea749f60beb35e2bee8eb43b8c65f4526c61281d6517f1f6e9741365acdaf8ae916575459f7d14087f826f97c94b09cd1275e576d17f76b39a6ac9e33030d67262209a52012dd9c9c60e45c51dd06ee7ba3d0c53a16070536d583ab8639d4fafe62997819033338a5ea4a5d2b61d05de4d5ad4c8dd0de3b98a1f4d6142851571b8d61715c7cb557373854f7eaf2f4e4bfd3dcb6c1d2e7b0bcb4d896092e90f95a61df4ffeeb64dee29de77fba312943bc53efb61138a5a82f7a828c04faf679edf2fa31cdfc57a2cb7ce03f3cdc40a1a20e82e54d10ce35579d7e065a8840abf4ce792ced89bd4288c8d427000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1600000000000000008400000100000010"], 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000a8f63080fdc496fa53259e3c94eae0b1d9d369be0c7be2586214bcb5"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000180), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 1m57.758050984s ago: executing program 5 (id=7796): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x33, &(0x7f0000000040), 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'team0\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x20, 0x3, 0x45, 0xfffff00d}]}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex, 0x1f, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@fallback=r3, r6, 0x1a, 0x2040, 0xffffffffffffffff, @value, @void, @void, @void, r7}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYRESHEX=r3, @ANYRESHEX=r4, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="5eeced8e46dc3f0adf33c9f7b986", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r10, &(0x7f0000000000), 0x2a979d) r11 = getpid() r12 = getpid() r13 = perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0xfd, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x0, 0x400000, 0x0, 0xfffffffffffffffe}, r12, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r11, 0x0, r13, 0x0) r14 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff0700000000000000000000850000002a00000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f80008000000b70300000000000085000000720000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1m56.69105945s ago: executing program 5 (id=7821): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000001240)=ANY=[@ANYBLOB="18000000101d9e800000000000000000850000009a0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x18000000000002a0, 0x26, 0xffffffffffffffd6, &(0x7f0000000040)="b90103600040f000009e0fa208001fffffe10100000000000000ac141411e0000601be3e7d2a", 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(0x3) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x28, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xd3f}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x41}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001200)='syzkaller\x00', 0x7fff, 0x0, &(0x7f00000012c0), 0x40f00, 0x4, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001300)={0x4, 0x2, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001340)=[r5, r1], 0x0, 0x10, 0xfffffffe}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r6, r2}, 0xc) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x22}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e00)={r8, 0x58, &(0x7f0000000d80)}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x16, 0x1e, &(0x7f0000000e40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r9, r8}, 0xc) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa9, &(0x7f0000000900)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x11, 0x25, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3bd8}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x44}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x7, 0x1000, &(0x7f0000001740)=""/4096, 0x40f00, 0x1f, '\x00', r11, 0x0, r7, 0x8, &(0x7f0000000b80)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x0, 0x4, 0x1, 0x3972}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000c00)=[r8], &(0x7f0000000c40)=[{0x5, 0x4, 0x7, 0xa}, {0x5, 0x3, 0x7, 0xb}, {0x4, 0x1, 0x6, 0xc}, {0x3, 0x5, 0xe, 0x3}], 0x10, 0x3}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x6, [@typedef={0x10}, @datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x1, 0xea, 0x7}], "b2"}, @datasec={0x9, 0x2, 0x0, 0xf, 0x3, [{0x2, 0x3, 0x7fffffff}, {0x1, 0x2, 0xf}], "e38ef6"}, @ptr={0x9, 0x0, 0x0, 0x2, 0x10001}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe}, {0xf, 0x2}, {0x8, 0x3}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5, 0x2}, {0x10, 0x4}]}, @func={0x2, 0x0, 0x0, 0xc, 0x4}, @enum={0xffffffff, 0x4, 0x0, 0x6, 0x4, [{0x5, 0xfff}, {0x9, 0x1}, {0xf, 0x80}, {0x2, 0x337}]}]}, {0x0, [0x5f, 0x3757be3f1f4a9d6c, 0x61, 0x6f]}}, &(0x7f00000003c0)=""/201, 0xee, 0xc9, 0x0, 0x4a53}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32=0x1, @ANYBLOB="ff0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x1e, 0x0, 0x1}, 0x28) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1m56.568936716s ago: executing program 5 (id=7823): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x64883, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) (async) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x40, 0x9, 0x0, 0x0, 0x0, 0x5, 0x400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x38052080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) 1m56.517029505s ago: executing program 5 (id=7824): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0xd66}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f00000000c0), 0x31}, 0x0) sendmsg$inet(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x40040) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x2, 0x0, 0x3}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x23) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000200000000000b1146503cf1972d8288be0d04b3aad0204b160e1407cceac37626d7868bb15aead10000000000000000000000000000050000004d88d0d6019d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xe8034000, 0x0, 0xffffffffffffff30, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000280)={&(0x7f0000000180), 0x6e, &(0x7f0000000200)}, 0x3) close(r5) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x18) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) write$cgroup_subtree(r6, &(0x7f0000000200)={[{0x2b, 'perf_event'}, {0x2b, 'cpu'}, {0x2d, 'freezer'}, {0x6, 'pids'}, {0x2d, 'net_cls'}]}, 0x29) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000631124000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m55.627721297s ago: executing program 5 (id=7835): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x9}, 0x0, 0xfffffffffffffbff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES8, @ANYRES32=0x0, @ANYRES32, @ANYRES8=r1], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x210000, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000001000000400000000500000041000000", @ANYRES32, @ANYBLOB="009700000000004000000000000000000000000070373fc3b6aeeccaa7e60ef8700d81a9df39f6dc5a5f8b4aed34e2a2aec3e3a28f14a34caf11b4ac77fdd8135b5f2e0f35ce295d264461012dcd47601899c0a686aaa100bdbf9748468ebc84e4e092ffcef9b2bc210135", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000040000818110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r5}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) syz_clone(0x60010000, 0x0, 0xffffffa7, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r3, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000500)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000209000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0), 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f00000002c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x8040, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xcf, 0x0, &(0x7f0000000780)="b9fd03ea4c1d95ba8cf3bd393bd7bdcfd81a4073444ee5e5d99f25e9716a3e38839380472e0ae7db16992fc0f22373ebd714c66219450a5308c12ddd823181565f288bd9fd8adac667f47af9d1efd346a6cbcd1bd6c273c8ecf1c667cfda2b2350da3316e4648e759ecd12943619ab047b20ca5905118b14a2b190f0838be6e9a302650bec2c42923be6c2261ccf5660449d7fabe39a738d4e8612ebe9046d88374539b127dd8e9f192963af46fd814f06bbb58d0db2f23f621d335a358f8ab3602fb81c94ea957edf4287aaba082e", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000200)=r9, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) socketpair(0x27, 0x800, 0xff2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) 1m55.602284552s ago: executing program 5 (id=7839): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000180), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000200)='FROZEN\x00', 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8912, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r10 = openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r10, &(0x7f00000000c0)='THAWED\x00', 0x7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) r12 = openat$cgroup_ro(r0, &(0x7f0000000ac0)='cpuacct.stat\x00', 0x0, 0x0) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r9, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x9, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="09000000e9000000008000000100000000000000", @ANYRES32, @ANYBLOB="00007b46e2621c067e8c7c76000000000000000000000000006049503c95", @ANYRES32=0x0, @ANYRES32=r12, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r15, &(0x7f0000000a00), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x15, 0x11, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000018000000000000007000000072200080900000018110000c0781fa5d56897839ff1c54387de64dcc47ab341fac59234cfad88498b929699bfc55c3c965fc4a303058497b59a02afe06d9786cdf8a4ae2a0f682d8b3234bda5772101bc934e801796d4e6f786de0bca4c72ff8bc550ab1a2db1c42443b7572e2d14797d17dcbeff4f3cbe9bab88f7f9d2f1e31ed0f6c61171095c32bfc8d83cc48808441ee021ce3cd957fdc9a79376a29c593722c1b247b04e570fb95da86012ac96ab825f455029e9ad6c2fb1dc23b5ffb2400c7accb7b57e508766598d", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000008520000004000000186a000008000000000000000800000095000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x100, 0x0, &(0x7f0000000700), 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x10, 0x0, 0x27}, 0x10, 0x0, r7, 0x3, &(0x7f0000000c40)=[r11, r12, r13, r14, r15, r4, r16], &(0x7f0000000c80)=[{0x2, 0x3, 0x1, 0xa}, {0x2, 0x3, 0x0, 0x2}, {0x3, 0x5, 0x4, 0xc}], 0x10, 0x45ab}, 0x94) 1m40.591467409s ago: executing program 33 (id=7839): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000180), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000200)='FROZEN\x00', 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8912, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r10 = openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r10, &(0x7f00000000c0)='THAWED\x00', 0x7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) r12 = openat$cgroup_ro(r0, &(0x7f0000000ac0)='cpuacct.stat\x00', 0x0, 0x0) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r9, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x9, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="09000000e9000000008000000100000000000000", @ANYRES32, @ANYBLOB="00007b46e2621c067e8c7c76000000000000000000000000006049503c95", @ANYRES32=0x0, @ANYRES32=r12, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r15, &(0x7f0000000a00), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x15, 0x11, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000018000000000000007000000072200080900000018110000c0781fa5d56897839ff1c54387de64dcc47ab341fac59234cfad88498b929699bfc55c3c965fc4a303058497b59a02afe06d9786cdf8a4ae2a0f682d8b3234bda5772101bc934e801796d4e6f786de0bca4c72ff8bc550ab1a2db1c42443b7572e2d14797d17dcbeff4f3cbe9bab88f7f9d2f1e31ed0f6c61171095c32bfc8d83cc48808441ee021ce3cd957fdc9a79376a29c593722c1b247b04e570fb95da86012ac96ab825f455029e9ad6c2fb1dc23b5ffb2400c7accb7b57e508766598d", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000008520000004000000186a000008000000000000000800000095000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x100, 0x0, &(0x7f0000000700), 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x10, 0x0, 0x27}, 0x10, 0x0, r7, 0x3, &(0x7f0000000c40)=[r11, r12, r13, r14, r15, r4, r16], &(0x7f0000000c80)=[{0x2, 0x3, 0x1, 0xa}, {0x2, 0x3, 0x0, 0x2}, {0x3, 0x5, 0x4, 0xc}], 0x10, 0x45ab}, 0x94) 10.940037015s ago: executing program 2 (id=9111): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x6, 0x2, 0x2, 0x0, 0x20f}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xd0040, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'tunl0\x00'}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xa, 0xa, 0x3, 0x9, 0x0, 0xa5, 0xa000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x0, 0x7, 0x10, 0x0, 0xfffffffffffff7e7, 0x81, 0xfff9, 0x0, 0x1, 0x0, 0xff}, 0xffffffffffffffff, 0xd, r1, 0x0) (async) r4 = perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xa, 0xa, 0x3, 0x9, 0x0, 0xa5, 0xa000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x0, 0x7, 0x10, 0x0, 0xfffffffffffff7e7, 0x81, 0xfff9, 0x0, 0x1, 0x0, 0xff}, 0xffffffffffffffff, 0xd, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x9) (async) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x9) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101d81, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r5, &(0x7f0000001b80), 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r5, &(0x7f0000001b80), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8915, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01000000000084000000840000000200000000000000000000000400000004000000080000000d00000008000004070000000b00000004000000000000000e00000000000000080000000d00000002000000ffffffff07000000020000000400000000000000050000000e0000000d000000050000000100000008000000050000000300000009000000020000007fffffff000000000000d7e6e828b34f717a3db6cd835fdc499710159de7a8b6d1eb49e57fc1c1ff7b40fb2361256faf34e11bb1f3fd6eb690962673104e47afd38fdb39f4dccc5c01f9c6a3fd4ef66b31894365f9b5d94554068fbe4142aca81c857e56d85edf881a8ddea9f57ae5f29942e1c176839ad269a931e2c1a21dbb553f416b167efa262bcbd8f93eaec2c1775bb8d45000"/306], 0x0, 0x9e, 0x0, 0x0, 0x7}, 0x28) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000600), 0x12) r8 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r8, &(0x7f0000000d00)="b095639849f2bbdeb2a32bfc01239d83bfb6ec578092e0036d5843187f6d31c9ffb300c4d647682917515db1945dc17b87d76742f16256fb62e3b47c45cbb707111ad24af59712c3f14d28fb2287026ad38f56b2b10d54edfa9057251f6419416d30820a8653531e7a958765472de8456d078cce5cd0bf0f0000000000f7ff7d3a0a605613d44a0f0cacac45f7b0a3f973c11c41ce83d7de6a5eddd09fbce06dcbdfc61f213f6004f8406707fdb3395531c14427947751cb0cdb2420c96b32eae2dc422e1e596eab9808fbd33373a4a9c0dfbb6493cf4f8e833b341cc65c89d98c3d40a92e85a59d929fb1c22e7faafeb6972783b38f7598656c580bf6eaeac1ef6a50b97766af135dcb62f8545507813c88aa0b1e07a9c4b9dc63f48e762692e146f35f8c61b26012e6bd1b3ab8706b60906970dfbcf32af31ddba985ee", 0x0, 0xa111941be34c37d0}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x4, 0x0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000500)=ANY=[@ANYBLOB="9500000000000000041500000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f7ffffff0000000007000000185300000e0000000000000000000000b7080000000000007b8af8ff00000000b7080000ad0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="000800000085000000a5000000"], &(0x7f0000000640)='GPL\x00', 0x4, 0x8b, &(0x7f0000000680)=""/139, 0x41100, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000007c0)=[{0x1, 0x3, 0xb, 0x9}, {0x1, 0x3, 0x5, 0x3}, {0x4, 0x2, 0x1, 0x2}, {0x1, 0x5, 0xe, 0x5}, {0x2, 0x4, 0xd, 0x9}, {0x0, 0x2, 0x1, 0x8}], 0x10, 0x81}, 0x94) (async) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000500)=ANY=[@ANYBLOB="9500000000000000041500000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f7ffffff0000000007000000185300000e0000000000000000000000b7080000000000007b8af8ff00000000b7080000ad0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="000800000085000000a5000000"], &(0x7f0000000640)='GPL\x00', 0x4, 0x8b, &(0x7f0000000680)=""/139, 0x41100, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000007c0)=[{0x1, 0x3, 0xb, 0x9}, {0x1, 0x3, 0x5, 0x3}, {0x4, 0x2, 0x1, 0x2}, {0x1, 0x5, 0xe, 0x5}, {0x2, 0x4, 0xd, 0x9}, {0x0, 0x2, 0x1, 0x8}], 0x10, 0x81}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x12, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000ff0f0000000000000400000018010000696c6c2500000000002020207b985c31f8bccd4d0dde1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000085200000"], &(0x7f0000000240)='GPL\x00', 0x5, 0x4b, &(0x7f00000003c0)=""/75, 0x41100, 0xe, '\x00', 0x0, @cgroup_sock_addr=0xe, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x14, 0x100}, 0x10, r11, r12, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x13, &(0x7f00000003c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @generic={0x2, 0x9, 0x5, 0x5, 0x7}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @alu={0x7, 0x0, 0xf, 0x8, 0xe, 0x20, 0x10}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000140)='syzkaller\x00', 0xfffffff9, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x2, r1, 0x8, &(0x7f0000000480)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x4}, 0x10, r11, r1, 0x2, &(0x7f0000000500)=[r5, r1], &(0x7f0000000540)=[{0x5, 0x1, 0xe}, {0x1, 0x1, 0x2, 0x4}], 0x10, 0x6}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) gettid() (async) gettid() 9.27172843s ago: executing program 2 (id=9116): syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0a00000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x40, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x3, 0xb, &(0x7f0000000640)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x7ff}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x10, &(0x7f0000000540)=ANY=[@ANYBLOB="e4ff0000009aaa00001815000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000807b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000087000000850000007d0000001845000008000000000000000000000002610700010000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r2, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r3, &(0x7f0000000980)={&(0x7f0000000680)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f00000007c0)=[{&(0x7f00000006c0)="68a4a825e677c47d0ee552147f8653897187c9d06414ee342bf38d1c93714e11d6987243b19c80b999af40fd5164974bfd997b208819b2ec17c2cf81f1208c07e6ca6a7483159846f27b7beda9113736b61adb0ac3850c6c10c1bb1d3345ec724e56dd1ff87b618bf96da998dde5481c531de6cda1bc3ce82f5e146185f4fe35f46a18e76d7e25e82d5500a5709b7247213136210ebd156ff8fd30f68225dd48c563dc53f83752b04f950ff0aa7eb9e7f65c8ba5fd0f0def040f0994a1b1c7d2b1f457d1e66521a1c088536d67035bdb77e38cb54a24753b39666b84ea97e3110dfdc63cd6aa4a3c5759f317f9d972", 0xef}, {&(0x7f00000008c0)="d97567917a96715a9a525f44e4b800bf398c5cdbf50842a0f1975f54f15c1dcd891913098fabddaeaab0cf02890c083e89528d8d72955dacef8da8eda15fd5c84000bc1c5ab3686b2c6e65bacbe3158fa3b8511fe8f028ac2220840f522eeec163fc868cdfb43c15b289d961443e6ff709d548931dbe57be3f3ea30ea0809dab9738f355bb6f0c2f6f93acaa1790c3636faeece1e5b627d15d0d6367b8bee8e2488749e3de4587329c60c8e3e0da846bc7f586c558158f8270", 0xb9}], 0x2, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xe4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x2b}, @remote}}}, @ip_tos_u8={{0x11}}], 0x68}, 0x20002000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd7}, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x21, &(0x7f0000000840), 0x4) sendmsg$sock(r7, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x81) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func_proto]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000002b80)=""/4074, 0x2a, 0xfea, 0x1}, 0x28) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000400), &(0x7f00000004c0)=r8}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 9.111913068s ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) 7.378759501s ago: executing program 2 (id=9126): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x109201, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4c, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x4b47, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0302000100"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000080), 0x8000, r5}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) 7.124228709s ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) 5.392802682s ago: executing program 2 (id=9131): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0b0000f4a5000700000001000100090000000100", @ANYRESDEC=r0, @ANYBLOB="00000000000f00000d3a00"/20, @ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES16=r0, @ANYRESHEX=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe85, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r2, 0x2000000, 0x4, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000400)={'wlan1\x00', @remote}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000400)={'wlan1\x00', @remote}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000f0000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000d000000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000277601067e026f5a06de0a6120c56667b9b637a612dd44af3bdde3a29d20c034b845228d9faf22e762d41ecab1307a8e0a0eab3d2635d433db7b7902efa33a274bd6d251fbd49555e0d035e7de8eb65d372eff60c35250d9a0d07e05a328ee330fa0b36ff44e1dc9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r4}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000011000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000011000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000640)="b9ff0300100d690b98caa58c88a86c", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000640)="b9ff0300100d690b98caa58c88a86c", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x100}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x100}) openat$cgroup_ro(r5, &(0x7f0000000040)='blkio.bfq.time\x00', 0x275a, 0x408) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r9, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 4.859169365s ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) 2.89135141s ago: executing program 0 (id=9141): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e80)={0xffffffffffffffff, &(0x7f0000000d80)="fe2b1d40da9e52b1f080e3c07aa38601722e7d9b4bcb712b34e4f2195d609da2fc2b255b6a102525959449a8900c70224c63e4c861d7d32a7dfc1f47baa41a8608fe0de2b63e8d118779a3a69119a31c71cb0c8600ee89550193364d221dd8c70563996d1332711ab3fce82ecff7c53d815ddf2cd64dac30a71d6d84fef42930b66c7a0a406830930a4103ed6be2c461f00c1cfd2ecb13ae844450c7c68d91d558a9337394ee7a62970216046b51a7c26cd4b388630d4989f806549dbad80b0269de986ffa91ce229d0f48d5bb9e87e22edf87c3f3a46e956fc5ab9b344029ee4f17248c37831f69cba989a73064", &(0x7f0000000bc0)=""/73}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x38, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b80)={0x2, 0xb, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c80)=[{0x3, 0x1, 0xa, 0x6}], 0x10, 0x2}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 2.88987437s ago: executing program 2 (id=9143): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="750a00003e0000006111680000000000180000000000010000000000000000009500000000000000df547feadb60f3ad62fb50d6e6e1f8f7ff185c6fb53bca95a0fd53d07d45414c94fc2683cbc06e03c613ecf0e91c7affdd94a4a4fc0f3d8c70ea0e41904807cf3e49e513083cf33793640297652e4ad29bfa4dd7aeca8f8e949cfffbc269a16597fe3a2bb1daa594145604dc5d013d8fd11336d14b8ed258"], &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00000000000000000300000030dc35892d23dd9a047f242a6abf8a736db6c9393aed40cb000a37ebab8eb8", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x68}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r3}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000940)={r2, &(0x7f0000000780)="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", &(0x7f0000000880)=""/168}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x4}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)='%pS \x00'}, 0x20) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xffffa8f6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x1, 0x1, 0x0, r3}], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x26, &(0x7f0000000100)=""/38, 0x41100, 0x14, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x10, 0x4, 0x101}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, r7, r8], &(0x7f00000004c0)=[{0x3, 0x3, 0x4, 0xa}, {0x1, 0x1, 0x0, 0x2}, {0x2, 0x1, 0x9, 0xb}, {0x2, 0x2, 0xd, 0x4}, {0x3, 0x5, 0x10, 0x8}], 0x10, 0x762}, 0x94) 2.889144039s ago: executing program 6 (id=9144): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x40c, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) close(0xffffffffffffffff) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={0x0}, 0x18) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="003d05000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) (rerun: 32) 2.878369717s ago: executing program 0 (id=9145): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x9, 0x41000}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x9, 0x41000}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x7, 0x10006, 0x3, 0x100}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1, 0x6, 0x9, 0x0, r2, 0x100}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1, 0x6, 0x9, 0x0, r2, 0x100}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000200), &(0x7f0000000340), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b23000000008000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b23000000008000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6337ce22060000fe0000000000000000000000a8080000000000000056a13571673fa7083671a0129d9301"], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r4, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000340)=r7) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@type_tag={0xd, 0x0, 0x0, 0x12, 0x1}, @volatile={0x6, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x30, 0x2e, 0x30]}}, &(0x7f0000000800)=""/22, 0x36, 0x16, 0x0, 0x3ff}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x0, 0x6, 0x7, 0x0, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000740)='syzkaller\x00', 0x4, 0x2b, &(0x7f0000000780)=""/43, 0x41100, 0x32, '\x00', r7, 0x0, r8, 0x8, &(0x7f0000000a40)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x9, 0x1, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r0, r2, r0, r0], 0x0, 0x10, 0x4}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x0, 0x6, 0x7, 0x0, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000740)='syzkaller\x00', 0x4, 0x2b, &(0x7f0000000780)=""/43, 0x41100, 0x32, '\x00', r7, 0x0, r8, 0x8, &(0x7f0000000a40)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x9, 0x1, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r0, r2, r0, r0], 0x0, 0x10, 0x4}, 0x94) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x2, 0xfffffffd, 0x9, 0x148, r2, 0x6, '\x00', r3, r9, 0x5, 0x4, 0x2, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r10}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r10}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 2.869056565s ago: executing program 6 (id=9146): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x2) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000100)={'veth1_to_team\x00'}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)={'a', ' *:* ', 'w\x00'}, 0x8) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000180)) socketpair(0xb, 0x5, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'lo\x00', 0x200}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip_vti0\x00', 0x8000}) recvmsg$unix(r2, &(0x7f00000014c0)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000001400)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/250, 0xfa}], 0x2, &(0x7f0000001440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x40010000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001500)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000001540)={'ipvlan1\x00'}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001580)={0x2}, 0x8) r3 = bpf$TOKEN_CREATE(0x24, &(0x7f00000015c0)={0x0, r1}, 0x8) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000016c0)={&(0x7f0000001600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x9, [@volatile={0xc}, @enum={0xa, 0x4, 0x0, 0x6, 0x4, [{0x5, 0x8}, {0x0, 0xff}, {0x9, 0x4}, {0x10, 0x5}]}]}, {0x0, [0x61, 0x61, 0x0, 0x0, 0x5f, 0x20, 0x0]}}, &(0x7f0000001680)=""/16, 0x59, 0x10, 0x0, 0x7, 0x10000, @value=r3}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001700)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, r4, 0x0, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa, &(0x7f00000017c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5a, &(0x7f0000001880)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x32, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001ac0)=@base={0x14, 0x4, 0xe069, 0x4, 0x20000, r5, 0x87b, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x9}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000001b80), 0x8) recvmsg$unix(r7, &(0x7f0000001f00)={&(0x7f0000001bc0)=@abs, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001c40)=""/102, 0x66}, {&(0x7f0000001cc0)=""/30, 0x1e}, {&(0x7f0000001d00)=""/236, 0xec}, {&(0x7f0000001e00)=""/15, 0xf}], 0x4, &(0x7f0000001e80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x12100) ioctl$TUNGETDEVNETNS(r11, 0x54e3, 0x0) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f0000001f40)={0x1, 0x3, [@multicast, @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]}) r14 = openat$cgroup_devices(r8, &(0x7f0000001f80)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r14, &(0x7f0000001fc0)={'a', ' *:* ', 'r\x00'}, 0x8) ioctl$TUNSETLINK(r11, 0x400454cd, 0xfffe) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000002140)={r13, 0x0, 0xfc, 0x0, &(0x7f0000002000)="4388c28a1b8bd248787c87742394cc17598c559b886fba08398e29db3c2a3ce5b3c4709dae36f98119cf655ad958630f879db919c175ce2b10edba661867077194320213708fe7fbf3cd1366defe45e9aed3a3aacee464a4fee3e6e7982a523855ae88305bbac46c9b82a49c6ccb9be9d0d5c797d8df7405b5e1dafc3b03403c8e85a52c3de8f4973c81369aee9a1c4d37c8c0576ce62856af250ac9eaa69502630277fd75fb1a88de456ae91b3f01d98d7d4bef797a598aa092c4dc690ca4d8cfe74d85f79da0564ecf7a41f5d8155c171089a5f8d11ecd832ac9eb18e723970b07f596d93eb5916824e44a36835b3123c88e7e2c852e0f8a977fa3", 0x0, 0x80, 0x0, 0x37, 0x0, &(0x7f0000002100)="47467af22ac372f93bab7524e103bbbf7f0d5eff32daf6eeadc67f07bf8adc4aea80b2a4f33955b0960b8632ab4522d7fa88ca12e08258", 0x0, 0x2, 0x0, 0x8000}, 0x50) ioctl$TUNSETFILTEREBPF(r10, 0x800454e1, &(0x7f00000021c0)=r12) 2.724000096s ago: executing program 6 (id=9147): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82500, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000008003}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3}]}, @ptr, @restrict={0x1, 0x0, 0x0, 0x4, 0x5}]}, {0x0, [0x2e]}}, 0x0, 0x4b}, 0x28) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.723834196s ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) 807.865192ms ago: executing program 0 (id=9148): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0xfffffffb, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071122900000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x7, 0x0, 0x0, 0x3, 0x0, 0x3fe, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/pid\x00') perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000f51f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000000085000000720000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r4}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r5, &(0x7f0000000340), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x2, 0x400, 0x24000, 0x6010, r5, 0x5, '\x00', 0x0, r2, 0x3, 0x5, 0x5, 0xd}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000008000000100000000000071120200fcffffff9500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x6, &(0x7f0000000480)=@framed={{}, [@jmp={0x5, 0x1, 0x9, 0x6, 0x9, 0x30, 0x1}, @exit, @jmp={0x5, 0x0, 0xc, 0x5, 0x4, 0x2, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 806.863061ms ago: executing program 2 (id=9150): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfe37}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x18000000000002a0, 0xe, 0xa002a0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x4000, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000008, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x5, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x0, 0x4, 0x0, 0x7, 0x2004, 0x0, 0x2000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) close(0x3) 805.635451ms ago: executing program 6 (id=9151): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7d, 0x7d, 0x6, [@restrict={0xc, 0x0, 0x0, 0xb, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x43, 0x0, 0xa}, @datasec={0xa, 0x7, 0x0, 0xf, 0x1, [{0x5, 0x6, 0x3}, {0x1, 0x4, 0x81}, {0x5, 0x3, 0x2}, {0x2, 0x4, 0x211e}, {0x2, 0x3, 0x68}, {0x4, 0x3, 0x268}, {0x2, 0x3, 0x1}], "95"}]}, {0x0, [0x30, 0x2e, 0x61, 0x4f]}}, &(0x7f0000000180)=""/76, 0x9e, 0x4c, 0x1, 0x4, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r1}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 777.079855ms ago: executing program 6 (id=9152): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="170000000000000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x33}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1d5d6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe2c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9a3359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069d532749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b87cf6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a57f810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e92604f8e86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd3536460000000000000000000000000000000000000000001e000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775aea28905c3a1ace5f05689ae67e26856816"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 711.735462ms ago: executing program 1 (id=9153): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101}, 0x50) (async) socketpair(0x2a, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r0) (async) 626.003655ms ago: executing program 6 (id=9154): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r1, 0x20, &(0x7f0000000280)={0xfffffffffffffffc, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) write$cgroup_int(r2, &(0x7f0000000380)=0x5, 0x12) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)='%+9llu \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x3}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0x7e, &(0x7f00000000c0)=""/126, 0xfff634756061ee65, 0x5, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x9, 0x5, 0x2}, 0x10, 0x0, 0x0, 0xa, &(0x7f00000002c0)=[r4], &(0x7f0000000300)=[{0x2, 0x4, 0x5, 0xc}, {0x5, 0x4, 0x7}, {0x2, 0x1, 0xd, 0x1}, {0x0, 0x2, 0x1, 0xa}, {0x1, 0x4, 0xc}, {0x2, 0x5, 0xe, 0x5}, {0x4, 0x3, 0xf, 0x6}, {0x1, 0x4, 0x4, 0xb}, {0x0, 0x1, 0x2, 0x2}, {0x3, 0x1, 0x2, 0x4}], 0x10, 0xfffffff9}, 0x94) socketpair(0x2, 0x80806, 0xbc07, &(0x7f0000001740)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x35}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu<=0||!') syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 454.274101ms ago: executing program 0 (id=9155): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000860000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000001000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0xf, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x12, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r2, 0x0, 0x2, 0x0) (async) r3 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xffffffcf, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) (async) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='+pids'], 0x6) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 373.554114ms ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) 225.241444ms ago: executing program 0 (id=9156): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="01000000080000000500000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)="7a6c1f8a34b2f141eccdb2878100fa75f2f8be50a86552c9a3038811dae57c662930e156e0e60ea3d0fece5e91f36612218c73bd3babab8724060a2945704f0333a7a61e69accd0ea2177187fdece563eea5b2f0cc3fb350ce23be42d71acaf4a23499c81c8685afa6cf42d75b5ad6b8fe4fa78f986b435c3a4691a52e4d76d36f095955f4812dde811064f64fa35f2c567f47992b0c57f09b8ebfed817dfc156ab46e5da68e166d0272c11195", &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 223.613884ms ago: executing program 1 (id=9157): bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x1, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001480)={r1, 0x0, &(0x7f00000013c0)=""/185}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x14, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) 205.765341ms ago: executing program 1 (id=9158): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x7}}]}, {0x0, [0x0, 0x2e, 0x0, 0x912e4fda4f3c3ef8, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/206, 0x38, 0xce, 0x0, 0x3, 0x10000}, 0x28) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r5) write$cgroup_devices(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="80fd"], 0xa) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x10, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x12, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x9c4e}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x20}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000700)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x2, 0x7, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r2, 0x1, r5, r0, r0, r6], 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000300)=r9) write$cgroup_devices(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 134.392806ms ago: executing program 1 (id=9159): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000400)="244ee0b5f9ad24a349838869674252c4242966066aa3d83c1938395ddac63d3edae43a", 0x23}, {&(0x7f0000000780)="b7359c36e1d9dcaf434fa8c527ef215d7fcdb5f189adf50b61e4a35411e2702ed5cc63be64bea3b78da61af5688b374b72391281025740592a92dd58d546721ab37f1fd77175a4fde8c75ead2fe08325b791c9d8d144837f7210a0878e31ea409cdeb9c473faa5f4eb05a3c9cbd7166548cb24f1e144c3a3f56c201be3261c0d86d0ce64644aee9c59fc3f813f3f58e42a259a121bfbb668f54f729d5fafeb173645414f14202c43d94e9c9952287242ec97de1aee21a00f0bf56ea4", 0xbc}], 0x2, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}], 0x20, 0x8040}, 0x40040) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x410000, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x0, 0x2, 0xb, 0xb, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000280)=[r2, r2, r2, r2, r2, r2], &(0x7f00000002c0)=[{0x4, 0x4, 0x0, 0x6}, {0x3, 0x3, 0x5, 0xb}, {0x5, 0x2, 0x4}, {0x1, 0x5, 0x0, 0x4}, {0x5, 0x5, 0x1, 0x7}, {0x1, 0x2, 0x8, 0xa}], 0x10, 0xea24}, 0x94) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000004c0)=r4) close(r2) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200008000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) (async) sendmsg$unix(r0, &(0x7f00000006c0)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000400)="244ee0b5f9ad24a349838869674252c4242966066aa3d83c1938395ddac63d3edae43a", 0x23}, {&(0x7f0000000780)="b7359c36e1d9dcaf434fa8c527ef215d7fcdb5f189adf50b61e4a35411e2702ed5cc63be64bea3b78da61af5688b374b72391281025740592a92dd58d546721ab37f1fd77175a4fde8c75ead2fe08325b791c9d8d144837f7210a0878e31ea409cdeb9c473faa5f4eb05a3c9cbd7166548cb24f1e144c3a3f56c201be3261c0d86d0ce64644aee9c59fc3f813f3f58e42a259a121bfbb668f54f729d5fafeb173645414f14202c43d94e9c9952287242ec97de1aee21a00f0bf56ea4", 0xbc}], 0x2, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}], 0x20, 0x8040}, 0x40040) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x410000, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x0, 0x2, 0xb, 0xb, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000280)=[r2, r2, r2, r2, r2, r2], &(0x7f00000002c0)=[{0x4, 0x4, 0x0, 0x6}, {0x3, 0x3, 0x5, 0xb}, {0x5, 0x2, 0x4}, {0x1, 0x5, 0x0, 0x4}, {0x5, 0x5, 0x1, 0x7}, {0x1, 0x2, 0x8, 0xa}], 0x10, 0xea24}, 0x94) (async) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000004c0)=r4) (async) close(r2) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200008000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 55.852611ms ago: executing program 1 (id=9160): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) (async, rerun: 32) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000180), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x8, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x27d}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r2, &(0x7f0000000a00), 0x0}, 0x20) (async, rerun: 64) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x8}, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff5945}, 0x0, 0x5, 0xffffffffffffffff, 0x1) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) (async) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) (async, rerun: 32) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 55.101281ms ago: executing program 0 (id=9156): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="01000000080000000500000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)="7a6c1f8a34b2f141eccdb2878100fa75f2f8be50a86552c9a3038811dae57c662930e156e0e60ea3d0fece5e91f36612218c73bd3babab8724060a2945704f0333a7a61e69accd0ea2177187fdece563eea5b2f0cc3fb350ce23be42d71acaf4a23499c81c8685afa6cf42d75b5ad6b8fe4fa78f986b435c3a4691a52e4d76d36f095955f4812dde811064f64fa35f2c567f47992b0c57f09b8ebfed817dfc156ab46e5da68e166d0272c11195", &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.40876ms ago: executing program 1 (id=9161): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113d00000000008510000002000000b70a0000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x158, 0x158, 0x3, [@enum={0x7, 0x8, 0x0, 0x6, 0x4, [{0x8, 0x7fffffff}, {0x3, 0x2}, {0x7, 0x9}, {0xb, 0x92a}, {0x4, 0x6}, {0x2, 0x8}, {0x4, 0x66e9}, {0x1, 0x5}]}, @float={0x10, 0x0, 0x0, 0x10, 0x10}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6a, 0x0, 0x7e}, @float={0x10, 0x0, 0x0, 0x10, 0xc}, @struct={0x1, 0xa, 0x0, 0x4, 0x0, 0x3, [{0xe, 0x2, 0x3ff}, {0x4, 0x1, 0x1}, {0x5, 0x2, 0x6}, {0x9, 0x0, 0x1000}, {0x9, 0x4, 0xa6}, {0x10, 0x0, 0x376}, {0x6, 0x2, 0x5}, {0x9, 0x1, 0x1ff}, {0x7, 0x5, 0x2}, {0x3, 0x5, 0x1}]}, @struct={0x8, 0x5, 0x0, 0x4, 0x1, 0x2, [{0xd, 0x1, 0x3}, {0x9, 0x1, 0x8}, {0x8, 0x4, 0x2}, {0xf, 0x3, 0x401}, {0x0, 0x0, 0xb1}]}, @ptr={0x9, 0x0, 0x0, 0x2, 0x2}, @typedef={0xe, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000380)=""/140, 0x173, 0x8c, 0x1, 0xfffffffe, 0x10000}, 0x28) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702f1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5ad6, 0x0, 0x0, 0x0, 0x4}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3a73}}, @ldst={0x0, 0x0, 0x6, 0x4, 0xa, 0xffffffffffffffe0, 0x1}, @alu={0x4, 0x1, 0x0, 0x4, 0x7, 0xfffffffffffffff0, 0xffffffffffffffff}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0xfffff203, 0xab, &(0x7f0000000140)=""/171, 0x41000, 0x4a, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x0, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000640)=[r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000680)=[{0x1, 0x1, 0xa, 0xa}, {0x5, 0x5, 0x1, 0x5}, {0x1, 0x3, 0xe, 0x9}, {0x5, 0x4, 0xd, 0xa}, {0x0, 0x2, 0xb, 0x9}], 0x10, 0x4}, 0x94) 0s ago: executing program 4 (id=9003): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x10, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x20) kernel console output (not intermixed with test programs): rog_compatibility+0x5d6/0x740 [ 37.429569][ T1267] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 e4 ae 4b 05 01 48 c7 c7 60 cf 25 85 e8 7a e3 04 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 37.489304][ T1267] RSP: 0018:ffffc90000d27448 EFLAGS: 00010246 [ 37.495534][ T1267] RAX: d5e987f23d555b00 RBX: 0000000000000001 RCX: 0000000000080000 [ 37.503651][ T1267] RDX: ffffc900014fb000 RSI: 00000000000031bc RDI: 00000000000031bd [ 37.511750][ T1267] RBP: ffffc90000d27490 R08: ffffc90000d26dc7 R09: fffff520001a4dec [ 37.519857][ T1267] R10: dffffc0000000000 R11: fffff520001a4db9 R12: ffff888119014000 [ 37.527990][ T1267] R13: 0000000000000005 R14: dffffc0000000000 R15: ffff8881263e4000 [ 37.536061][ T1267] FS: 00007f51187a16c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 37.545389][ T1267] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.552070][ T1267] CR2: 0000000100000000 CR3: 0000000125c08000 CR4: 00000000003506a0 [ 37.560153][ T1267] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.575380][ T1267] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 37.584646][ T1267] Call Trace: [ 37.588006][ T1267] ? __fdget+0x1a1/0x230 [ 37.592486][ T1267] resolve_pseudo_ldimm64+0x55e/0x1060 [ 37.598076][ T1267] ? bpf_check+0xdb10/0xdb10 [ 37.602839][ T1267] ? kvmalloc_node+0x88/0x130 [ 37.607556][ T1267] bpf_check+0x9058/0xdb10 [ 37.612095][ T1267] ? bpf_get_btf_vmlinux+0x60/0x60 [ 37.617253][ T1267] ? 0xffffffffa0028bac [ 37.621816][ T1267] ? is_bpf_text_address+0x177/0x190 [ 37.627674][ T1267] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.633578][ T1267] ? __kernel_text_address+0xa0/0x100 [ 37.639051][ T1267] ? unwind_get_return_address+0x4d/0x90 [ 37.644923][ T1267] ? stack_trace_save+0xf0/0xf0 [ 37.649852][ T1267] ? arch_stack_walk+0xee/0x140 [ 37.654936][ T1267] ? stack_trace_save+0xa6/0xf0 [ 37.659809][ T1267] ? stack_trace_snprint+0xf0/0xf0 [ 37.665214][ T1267] ? __kasan_slab_alloc+0x69/0xf0 [ 37.670236][ T1267] ? pcpu_block_update+0x3ec/0x900 [ 37.675716][ T1267] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.681164][ T1267] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.687083][ T1267] ? __kasan_kmalloc+0xec/0x110 [ 37.692108][ T1267] ? __kasan_kmalloc+0xda/0x110 [ 37.697061][ T1267] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 37.702922][ T1267] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.708461][ T1267] ? security_bpf_prog_alloc+0x62/0x90 [ 37.714217][ T1267] ? bpf_prog_load+0x9d8/0x14a0 [ 37.719934][ T1267] ? __se_sys_bpf+0x49a/0x740 [ 37.724909][ T1267] ? __x64_sys_bpf+0x7b/0x90 [ 37.729576][ T1267] ? do_syscall_64+0x31/0x40 [ 37.734425][ T1267] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.740936][ T1267] ? memset+0x35/0x40 [ 37.761424][ T1267] ? bpf_obj_name_cpy+0x193/0x1e0 [ 37.766478][ T1267] bpf_prog_load+0xfca/0x14a0 [ 37.771147][ T1267] ? map_freeze+0x320/0x320 [ 37.775733][ T1267] ? selinux_bpf+0xc7/0xf0 [ 37.780138][ T1267] ? security_bpf+0x82/0xa0 [ 37.784912][ T1267] __se_sys_bpf+0x49a/0x740 [ 37.795068][ T1267] ? __x64_sys_bpf+0x90/0x90 [ 37.799808][ T1267] ? ____fput+0x15/0x20 [ 37.804051][ T1267] ? __kasan_check_read+0x11/0x20 [ 37.809074][ T1267] __x64_sys_bpf+0x7b/0x90 [ 37.813524][ T1267] do_syscall_64+0x31/0x40 [ 37.817960][ T1267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.823898][ T1267] RIP: 0033:0x7f5119d46629 [ 37.828320][ T1267] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.848756][ T1267] RSP: 002b:00007f51187a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.864715][ T1267] RAX: ffffffffffffffda RBX: 00007f5119fbffa0 RCX: 00007f5119d46629 [ 37.879413][ T1267] RDX: 0000000000000047 RSI: 0000200000000040 RDI: 0000000000000005 [ 37.887779][ T1267] RBP: 00007f5119ddcb39 R08: 0000000000000000 R09: 0000000000000000 [ 37.896007][ T1267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.904302][ T1267] R13: 00007f5119fc0038 R14: 00007f5119fbffa0 R15: 00007ffd896a5c38 [ 37.914930][ T1267] ---[ end trace 034bfa0c420e3487 ]--- [ 38.163626][ T1291] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 38.203445][ T1295] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 38.416998][ T1297] device sit0 entered promiscuous mode [ 38.546112][ T1310] device syzkaller0 entered promiscuous mode [ 39.645043][ T1368] pimreg1: tun_chr_ioctl cmd 1074025692 [ 42.629291][ T1409] device syzkaller0 entered promiscuous mode [ 43.207121][ T24] audit: type=1400 audit(1771988024.839:136): avc: denied { append } for pid=1440 comm="syz.4.331" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 43.530019][ T1439] device wg2 entered promiscuous mode [ 48.828190][ T24] audit: type=1400 audit(1771988030.459:137): avc: denied { create } for pid=1601 comm="syz.4.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 50.889073][ T1744] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.896311][ T1744] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.952350][ T1744] device bridge_slave_1 left promiscuous mode [ 50.968874][ T1744] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.005194][ T1744] device bridge_slave_0 left promiscuous mode [ 51.012232][ T1744] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.408879][ T24] audit: type=1400 audit(1771988033.039:138): avc: denied { setattr } for pid=1787 comm="syz.0.419" path="pipe:[14602]" dev="pipefs" ino=14602 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 51.433830][ T1788] device sit0 left promiscuous mode [ 51.491622][ T1802] syz.0.425[1802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.491712][ T1802] syz.0.425[1802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.575051][ T24] audit: type=1400 audit(1771988033.209:139): avc: denied { create } for pid=1804 comm="syz.4.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 51.577704][ T1805] -: renamed from syzkaller0 [ 52.236115][ T1850] device syzkaller0 entered promiscuous mode [ 52.250627][ T24] audit: type=1400 audit(1771988033.879:140): avc: denied { create } for pid=1849 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 52.913832][ T1872] device pim6reg1 entered promiscuous mode [ 53.278842][ T24] audit: type=1400 audit(1771988034.909:141): avc: denied { create } for pid=1897 comm="syz.3.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 53.589911][ T24] audit: type=1400 audit(1771988035.219:142): avc: denied { attach_queue } for pid=1929 comm="syz.4.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 54.000398][ T1965] -1: renamed from syzkaller0 [ 54.176076][ T1972] device syzkaller0 entered promiscuous mode [ 54.222700][ T1987] device syzkaller0 entered promiscuous mode [ 54.954496][ T2054] batadv0: tun_chr_ioctl cmd 1074025677 [ 54.960085][ T2054] batadv0: linktype set to 776 [ 57.490429][ T24] audit: type=1400 audit(1771988039.119:143): avc: denied { create } for pid=2184 comm="syz.1.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 57.684084][ T24] audit: type=1400 audit(1771988039.319:144): avc: denied { create } for pid=2205 comm="syz.3.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 57.786318][ T24] audit: type=1400 audit(1771988039.419:145): avc: denied { create } for pid=2219 comm="syz.0.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 58.715803][ T2271] device syzkaller0 entered promiscuous mode [ 58.890727][ T2280] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 59.743367][ T24] audit: type=1400 audit(1771988041.379:146): avc: denied { read write } for pid=2339 comm="syz.3.582" name="cgroup.subtree_control" dev="cgroup2" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 59.783513][ T24] audit: type=1400 audit(1771988041.379:147): avc: denied { open } for pid=2339 comm="syz.3.582" path="" dev="cgroup2" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 59.813612][ T24] audit: type=1400 audit(1771988041.409:148): avc: denied { write } for pid=2339 comm="syz.3.582" name="cgroup.subtree_control" dev="cgroup2" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 59.936689][ T24] audit: type=1400 audit(1771988041.459:149): avc: denied { open } for pid=2339 comm="syz.3.582" path="" dev="cgroup2" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.382861][ T24] audit: type=1400 audit(1771988042.019:150): avc: denied { create } for pid=2365 comm="syz.4.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 60.964269][ T2375] device syzkaller0 entered promiscuous mode [ 61.316189][ T2400] device syzkaller0 entered promiscuous mode [ 63.189915][ T2530] device syzkaller0 entered promiscuous mode [ 63.215044][ T2538] device macsec0 entered promiscuous mode [ 64.325267][ T2637] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 64.351733][ T2630] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.366015][ T2630] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.559339][ T2636] device bridge_slave_1 left promiscuous mode [ 64.582739][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.594190][ T2636] device bridge_slave_0 left promiscuous mode [ 64.600539][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.853295][ T24] audit: type=1400 audit(1771988046.489:151): avc: denied { create } for pid=2652 comm="syz.3.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 65.158080][ T24] audit: type=1400 audit(1771988046.789:152): avc: denied { create } for pid=2692 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 66.010123][ T24] audit: type=1400 audit(1771988047.639:153): avc: denied { ioctl } for pid=2737 comm="syz.1.695" path="pid:[4026532281]" dev="nsfs" ino=4026532281 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.148945][ T2738] tap0: tun_chr_ioctl cmd 1074025677 [ 66.162639][ T2738] tap0: linktype set to 780 [ 66.287168][ T2758] device syzkaller0 entered promiscuous mode [ 66.668968][ T2778] device veth1_macvtap left promiscuous mode [ 66.713028][ T24] audit: type=1400 audit(1771988048.349:154): avc: denied { create } for pid=2777 comm="syz.3.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 66.826525][ T24] audit: type=1400 audit(1771988048.459:155): avc: denied { create } for pid=2803 comm="syz.2.713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 66.875122][ T2800] device syzkaller0 entered promiscuous mode [ 68.197738][ T2879] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 68.212884][ T2879] syzkaller0: persist disabled [ 68.239348][ T2879] device bridge_slave_0 entered promiscuous mode [ 69.105131][ T2939] syz.4.743[2939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.105200][ T2939] syz.4.743[2939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.479495][ T3001] device syzkaller0 entered promiscuous mode [ 70.616356][ T3015] device syzkaller0 entered promiscuous mode [ 70.953106][ T3023] device wg2 entered promiscuous mode [ 71.135480][ T3039] device syzkaller0 entered promiscuous mode [ 71.142983][ T3039] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 71.190165][ T3049] device pim6reg1 entered promiscuous mode [ 72.447089][ T3161] device syzkaller0 entered promiscuous mode [ 73.448544][ T3209] syz.2.816[3209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.448612][ T3209] syz.2.816[3209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.140987][ T3269] syz.3.835[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.157118][ T3269] syz.3.835[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.280256][ T3293] device sit0 entered promiscuous mode [ 74.619078][ T3296] device syzkaller0 entered promiscuous mode [ 75.282774][ T24] audit: type=1400 audit(1771988056.919:156): avc: denied { create } for pid=3363 comm="syz.0.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 75.496402][ T3373] device syzkaller0 entered promiscuous mode [ 75.768158][ T3396] device syzkaller0 entered promiscuous mode [ 76.965763][ T24] audit: type=1400 audit(1771988058.599:157): avc: denied { create } for pid=3466 comm="syz.4.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 76.966202][ T3467] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 77.034806][ T3473] device wg2 left promiscuous mode [ 77.224977][ T3494] device veth1_macvtap left promiscuous mode [ 77.270138][ T3499] device syzkaller0 entered promiscuous mode [ 77.375526][ T3506] syz.2.906 (3506) used obsolete PPPIOCDETACH ioctl [ 77.516338][ T3504] device veth1_macvtap entered promiscuous mode [ 77.532044][ T3504] device macsec0 entered promiscuous mode [ 77.923407][ T3535] device macsec0 entered promiscuous mode [ 78.219268][ T3557] device syzkaller0 entered promiscuous mode [ 78.755872][ T24] audit: type=1400 audit(1771988060.389:158): avc: denied { create } for pid=3585 comm="syz.2.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 80.257859][ T3683] device syzkaller0 entered promiscuous mode [ 81.003841][ T3709] device wg2 entered promiscuous mode [ 81.589304][ T3757] device syzkaller0 entered promiscuous mode [ 83.599168][ T3876] device syzkaller0 entered promiscuous mode [ 83.653287][ T3878] syz.4.1015 uses obsolete (PF_INET,SOCK_PACKET) [ 85.613009][ T3964] device syzkaller0 entered promiscuous mode [ 87.244771][ T4032] device syzkaller0 entered promiscuous mode [ 87.387728][ T4079] device syzkaller0 entered promiscuous mode [ 87.594054][ T4094] tap0: tun_chr_ioctl cmd 1074025677 [ 87.611563][ T4094] tap0: linktype set to 774 [ 88.156407][ T4121] device syzkaller0 entered promiscuous mode [ 88.627304][ T24] audit: type=1400 audit(1771988070.259:159): avc: denied { create } for pid=4140 comm="syz.2.1095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 90.457774][ T4221] device syzkaller0 entered promiscuous mode [ 92.591599][ T4282] : renamed from bond_slave_0 [ 92.683967][ T4316] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 93.224379][ T4366] device veth1_macvtap left promiscuous mode [ 93.232087][ T4367] device veth1_macvtap entered promiscuous mode [ 93.244146][ T4367] device macsec0 entered promiscuous mode [ 93.306038][ T4373] device syzkaller0 entered promiscuous mode [ 94.317984][ T24] audit: type=1400 audit(1771988075.949:160): avc: denied { create } for pid=4433 comm="syz.3.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 96.477123][ T24] audit: type=1400 audit(1771988078.109:161): avc: denied { create } for pid=4484 comm="syz.3.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 98.005462][ T24] audit: type=1400 audit(1771988079.639:162): avc: denied { read } for pid=4517 comm="syz.2.1206" dev="nsfs" ino=4026533112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.033482][ T24] audit: type=1400 audit(1771988079.639:163): avc: denied { open } for pid=4517 comm="syz.2.1206" path="mnt:[4026533112]" dev="nsfs" ino=4026533112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.361699][ T4547] device pim6reg1 entered promiscuous mode [ 99.510099][ T24] audit: type=1400 audit(1771988081.129:164): avc: denied { ioctl } for pid=4618 comm="syz.2.1236" path="cgroup:[4026533113]" dev="nsfs" ino=4026533113 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.367152][ T4647] : renamed from pim6reg1 [ 101.183843][ T4712] device syzkaller0 entered promiscuous mode [ 104.725945][ T4821] device syzkaller0 entered promiscuous mode [ 105.060026][ T4839] device syzkaller0 entered promiscuous mode [ 106.731345][ T4900] sock: sock_set_timeout: `syz.4.1315' (pid 4900) tries to set negative timeout [ 109.121618][ T4999] device syzkaller0 entered promiscuous mode [ 110.062322][ T24] audit: type=1400 audit(1771988091.699:165): avc: denied { create } for pid=5055 comm="syz.1.1361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.751164][ T5271] device syzkaller0 entered promiscuous mode [ 114.576107][ T5329] device pim6reg1 entered promiscuous mode [ 115.223162][ T5330] : renamed from vlan1 [ 115.785824][ T5355] device syzkaller0 entered promiscuous mode [ 115.803393][ T24] audit: type=1400 audit(1771988097.439:166): avc: denied { create } for pid=5364 comm="syz.4.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 116.029908][ T5380] device veth1_macvtap left promiscuous mode [ 116.038353][ T5380] device macsec0 left promiscuous mode [ 122.562357][ T5721] device dummy0 entered promiscuous mode [ 124.067607][ T5811] device syzkaller0 entered promiscuous mode [ 125.929101][ T5906] device wg2 left promiscuous mode [ 125.975635][ T5903] device syzkaller0 entered promiscuous mode [ 125.985068][ T5907] device syzkaller0 entered promiscuous mode [ 125.996349][ T5906] device wg2 entered promiscuous mode [ 126.425419][ T5948] syz.1.1625[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.425507][ T5948] syz.1.1625[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.708764][ T5958] device sit0 entered promiscuous mode [ 128.412575][ T6044] device syzkaller0 entered promiscuous mode [ 130.331729][ T6105] device syzkaller0 entered promiscuous mode [ 131.538086][ T6159] device syzkaller0 entered promiscuous mode [ 132.354434][ T6201] device wg2 entered promiscuous mode [ 133.799399][ T6240] device veth1_macvtap left promiscuous mode [ 133.806292][ T6240] device macsec0 left promiscuous mode [ 133.849773][ T6246] device veth1_macvtap entered promiscuous mode [ 133.870626][ T6246] device macsec0 entered promiscuous mode [ 134.493616][ T6292] device syzkaller0 entered promiscuous mode [ 134.571038][ T6295] device veth1_macvtap left promiscuous mode [ 134.898712][ T6319] device pim6reg1 entered promiscuous mode [ 135.999078][ T6405] device sit0 left promiscuous mode [ 136.037375][ T6406] device sit0 entered promiscuous mode [ 136.251601][ T24] audit: type=1400 audit(1771988117.879:167): avc: denied { create } for pid=6430 comm="syz.1.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 136.945150][ T6454] device macsec0 entered promiscuous mode [ 137.463466][ T6470] device syzkaller0 entered promiscuous mode [ 137.626890][ T6491] caif0: tun_chr_ioctl cmd 2147767517 [ 137.696899][ T6500] device syzkaller0 entered promiscuous mode [ 137.939206][ T6517] bridge0: port 3(gretap0) entered blocking state [ 137.954634][ T6517] bridge0: port 3(gretap0) entered disabled state [ 138.001601][ T6517] device gretap0 entered promiscuous mode [ 138.367444][ T6560] device syzkaller0 entered promiscuous mode [ 140.767710][ T6617] device veth1_macvtap left promiscuous mode [ 140.802501][ T6617] device macsec0 left promiscuous mode [ 141.003697][ T24] audit: type=1400 audit(1771988122.639:168): avc: denied { setattr } for pid=6628 comm="syz.3.1824" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 141.271222][ T6653] syz.0.1832[6653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.271656][ T6653] syz.0.1832[6653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.350621][ T6662] : renamed from bond_slave_0 [ 141.460442][ T6665] device syzkaller0 entered promiscuous mode [ 141.915590][ T6719] device gretap0 left promiscuous mode [ 141.939589][ T6719] bridge0: port 3(gretap0) entered disabled state [ 141.974856][ T6719] device bridge_slave_1 left promiscuous mode [ 142.013490][ T6719] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.053560][ T6719] device bridge_slave_0 left promiscuous mode [ 142.059737][ T6719] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.003676][ T6805] syz.3.1876[6805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.003769][ T6805] syz.3.1876[6805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.815412][ T6821] device syzkaller0 entered promiscuous mode [ 145.190258][ T6842] device syzkaller0 entered promiscuous mode [ 146.287321][ T6898] device syzkaller0 entered promiscuous mode [ 147.623852][ T6929] device syzkaller0 entered promiscuous mode [ 150.094039][ T6978] device bridge_slave_0 entered promiscuous mode [ 150.700741][ T7000] device wg2 left promiscuous mode [ 150.817750][ T7002] device wg2 entered promiscuous mode [ 150.959456][ T7020] device syzkaller0 entered promiscuous mode [ 152.704883][ T7046] tap0: tun_chr_ioctl cmd 1074025677 [ 152.715419][ T7046] tap0: linktype set to 270 [ 153.750977][ T7098] sock: sock_set_timeout: `syz.3.1956' (pid 7098) tries to set negative timeout [ 154.397006][ T7104] device syzkaller0 entered promiscuous mode [ 154.572676][ T7103] device syzkaller0 entered promiscuous mode [ 157.669261][ T7205] device sit0 entered promiscuous mode [ 159.688931][ T7313] device syzkaller0 entered promiscuous mode [ 159.843335][ T7336] device syzkaller0 entered promiscuous mode [ 160.039005][ T7349] syz.2.2033[7349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.039093][ T7349] syz.2.2033[7349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.746083][ T7364] device syzkaller0 entered promiscuous mode [ 160.791957][ T7364] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 160.799304][ T7364] syzkaller0: Linktype set failed because interface is up [ 160.816240][ T7363] syzkaller0: delete flow: hash 1252186342 index 2 [ 160.860970][ T7373] device syzkaller0 entered promiscuous mode [ 160.877484][ T7373] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 160.952458][ T7380] device syzkaller0 entered promiscuous mode [ 161.476543][ T7438] device syzkaller0 entered promiscuous mode [ 161.517839][ T7436] device syzkaller0 entered promiscuous mode [ 162.094831][ T7455] device syzkaller0 entered promiscuous mode [ 162.129987][ T7471] device syzkaller0 entered promiscuous mode [ 162.250426][ T7480] device syzkaller0 entered promiscuous mode [ 162.876156][ T7521] device syzkaller0 entered promiscuous mode [ 165.379455][ T7607] device syzkaller0 entered promiscuous mode [ 166.348388][ T7652] device syzkaller0 entered promiscuous mode [ 166.876155][ T7684] device aaaaaaaaaaaaaaa entered promiscuous mode [ 166.958369][ T7692] FAULT_INJECTION: forcing a failure. [ 166.958369][ T7692] name failslab, interval 1, probability 0, space 0, times 1 [ 166.974403][ T7692] CPU: 0 PID: 7692 Comm: syz.1.2137 Tainted: G W syzkaller #0 [ 166.983250][ T7692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 166.993306][ T7692] Call Trace: [ 166.996599][ T7692] __dump_stack+0x21/0x24 [ 167.000904][ T7692] dump_stack_lvl+0x1a7/0x208 [ 167.005563][ T7692] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 167.011696][ T7692] ? show_regs_print_info+0x18/0x18 [ 167.016871][ T7692] dump_stack+0x15/0x1c [ 167.021003][ T7692] should_fail+0x3c1/0x510 [ 167.025396][ T7692] ? __get_vm_area_node+0x113/0x450 [ 167.030571][ T7692] __should_failslab+0xa4/0xe0 [ 167.035309][ T7692] should_failslab+0x9/0x20 [ 167.039788][ T7692] kmem_cache_alloc_trace+0x3a/0x2e0 [ 167.045045][ T7692] __get_vm_area_node+0x113/0x450 [ 167.050047][ T7692] __vmalloc_node_range+0xe0/0x790 [ 167.055136][ T7692] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.060652][ T7692] ? __irq_exit_rcu+0x40/0x150 [ 167.065472][ T7692] ? irq_exit_rcu+0x9/0x10 [ 167.069860][ T7692] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.075379][ T7692] __vmalloc+0x79/0x90 [ 167.079419][ T7692] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.084935][ T7692] bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.090306][ T7692] ? bpf_prog_alloc+0x17/0x1f0 [ 167.095129][ T7692] bpf_prog_alloc+0x21/0x1f0 [ 167.099705][ T7692] bpf_prog_load+0x7c4/0x14a0 [ 167.104356][ T7692] ? map_freeze+0x320/0x320 [ 167.108832][ T7692] ? __irq_exit_rcu+0x40/0x150 [ 167.113591][ T7692] ? selinux_bpf+0xc7/0xf0 [ 167.117993][ T7692] ? security_bpf+0x82/0xa0 [ 167.122478][ T7692] __se_sys_bpf+0x49a/0x740 [ 167.126969][ T7692] ? __x64_sys_bpf+0x90/0x90 [ 167.131548][ T7692] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 167.137619][ T7692] ? debug_smp_processor_id+0x17/0x20 [ 167.142974][ T7692] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 167.149038][ T7692] __x64_sys_bpf+0x7b/0x90 [ 167.153438][ T7692] do_syscall_64+0x31/0x40 [ 167.157836][ T7692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.163709][ T7692] RIP: 0033:0x7f5119d46629 [ 167.168127][ T7692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 167.187713][ T7692] RSP: 002b:00007f51187a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.196133][ T7692] RAX: ffffffffffffffda RBX: 00007f5119fbffa0 RCX: 00007f5119d46629 [ 167.204083][ T7692] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 167.212036][ T7692] RBP: 00007f51187a1090 R08: 0000000000000000 R09: 0000000000000000 [ 167.220088][ T7692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.228042][ T7692] R13: 00007f5119fc0038 R14: 00007f5119fbffa0 R15: 00007ffd896a5c38 [ 167.257530][ T7694] device syzkaller0 entered promiscuous mode [ 167.261456][ T7692] syz.1.2137: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 167.281555][ T7692] CPU: 1 PID: 7692 Comm: syz.1.2137 Tainted: G W syzkaller #0 [ 167.290317][ T7692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 167.300472][ T7692] Call Trace: [ 167.303837][ T7692] __dump_stack+0x21/0x24 [ 167.308140][ T7692] dump_stack_lvl+0x1a7/0x208 [ 167.312795][ T7692] ? show_regs_print_info+0x18/0x18 [ 167.317968][ T7692] ? pr_cont_kernfs_name+0xe3/0xf0 [ 167.323053][ T7692] dump_stack+0x15/0x1c [ 167.327194][ T7692] warn_alloc+0x1dc/0x200 [ 167.331502][ T7692] ? debug_smp_processor_id+0x17/0x20 [ 167.337109][ T7692] ? perf_trace_kmem_alloc+0x4b/0x140 [ 167.342458][ T7692] ? zone_watermark_ok_safe+0x250/0x250 [ 167.347978][ T7692] ? __get_vm_area_node+0x345/0x450 [ 167.353157][ T7692] __vmalloc_node_range+0x27d/0x790 [ 167.358335][ T7692] ? __irq_exit_rcu+0x40/0x150 [ 167.363071][ T7692] ? irq_exit_rcu+0x9/0x10 [ 167.367458][ T7692] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.372972][ T7692] __vmalloc+0x79/0x90 [ 167.377011][ T7692] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.382525][ T7692] bpf_prog_alloc_no_stats+0x3b/0x250 [ 167.387869][ T7692] ? bpf_prog_alloc+0x17/0x1f0 [ 167.392602][ T7692] bpf_prog_alloc+0x21/0x1f0 [ 167.397169][ T7692] bpf_prog_load+0x7c4/0x14a0 [ 167.401821][ T7692] ? map_freeze+0x320/0x320 [ 167.406313][ T7692] ? __irq_exit_rcu+0x40/0x150 [ 167.411061][ T7692] ? selinux_bpf+0xc7/0xf0 [ 167.415460][ T7692] ? security_bpf+0x82/0xa0 [ 167.419946][ T7692] __se_sys_bpf+0x49a/0x740 [ 167.424432][ T7692] ? __x64_sys_bpf+0x90/0x90 [ 167.429002][ T7692] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 167.435048][ T7692] ? debug_smp_processor_id+0x17/0x20 [ 167.440394][ T7692] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 167.446428][ T7692] __x64_sys_bpf+0x7b/0x90 [ 167.450816][ T7692] do_syscall_64+0x31/0x40 [ 167.455217][ T7692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.461078][ T7692] RIP: 0033:0x7f5119d46629 [ 167.465466][ T7692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 167.485050][ T7692] RSP: 002b:00007f51187a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.493438][ T7692] RAX: ffffffffffffffda RBX: 00007f5119fbffa0 RCX: 00007f5119d46629 [ 167.501384][ T7692] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 167.509324][ T7692] RBP: 00007f51187a1090 R08: 0000000000000000 R09: 0000000000000000 [ 167.517273][ T7692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.525257][ T7692] R13: 00007f5119fc0038 R14: 00007f5119fbffa0 R15: 00007ffd896a5c38 [ 167.549473][ T7692] Mem-Info: [ 167.563123][ T7692] active_anon:35 inactive_anon:16677 isolated_anon:0 [ 167.563123][ T7692] active_file:23187 inactive_file:3113 isolated_file:0 [ 167.563123][ T7692] unevictable:0 dirty:133 writeback:0 [ 167.563123][ T7692] slab_reclaimable:7328 slab_unreclaimable:79472 [ 167.563123][ T7692] mapped:29447 shmem:162 pagetables:656 bounce:0 [ 167.563123][ T7692] free:1546816 free_pcp:874 free_cma:0 [ 167.721623][ T7692] Node 0 active_anon:140kB inactive_anon:66608kB active_file:92748kB inactive_file:12452kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117788kB dirty:532kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7936kB all_unreclaimable? no [ 167.795431][ T7692] DMA32 free:2985148kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1384kB local_pcp:52kB free_cma:0kB [ 167.825473][ T7692] lowmem_reserve[]: 0 3941 3941 [ 167.831453][ T7692] Normal free:3202124kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:140kB inactive_anon:66708kB active_file:92748kB inactive_file:12452kB unevictable:0kB writepending:532kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2772kB bounce:0kB free_pcp:1332kB local_pcp:412kB free_cma:0kB [ 167.862659][ T7692] lowmem_reserve[]: 0 0 0 [ 167.867071][ T7692] DMA32: 5*4kB (UM) 3*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 7*256kB (UM) 6*512kB (M) 5*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2985148kB [ 167.883309][ T7692] Normal: 927*4kB (UME) 784*8kB (UME) 993*16kB (UME) 727*32kB (UME) 261*64kB (UME) 133*128kB (UM) 107*256kB (UM) 47*512kB (UM) 10*1024kB (UM) 5*2048kB (ME) 744*4096kB (M) = 3202220kB [ 167.901449][ T7692] 26462 total pagecache pages [ 167.906210][ T7692] 0 pages in swap cache [ 167.918444][ T7692] Swap cache stats: add 0, delete 0, find 0/0 [ 167.926125][ T7692] Free swap = 124996kB [ 167.931303][ T7692] Total swap = 124996kB [ 167.935591][ T7692] 2097051 pages RAM [ 167.939462][ T7692] 0 pages HighMem/MovableOnly [ 167.944322][ T7692] 341390 pages reserved [ 167.948591][ T7692] 0 pages cma reserved [ 168.460241][ T7715] cgroup: fork rejected by pids controller in /syz3 [ 168.834474][ T7820] device sit0 left promiscuous mode [ 168.850906][ T7820] device sit0 entered promiscuous mode [ 169.068880][ T7849] tap2: tun_chr_ioctl cmd 1074025677 [ 169.079630][ T7849] tap2: linktype set to 769 [ 169.333941][ T7870] device syzkaller0 entered promiscuous mode [ 169.519222][ T7900] device sit0 left promiscuous mode [ 169.564939][ T7900] device sit0 entered promiscuous mode [ 169.938551][ T7922] device syzkaller0 entered promiscuous mode [ 170.581463][ T7946] device syzkaller0 entered promiscuous mode [ 170.612511][ T7948] -: renamed from syzkaller0 [ 171.959483][ T7992] device wg2 left promiscuous mode [ 171.979306][ T7992] device wg2 entered promiscuous mode [ 172.053012][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 173.023940][ T24] audit: type=1400 audit(1771988154.659:169): avc: denied { create } for pid=8072 comm="syz.2.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 173.082022][ T8075] device syzkaller0 entered promiscuous mode [ 173.120624][ T8077] syzkaller0: tun_net_xmit 1280 [ 173.293831][ T8083] syz.4.2245[8083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.293905][ T8083] syz.4.2245[8083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.186437][ T8107] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 174.303417][ T8107] device syzkaller0 entered promiscuous mode [ 175.482579][ T8169] device sit0 left promiscuous mode [ 175.513790][ T8169] device sit0 entered promiscuous mode [ 176.474523][ T8223] device syzkaller0 entered promiscuous mode [ 176.553214][ T8230] device pim6reg1 entered promiscuous mode [ 177.713502][ T8299] device syzkaller0 entered promiscuous mode [ 179.272234][ T24] audit: type=1400 audit(1771988160.879:170): avc: denied { read } for pid=8387 comm="syz.3.2330" name="cgroup.subtree_control" dev="cgroup2" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 179.558688][ T8399] device pim6reg1 entered promiscuous mode [ 181.584283][ T8466] device syzkaller0 entered promiscuous mode [ 183.168752][ T8561] device syzkaller0 entered promiscuous mode [ 184.181088][ T8646] device syzkaller0 entered promiscuous mode [ 184.454977][ T8669] syz.1.2414[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.455074][ T8669] syz.1.2414[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.902701][ T8685] device syzkaller0 entered promiscuous mode [ 185.362256][ T8721] device pim6reg1 entered promiscuous mode [ 186.066457][ T8753] device syzkaller0 entered promiscuous mode [ 187.412825][ T8796] device lo entered promiscuous mode [ 187.456302][ T8798] device syzkaller0 entered promiscuous mode [ 188.214029][ T8858] device syzkaller0 entered promiscuous mode [ 188.470669][ T8879] syzkaller1: tun_chr_ioctl cmd 21731 [ 188.506246][ T8879] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 188.724181][ T8915] device syzkaller0 entered promiscuous mode [ 190.512769][ T8986] device syzkaller0 entered promiscuous mode [ 190.681961][ T9006] device syzkaller0 entered promiscuous mode [ 190.772584][ T9014] device syzkaller0 entered promiscuous mode [ 192.631159][ T9122] device syzkaller0 entered promiscuous mode [ 193.655597][ T9164] device pim6reg1 entered promiscuous mode [ 194.219111][ T9170] device syzkaller0 entered promiscuous mode [ 194.564412][ T9202] device syzkaller0 entered promiscuous mode [ 194.771094][ T9204] device wg2 left promiscuous mode [ 195.069245][ T9208] device wg2 entered promiscuous mode [ 197.174100][ T9306] syz.3.2590[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.174202][ T9306] syz.3.2590[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.542541][ T9320] device wg2 left promiscuous mode [ 197.965400][ T9325] device wg2 entered promiscuous mode [ 198.629675][ T9394] : port 1(ip6gretap0) entered blocking state [ 198.636995][ T9394] : port 1(ip6gretap0) entered disabled state [ 198.643887][ T9394] device ip6gretap0 entered promiscuous mode [ 198.661045][ T9386] device ip6gretap0 left promiscuous mode [ 198.669828][ T9386] : port 1(ip6gretap0) entered disabled state [ 199.046308][ T9424] device syzkaller0 entered promiscuous mode [ 199.143460][ T9426] device syzkaller0 entered promiscuous mode [ 199.450682][ T9446] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 199.636729][ T9481] device syzkaller0 entered promiscuous mode [ 201.615190][ T9581] device syzkaller0 entered promiscuous mode [ 201.736314][ T9586] -1: renamed from syzkaller0 [ 201.997803][ T9582] device syzkaller0 entered promiscuous mode [ 202.039226][ T9581] device syzkaller0 left promiscuous mode [ 202.277187][ T9613] syz.0.2678[9613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.277250][ T9613] syz.0.2678[9613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.483291][ T9626] device sit0 left promiscuous mode [ 202.593854][ T9637] device syzkaller0 entered promiscuous mode [ 202.672259][ T9647] device syzkaller0 entered promiscuous mode [ 203.192194][ T9672] device syzkaller0 entered promiscuous mode [ 203.777544][ T9697] device sit0 entered promiscuous mode [ 204.514396][ T9729] device bridge_slave_0 left promiscuous mode [ 204.594871][ T9732] device bridge_slave_0 entered promiscuous mode [ 205.180074][ T9740] device syzkaller0 entered promiscuous mode [ 205.358317][ T9757] device syzkaller0 entered promiscuous mode [ 206.230390][ T9838] device syzkaller0 entered promiscuous mode [ 206.492745][ T9863] cgroup: fork rejected by pids controller in /syz0 [ 206.505164][ T9865] device syzkaller0 entered promiscuous mode [ 207.066147][ T9995] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.078174][ T9995] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.103852][ T9995] device bridge_slave_0 entered promiscuous mode [ 207.119571][ T9995] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.129616][ T9995] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.144296][ T9995] device bridge_slave_1 entered promiscuous mode [ 207.233712][ T9995] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.240862][ T9995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.248232][ T9995] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.255259][ T9995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.321461][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.332460][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.341539][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.415049][T10026] device veth0_vlan left promiscuous mode [ 207.461891][T10026] device veth0_vlan entered promiscuous mode [ 207.581443][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.589879][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.599031][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.608393][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.618080][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.626841][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.637835][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.646703][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.655345][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.694251][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 207.703920][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.722289][ T9995] device veth0_vlan entered promiscuous mode [ 207.740855][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.749584][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.757384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.766350][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.776804][ T9995] device veth1_macvtap entered promiscuous mode [ 207.839638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.850789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.870524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.942953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.962512][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.985964][T10048] device syzkaller0 entered promiscuous mode [ 208.010429][ T5] syzkaller0: tun_net_xmit 48 [ 208.034993][T10051] syzkaller0: create flow: hash 2312641773 index 2 [ 208.203947][T10051] syzkaller0: delete flow: hash 2312641773 index 2 [ 210.208753][T10117] device syzkaller0 entered promiscuous mode [ 210.708205][T10166] device syzkaller0 entered promiscuous mode [ 210.893308][T10193] device syzkaller0 entered promiscuous mode [ 213.012572][ T112] device veth1_macvtap left promiscuous mode [ 213.018813][ T112] device veth0_vlan left promiscuous mode [ 213.314949][T10277] device syzkaller0 entered promiscuous mode [ 214.183576][T10317] syzkaller0: refused to change device tx_queue_len [ 214.573197][T10337] : renamed from vlan0 [ 216.982781][T10500] device syzkaller0 entered promiscuous mode [ 217.311608][T10521] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.318760][T10521] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.326388][T10521] device bridge_slave_0 entered promiscuous mode [ 217.333513][T10521] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.340607][T10521] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.348186][T10521] device bridge_slave_1 entered promiscuous mode [ 217.406308][T10521] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.413387][T10521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.420677][T10521] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.427774][T10521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.452128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.482736][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.490154][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.562957][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.571849][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.578981][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.592605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.602679][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.609741][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.627890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.644716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.659799][T10521] device veth0_vlan entered promiscuous mode [ 217.667435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.676669][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.685674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.694059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.757224][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.767027][T10521] device veth1_macvtap entered promiscuous mode [ 217.778474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.849591][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.354076][T10644] device macsec0 left promiscuous mode [ 220.495786][T10645] device syzkaller0 entered promiscuous mode [ 220.535943][T10644] device veth1_macvtap entered promiscuous mode [ 220.554106][T10644] device macsec0 entered promiscuous mode [ 220.560513][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.968237][ T112] device veth0_vlan left promiscuous mode [ 222.118916][T10759] cgroup: fork rejected by pids controller in /syz4 [ 222.251675][T10787] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.258721][T10787] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.266381][T10787] device bridge_slave_0 entered promiscuous mode [ 222.275696][T10787] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.283705][T10787] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.291621][T10787] device bridge_slave_1 entered promiscuous mode [ 222.402444][T10787] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.409485][T10787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.416776][T10787] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.423813][T10787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.469048][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.477508][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.491061][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.503399][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.532783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.543693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.582740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.591970][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.600457][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.608733][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.616841][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.624575][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.639624][T10796] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.646702][T10796] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.654123][T10796] device bridge_slave_0 entered promiscuous mode [ 222.681415][T10787] device veth0_vlan entered promiscuous mode [ 222.688043][T10796] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.698229][T10796] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.770917][T10796] device bridge_slave_1 entered promiscuous mode [ 222.943208][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.970350][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.084542][T10787] device veth1_macvtap entered promiscuous mode [ 223.131381][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.139456][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.148217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.157211][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.166146][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.282738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.303592][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.314289][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.321379][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.353201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.369184][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.380160][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.387235][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.459293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.481921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.568734][T10796] device veth0_vlan entered promiscuous mode [ 223.581737][T10827] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.596552][T10827] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.857415][T10833] IPv6: pim6reg1: Disabled Multicast RS [ 223.870820][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.879732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.888220][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.895961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.950656][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 223.975744][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.218093][T10796] device veth1_macvtap entered promiscuous mode [ 224.239624][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.255009][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.302886][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.318310][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.326796][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.782199][ T112] device bridge_slave_1 left promiscuous mode [ 224.803048][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.117634][ T112] device bridge_slave_0 left promiscuous mode [ 225.192164][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.267574][ T112] device veth1_macvtap left promiscuous mode [ 225.333159][ T112] device veth0_vlan left promiscuous mode [ 226.796052][T10981] device wg2 left promiscuous mode [ 227.230452][T11014] device syzkaller0 entered promiscuous mode [ 227.447365][T11025] device syzkaller0 entered promiscuous mode [ 227.464542][T11027] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 227.472713][ T396] syzkaller0: tun_net_xmit 48 [ 227.497009][T11026] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 227.505802][T11025] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 227.742486][T11047] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 227.761422][T11047] syzkaller0: linktype set to 0 [ 227.968001][T11061] device syzkaller0 entered promiscuous mode [ 227.997774][T11059] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 228.784585][T11094] device syzkaller0 entered promiscuous mode [ 230.782037][T11213] device syzkaller0 entered promiscuous mode [ 232.158032][T11251] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.167556][T11251] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.175079][T11251] device bridge_slave_0 entered promiscuous mode [ 232.203008][T11251] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.281427][T11251] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.321899][T11251] device bridge_slave_1 entered promiscuous mode [ 233.098186][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.142336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.241153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.253236][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.278972][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.286318][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.307199][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.321654][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.341642][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.348755][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.358611][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.404444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.450678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.461206][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.488665][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.568634][T11251] device veth0_vlan entered promiscuous mode [ 233.632900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.654561][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.678153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.712707][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.740887][T11251] device veth1_macvtap entered promiscuous mode [ 233.785090][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.797617][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.805999][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.824438][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.842190][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.850741][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.872535][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.003056][ T112] device veth1_macvtap left promiscuous mode [ 235.779982][T11418] device syzkaller0 entered promiscuous mode [ 236.646492][T11455] syz.0.3182[11455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.646600][T11455] syz.0.3182[11455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.964491][T11507] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 238.215263][T11507] syzkaller0: linktype set to 804 [ 239.238457][T11556] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.253192][T11556] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.270758][T11556] device bridge_slave_0 entered promiscuous mode [ 239.293886][T11556] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.301611][T11556] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.310520][T11556] device bridge_slave_1 entered promiscuous mode [ 239.395380][T11556] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.402489][T11556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.409770][T11556] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.416867][T11556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.446029][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.454749][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.572479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.586841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.638135][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.648635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.662065][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.669343][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.677799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.686726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.695610][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.702669][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.710316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.719210][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.766650][T11590] device syzkaller0 entered promiscuous mode [ 239.797723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.858457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.884328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.921720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.983165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.023372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.041941][T11556] device veth0_vlan entered promiscuous mode [ 240.054729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.066896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.129112][T11556] device veth1_macvtap entered promiscuous mode [ 240.217837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.257291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.267528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.316139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.334201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.380302][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.401925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.457621][T11607] device syzkaller0 entered promiscuous mode [ 241.034989][T11648] device syzkaller0 entered promiscuous mode [ 241.386236][ T445] device veth0_vlan left promiscuous mode [ 243.429884][T11703] device syzkaller0 entered promiscuous mode [ 243.774515][T11719] device syzkaller0 entered promiscuous mode [ 246.176786][T11826] ref_ctr_offset mismatch. inode: 0x97 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 246.255338][T11834] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 247.184715][T11888] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 248.679014][T11977] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 249.227760][T11998] device syzkaller0 entered promiscuous mode [ 251.226222][T12089] nr0: port 1(macsec0) entered blocking state [ 251.235203][T12089] nr0: port 1(macsec0) entered disabled state [ 251.279016][T12089] device macsec0 entered promiscuous mode [ 252.902964][T12173] syzkaller0: create flow: hash 3293449586 index 0 [ 252.986426][T12163] device syzkaller0 entered promiscuous mode [ 253.041119][T12170] device veth1_macvtap left promiscuous mode [ 253.070786][T12175] device veth1_macvtap entered promiscuous mode [ 253.079949][T12175] device macsec0 entered promiscuous mode [ 253.201899][T12174] syzkaller0 (unregistered): delete flow: hash 3293449586 index 0 [ 256.896452][T12328] device syzkaller0 entered promiscuous mode [ 256.926865][T12330] device syzkaller0 entered promiscuous mode [ 259.194952][ T24] audit: type=1400 audit(1771988240.829:171): avc: denied { create } for pid=12388 comm="syz.2.3438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 260.066658][ T24] audit: type=1400 audit(1771988241.699:172): avc: denied { create } for pid=12492 comm="syz.2.3470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 262.648272][T12595] device wg2 entered promiscuous mode [ 262.873793][T12620] device syzkaller0 entered promiscuous mode [ 263.249710][T12631] -: renamed from syzkaller0 [ 263.618952][T12673] device syzkaller0 entered promiscuous mode [ 263.890213][T12704] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.897452][T12704] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.106478][T12714] device syzkaller0 entered promiscuous mode [ 265.425534][T12784] device syzkaller0 entered promiscuous mode [ 265.868777][T12847] device syzkaller0 entered promiscuous mode [ 266.271502][T12878] device syzkaller0 entered promiscuous mode [ 267.070026][T12927] device team_slave_1 entered promiscuous mode [ 267.081878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.100528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.491528][T12933] device syzkaller0 entered promiscuous mode [ 269.677964][T13009] device sit0 entered promiscuous mode [ 272.491354][ T24] audit: type=1400 audit(1771988254.119:173): avc: denied { create } for pid=13147 comm="syz.0.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 273.920529][T13183] bridge0: port 3(veth1) entered blocking state [ 273.941301][T13183] bridge0: port 3(veth1) entered disabled state [ 273.947890][T13183] device veth1 entered promiscuous mode [ 273.971684][T13186] device veth1 left promiscuous mode [ 273.977700][T13186] bridge0: port 3(veth1) entered disabled state [ 276.942313][T13250] tap0: tun_chr_ioctl cmd 1074025677 [ 277.132371][T13250] tap0: linktype set to 778 [ 277.899989][T13269] device wg2 entered promiscuous mode [ 278.950786][T13293] device syzkaller0 entered promiscuous mode [ 279.227702][T13307] syz.4.3698[13307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.227847][T13307] syz.4.3698[13307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.199454][T13354] device syzkaller0 entered promiscuous mode [ 280.576934][ T24] audit: type=1400 audit(1771988262.209:174): avc: denied { create } for pid=13382 comm="syz.3.3719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 282.594089][T13483] device wg2 entered promiscuous mode [ 283.488506][T13513] : renamed from team_slave_1 [ 284.068091][T13535] device wg2 left promiscuous mode [ 285.420078][T13624] tap0: tun_chr_ioctl cmd 1074025675 [ 285.441364][T13624] tap0: persist enabled [ 285.445761][T13624] tap0: tun_chr_ioctl cmd 1074025675 [ 285.495888][T13624] tap0: persist disabled [ 287.185482][T13688] device pimreg0 entered promiscuous mode [ 288.553806][T13847] device syzkaller0 entered promiscuous mode [ 288.588872][T13849] device syzkaller0 entered promiscuous mode [ 289.695049][T13899] device wg2 entered promiscuous mode [ 289.994458][T13920] device syzkaller0 entered promiscuous mode [ 290.953562][T13972] device syzkaller0 entered promiscuous mode [ 291.571696][T14018] device syzkaller0 entered promiscuous mode [ 293.449994][T14073] device syzkaller0 entered promiscuous mode [ 293.496934][T14089] device syzkaller0 entered promiscuous mode [ 294.434556][T14115] device veth1_macvtap left promiscuous mode [ 294.442026][T14115] device macsec0 left promiscuous mode [ 294.467805][T14118] device veth1_macvtap entered promiscuous mode [ 294.475119][T14118] device macsec0 entered promiscuous mode [ 295.823340][T14187] tap0: tun_chr_ioctl cmd 1074025692 [ 301.026200][T14312] device wg2 left promiscuous mode [ 301.310724][T14311] device wg2 entered promiscuous mode [ 302.980748][T14373] batadv0: tun_chr_ioctl cmd 1074025684 [ 303.157546][T14377] device syzkaller0 entered promiscuous mode [ 303.791495][T14395] device syzkaller0 entered promiscuous mode [ 307.533660][T14501] device syzkaller0 entered promiscuous mode [ 307.971842][T14522] device syzkaller0 entered promiscuous mode [ 311.105350][T14630] tap0: tun_chr_ioctl cmd 1074025677 [ 311.113095][T14630] tap0: linktype set to 780 [ 311.118496][T14637] device veth1_macvtap left promiscuous mode [ 311.129668][T14630] tap0: tun_chr_ioctl cmd 1074025680 [ 312.254986][ T24] audit: type=1400 audit(1771988293.889:175): avc: denied { create } for pid=14711 comm="syz.0.4092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 313.950540][T14771] device sit0 entered promiscuous mode [ 315.103488][T14799] device syzkaller0 entered promiscuous mode [ 316.357290][ T24] audit: type=1400 audit(1771988297.989:176): avc: denied { mounton } for pid=14883 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 316.490795][T14883] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.510944][T14883] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.531776][T14883] device bridge_slave_0 entered promiscuous mode [ 316.554973][T14883] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.576128][T14883] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.596660][T14883] device bridge_slave_1 entered promiscuous mode [ 316.790882][T14883] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.797956][T14883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.805223][T14883] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.812253][T14883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.884268][T14891] device syzkaller0 entered promiscuous mode [ 316.911834][T14891] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 316.951991][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.974887][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.992722][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.065325][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.092048][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.135234][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.142350][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.221442][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.245098][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.258609][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.265703][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.273465][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.281682][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.289672][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.317398][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.343329][T14883] device veth0_vlan entered promiscuous mode [ 317.355381][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 317.369536][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.428353][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 317.461759][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.537015][T14883] device veth1_macvtap entered promiscuous mode [ 317.548307][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.556559][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.573496][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.609004][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.651684][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.692185][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.716139][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.775631][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.825724][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.987538][ T24] audit: type=1400 audit(1771988299.619:177): avc: denied { unmount } for pid=14883 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 321.139632][T15057] device syzkaller0 entered promiscuous mode [ 322.611437][T15166] device team_slave_1 entered promiscuous mode [ 322.623405][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.631884][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.270350][T15251] +: renamed from team_slave_1 [ 326.268953][T15322] device wg2 left promiscuous mode [ 326.287186][T15323] device wg2 entered promiscuous mode [ 326.984743][T15381] tap0: tun_chr_ioctl cmd 1074025675 [ 327.000288][T15381] tap0: persist enabled [ 327.026980][T15381] tap0: tun_chr_ioctl cmd 1074025675 [ 327.051366][T15381] tap0: persist enabled [ 327.057553][T15381] tap0: tun_chr_ioctl cmd 2148553947 [ 327.765443][T15430] device syzkaller0 entered promiscuous mode [ 327.934031][T15448] device syzkaller0 entered promiscuous mode [ 327.951179][T15450] device syzkaller0 entered promiscuous mode [ 328.110118][T15473] device syzkaller0 entered promiscuous mode [ 328.226374][T15494] syz.2.4321[15494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.226484][T15494] syz.2.4321[15494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.991308][T15661] tap0: tun_chr_ioctl cmd 1074025675 [ 331.031037][T15661] tap0: persist enabled [ 331.051993][T15667] tap0: tun_chr_ioctl cmd 1074025675 [ 331.128169][T15667] tap0: persist disabled [ 333.164044][T15715] syz.5.4386[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.164134][T15715] syz.5.4386[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.518340][T15801] device syzkaller0 entered promiscuous mode [ 335.323959][T15830] device syzkaller0 entered promiscuous mode [ 335.345040][T15827] device wg2 entered promiscuous mode [ 336.340263][T15856] device syzkaller0 entered promiscuous mode [ 336.907871][T15871] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.915135][T15871] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.197219][T15876] device syzkaller0 entered promiscuous mode [ 337.355840][T15883] device pim6reg1 entered promiscuous mode [ 340.999650][T16051] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.089542][T16057] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.096638][T16057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.614177][T16078] device syzkaller0 entered promiscuous mode [ 343.371405][T16130] device syzkaller0 entered promiscuous mode [ 343.935493][T16155] device syzkaller0 entered promiscuous mode [ 345.099165][T16203] device syzkaller0 entered promiscuous mode [ 346.343219][T16257] device syzkaller0 entered promiscuous mode [ 347.824373][T16317] device veth1_macvtap left promiscuous mode [ 347.883348][T16312] device veth1_macvtap entered promiscuous mode [ 347.890701][T16312] device macsec0 entered promiscuous mode [ 349.922848][T16446] device syzkaller0 entered promiscuous mode [ 350.702655][T16496] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.709854][T16496] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.950626][T16562] device syzkaller0 entered promiscuous mode [ 352.919063][T16608] device pim6reg1 entered promiscuous mode [ 354.767836][T16664] device syzkaller0 entered promiscuous mode [ 356.303800][T16732] device syzkaller0 entered promiscuous mode [ 356.516447][T13767] syzkaller0: tun_net_xmit 48 [ 356.696374][T16766] IPv6: pim6reg1: Disabled Multicast RS [ 357.016831][T16788] device syzkaller0 entered promiscuous mode [ 357.927869][T16863] device syzkaller0 entered promiscuous mode [ 358.166776][T16887] device syzkaller0 entered promiscuous mode [ 361.939270][T17081] : renamed from bond_slave_0 [ 362.287439][T17114] device syzkaller0 entered promiscuous mode [ 365.954749][T17265] device syzkaller0 entered promiscuous mode [ 368.307414][T17329] device veth1_macvtap entered promiscuous mode [ 371.312999][T17439] cgroup: fork rejected by pids controller in /syz1 [ 371.740854][ T24] audit: type=1400 audit(1771988353.369:178): avc: denied { create } for pid=17560 comm="syz.4.4906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 372.154954][T17565] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.164045][T17565] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.183260][T17565] device bridge_slave_0 entered promiscuous mode [ 372.223843][T17565] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.230902][T17565] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.261805][T17565] device bridge_slave_1 entered promiscuous mode [ 372.985163][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 373.013637][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.093327][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.187860][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.227557][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.234689][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.252293][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.271523][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.290036][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.297115][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.563136][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.581812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 373.590009][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.599330][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 373.608320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.631737][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 373.650495][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.672332][T17565] device veth0_vlan entered promiscuous mode [ 373.732909][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 373.743145][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.764956][T17565] device veth1_macvtap entered promiscuous mode [ 373.809801][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.826089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.845185][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 373.865708][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.885907][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 374.053087][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 374.061787][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.070254][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 374.097320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.335345][T17636] device syzkaller0 entered promiscuous mode [ 375.759429][ T112] device bridge_slave_1 left promiscuous mode [ 375.766034][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.804935][ T112] device bridge_slave_0 left promiscuous mode [ 375.811595][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.819807][ T112] device veth1_macvtap left promiscuous mode [ 376.899281][T17757] nr0: port 1(macsec0) entered blocking state [ 376.925771][T17757] nr0: port 1(macsec0) entered disabled state [ 378.316921][T17823] device syzkaller0 entered promiscuous mode [ 378.565632][T17851] device veth1_macvtap left promiscuous mode [ 378.588446][T17851] device veth1_macvtap entered promiscuous mode [ 378.599999][T17851] device macsec0 entered promiscuous mode [ 379.874737][T17976] tap0: tun_chr_ioctl cmd 1074025677 [ 379.901418][T17976] tap0: linktype set to 778 [ 380.662365][T18049] device veth0_vlan left promiscuous mode [ 380.675447][T18049] device veth0_vlan entered promiscuous mode [ 380.693516][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.705277][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 380.721836][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.804015][T18065] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 381.320802][T18077] device veth0_vlan left promiscuous mode [ 381.461137][T18077] device veth0_vlan entered promiscuous mode [ 382.129178][T18121] tun0: tun_chr_ioctl cmd 1074025678 [ 382.136860][T18121] tun0: group set to 1 [ 382.206758][T18130] syz.0.5058[18130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.206821][T18130] syz.0.5058[18130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.313682][T18136] device veth0_vlan left promiscuous mode [ 382.452462][T18136] device veth0_vlan entered promiscuous mode [ 382.707852][T18148] device pim6reg1 entered promiscuous mode [ 382.908197][T18170] device macsec0 entered promiscuous mode [ 382.957213][T18176] bridge0: port 3(gretap0) entered blocking state [ 382.972067][T18176] bridge0: port 3(gretap0) entered disabled state [ 382.987286][T18176] device gretap0 entered promiscuous mode [ 384.118954][T18258] device syzkaller0 entered promiscuous mode [ 384.161474][T18263] device sit0 left promiscuous mode [ 384.380610][T18266] device sit0 entered promiscuous mode [ 384.771837][T18308] [haX: renamed from vlan1 [ 384.870422][T18327] tap0: tun_chr_ioctl cmd 1074025677 [ 384.881445][T18327] tap0: linktype set to 778 [ 386.349036][T18388] device syzkaller0 entered promiscuous mode [ 387.308812][T18439] device syzkaller0 entered promiscuous mode [ 388.812823][T18526] device syzkaller0 entered promiscuous mode [ 391.460981][T18674] tap0: tun_chr_ioctl cmd 1074025675 [ 391.475312][T18674] tap0: persist enabled [ 391.500291][T18675] tap0: tun_chr_ioctl cmd 1074025675 [ 391.531931][T18675] tap0: persist disabled [ 392.243323][T18701] tap0: tun_chr_ioctl cmd 1074025673 [ 392.249231][T18695] tap0: tun_chr_ioctl cmd 1074025675 [ 392.271456][T18695] tap0: persist enabled [ 392.279233][T18695] tap0: tun_chr_ioctl cmd 1074025675 [ 392.286054][T18695] tap0: persist disabled [ 392.294423][T18699] device bridge_slave_1 left promiscuous mode [ 392.300584][T18699] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.321888][T18699] device bridge_slave_0 left promiscuous mode [ 392.328064][T18699] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.134389][T18743] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 393.167160][T18743] device syzkaller0 entered promiscuous mode [ 393.224499][T18743] device sit0 entered promiscuous mode [ 394.518925][T18827] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.534765][T18827] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.713992][T18836] device bridge_slave_1 left promiscuous mode [ 394.720707][T18836] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.782814][T18836] device bridge_slave_0 left promiscuous mode [ 394.816935][T18836] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.270482][T18889] device lo entered promiscuous mode [ 397.228804][T18934] lo: mtu less than device minimum [ 398.188301][T18970] syzkaller0: mtu less than device minimum [ 398.765902][T18992] device wg2 left promiscuous mode [ 398.900396][T19000] device wg2 entered promiscuous mode [ 400.273330][T19080] device syzkaller0 entered promiscuous mode [ 400.356202][T19088] device veth0_vlan left promiscuous mode [ 400.460300][T19088] device veth0_vlan entered promiscuous mode [ 401.125591][T19144] device syzkaller0 entered promiscuous mode [ 405.770117][T19300] device syzkaller0 entered promiscuous mode [ 408.102359][T19389] device wg2 left promiscuous mode [ 408.212190][T19392] device wg2 entered promiscuous mode [ 408.371480][T19407] device syzkaller0 entered promiscuous mode [ 408.859981][T19427] device syzkaller0 entered promiscuous mode [ 409.201791][T19445] device macsec0 left promiscuous mode [ 409.576568][T19452] device syzkaller0 entered promiscuous mode [ 410.012390][T19484] device veth0_vlan left promiscuous mode [ 410.052261][T19484] device veth0_vlan entered promiscuous mode [ 410.234100][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.277383][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.330731][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.945719][T19532] device syzkaller0 entered promiscuous mode [ 411.202453][T19553] device bond_slave_1 entered promiscuous mode [ 411.209054][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 411.218500][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 411.249406][T19555] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.257943][T19555] device syzkaller0 entered promiscuous mode [ 412.508384][T19619] syz.2.5482[19619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.514942][T19619] syz.2.5482[19619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.752272][T19633] device veth0_vlan left promiscuous mode [ 412.867077][T19633] device veth0_vlan entered promiscuous mode [ 413.608567][T19666] device pim6reg1 entered promiscuous mode [ 414.365582][T19716] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.379166][T19716] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.431656][T19716] device bridge_slave_0 entered promiscuous mode [ 414.447317][T19716] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.475043][T19716] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.489080][T19716] device bridge_slave_1 entered promiscuous mode [ 415.116753][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 415.124790][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.150235][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 415.159851][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.168539][ T445] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.175589][ T445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.184036][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 415.192639][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.201500][ T445] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.208947][ T445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.231310][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 415.258991][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 415.277555][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 415.289067][T19751] +: renamed from team_slave_1 [ 415.319978][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 415.344900][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.356056][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.363959][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.376924][T19716] device veth0_vlan entered promiscuous mode [ 415.417847][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 415.450565][T19716] device veth1_macvtap entered promiscuous mode [ 415.467676][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 415.502059][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 415.769694][T19782] device syzkaller0 entered promiscuous mode [ 415.847190][T19784] device syzkaller0 entered promiscuous mode [ 416.612578][ T112] nr0: port 1(macsec0) entered disabled state [ 416.622814][ T112] device veth1_macvtap left promiscuous mode [ 416.636481][ T112] device veth0_vlan left promiscuous mode [ 416.932688][T19843] device syzkaller0 entered promiscuous mode [ 416.945138][T13794] syzkaller0: tun_net_xmit 48 [ 416.953346][T19843] syzkaller0: create flow: hash 3293449586 index 0 [ 417.033504][T19843] syzkaller0 (unregistered): delete flow: hash 3293449586 index 0 [ 418.995334][T19890] device syzkaller0 entered promiscuous mode [ 421.502089][T19955] syz.0.5575[19955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.502186][T19955] syz.0.5575[19955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.113886][T19997] device syzkaller0 entered promiscuous mode [ 424.491393][T20073] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 429.129237][T20288] device syzkaller0 entered promiscuous mode [ 429.224762][T20284] device syzkaller0 entered promiscuous mode [ 429.925512][T20298] : port 1(ip6gretap0) entered blocking state [ 429.932232][T20298] : port 1(ip6gretap0) entered disabled state [ 429.938757][T20298] device ip6gretap0 entered promiscuous mode [ 429.945837][T20300] device ip6gretap0 left promiscuous mode [ 429.955021][T20300] : port 1(ip6gretap0) entered disabled state [ 430.303971][T20353] device syzkaller0 entered promiscuous mode [ 431.122691][T20391] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.184896][T20404] device bond_slave_1 entered promiscuous mode [ 431.212998][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 431.231705][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 431.256374][T20391] device bridge_slave_1 left promiscuous mode [ 431.310577][T20391] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.373756][T20391] device bridge_slave_0 left promiscuous mode [ 431.379960][T20391] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.046592][T20480] device syzkaller0 entered promiscuous mode [ 432.652520][T20495] : renamed from bond_slave_0 [ 433.242871][T20555] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 433.442897][T20585] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 433.529374][T20595] device syzkaller0 entered promiscuous mode [ 433.596534][T20603] device syzkaller0 entered promiscuous mode [ 434.694454][T20646] device syzkaller0 entered promiscuous mode [ 435.227260][T20671] device syzkaller0 entered promiscuous mode [ 436.341619][T20704] device wg2 entered promiscuous mode [ 437.314073][T20749] device syzkaller0 entered promiscuous mode [ 440.002930][T20782] device syzkaller0 entered promiscuous mode [ 440.573929][T20799] device syzkaller0 entered promiscuous mode [ 442.258819][T20870] device syzkaller0 entered promiscuous mode [ 443.034378][T20914] IPv6: pim6reg1: Disabled Multicast RS [ 443.512838][T20966] device syzkaller0 entered promiscuous mode [ 443.520616][T20963] : port 1(ip6gretap0) entered blocking state [ 443.526927][T20963] : port 1(ip6gretap0) entered disabled state [ 443.533811][T20963] device ip6gretap0 entered promiscuous mode [ 445.116983][T21046] device syzkaller0 entered promiscuous mode [ 446.479354][T21098] device syzkaller0 entered promiscuous mode [ 447.273394][T21137] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 447.340551][T21136] device syzkaller0 entered promiscuous mode [ 447.948590][T21147] device wg2 entered promiscuous mode [ 448.536908][T21189] device gretap0 left promiscuous mode [ 448.545435][T21189] bridge0: port 3(gretap0) entered disabled state [ 448.558306][T21189] device bridge_slave_1 left promiscuous mode [ 448.568926][T21189] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.603159][T21189] device bridge_slave_0 left promiscuous mode [ 448.613213][T21189] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.121946][T21216] device wg2 left promiscuous mode [ 449.618810][T21231] tap0: tun_chr_ioctl cmd 1074025692 [ 449.808273][T21245] device syzkaller0 entered promiscuous mode [ 450.324395][T21287] device syzkaller0 entered promiscuous mode [ 451.016619][T21325] device dummy0 entered promiscuous mode [ 454.770141][T21398] device syzkaller0 entered promiscuous mode [ 454.981920][T21419] device syzkaller0 entered promiscuous mode [ 455.177707][T21428] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 455.214509][T21428] device syzkaller0 entered promiscuous mode [ 455.235788][ T1704] syzkaller0: tun_net_xmit 48 [ 455.242698][T21428] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 455.306677][T21437] device veth1_macvtap left promiscuous mode [ 455.307766][T21431] syzkaller0: tun_net_xmit 1280 [ 455.314934][T21437] device macsec0 left promiscuous mode [ 455.573953][T21464] bridge_slave_0: mtu less than device minimum [ 456.018992][T21506] device syzkaller0 entered promiscuous mode [ 457.315724][T21592] device syzkaller0 entered promiscuous mode [ 457.853358][T21609] device syzkaller0 entered promiscuous mode [ 460.689934][T21750] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.745183][T21750] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.756052][T21750] device bridge_slave_0 entered promiscuous mode [ 460.800353][T21750] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.808555][T21750] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.856862][T21750] device bridge_slave_1 entered promiscuous mode [ 461.197551][T21773] device veth0_vlan left promiscuous mode [ 461.237210][T21773] device veth0_vlan entered promiscuous mode [ 461.589110][ T7] device ip6gretap0 left promiscuous mode [ 461.616315][ T7] : port 1(ip6gretap0) entered disabled state [ 461.674853][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 461.682499][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 461.772599][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 461.805292][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 461.814074][ T445] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.821119][ T445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.839375][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 461.855246][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 461.870108][ T445] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.877185][ T445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.884808][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.892939][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.901048][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 461.917836][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 461.940627][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.950330][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.958029][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.970810][T21750] device veth0_vlan entered promiscuous mode [ 462.022276][T21750] device veth1_macvtap entered promiscuous mode [ 462.029890][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 462.046197][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 462.055124][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 462.074132][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 462.097720][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 462.585733][ T7] device bridge_slave_1 left promiscuous mode [ 462.591962][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.599567][ T7] device bridge_slave_0 left promiscuous mode [ 462.605784][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.602176][ T24] audit: type=1400 audit(1771988445.239:179): avc: denied { create } for pid=21869 comm="syz.1.6096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 464.248289][T21885] device syzkaller0 entered promiscuous mode [ 465.011312][T21911] device syzkaller0 entered promiscuous mode [ 466.674550][T21998] device syzkaller0 entered promiscuous mode [ 469.729906][T22131] device syzkaller0 entered promiscuous mode [ 472.291851][T22246] device veth0_vlan left promiscuous mode [ 472.297951][T22246] device veth0_vlan entered promiscuous mode [ 472.407652][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.421877][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.459029][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): [haX: link becomes ready [ 473.470543][T22329] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 473.713988][T22364] device wg2 entered promiscuous mode [ 474.463324][T22423] device syzkaller0 entered promiscuous mode [ 476.357972][T22490] device syzkaller0 entered promiscuous mode [ 476.378746][ T2790] syzkaller0: tun_net_xmit 76 [ 476.385841][ T2790] syzkaller0: tun_net_xmit 48 [ 477.771230][T22594] device veth1_to_bond entered promiscuous mode [ 478.592398][T22607] device syzkaller0 entered promiscuous mode [ 478.912966][T22651] device syzkaller0 entered promiscuous mode [ 481.228694][T22753] device syzkaller0 entered promiscuous mode [ 481.252260][T22758] device lo entered promiscuous mode [ 481.651018][T22788] device syzkaller0 entered promiscuous mode [ 481.785818][T22795] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.793061][T22795] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.875399][T22803] device bridge_slave_1 left promiscuous mode [ 481.903459][T22803] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.953323][T22803] device bridge_slave_0 left promiscuous mode [ 481.981550][T22803] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.178504][T22893] device syzkaller0 entered promiscuous mode [ 484.968974][T22910] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 486.937341][T23002] device veth1_macvtap left promiscuous mode [ 488.945689][T23086] device syzkaller0 entered promiscuous mode [ 489.105571][T23121] @: renamed from bond_slave_0 [ 489.654166][T23153] device veth1_macvtap entered promiscuous mode [ 489.660808][T23153] device macsec0 entered promiscuous mode [ 489.668356][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 490.137509][T23185] device wg2 left promiscuous mode [ 490.159797][T23185] device wg2 entered promiscuous mode [ 490.368915][T23202] device syzkaller0 entered promiscuous mode [ 491.612821][T23275] bridge0: port 3(gretap0) entered blocking state [ 491.631474][T23275] bridge0: port 3(gretap0) entered disabled state [ 491.651755][T23275] device gretap0 entered promiscuous mode [ 491.658069][T23275] bridge0: port 3(gretap0) entered blocking state [ 491.664695][T23275] bridge0: port 3(gretap0) entered forwarding state [ 491.953011][T23313] device syzkaller0 entered promiscuous mode [ 492.779327][T23354] tap0: tun_chr_ioctl cmd 1074025677 [ 492.836789][T23354] tap0: linktype set to 778 [ 493.510322][T23367] -1: renamed from syzkaller0 [ 493.629707][T23382] device syzkaller0 entered promiscuous mode [ 494.641130][T23455] batadv0: tun_chr_ioctl cmd 1074025677 [ 494.647623][T23455] batadv0: linktype set to 776 [ 495.848112][T23543] bridge_slave_0: mtu less than device minimum [ 496.031845][T23566] device veth1_macvtap left promiscuous mode [ 496.040805][T23567] device veth1_macvtap entered promiscuous mode [ 496.052104][T23567] device macsec0 entered promiscuous mode [ 496.068142][T23567] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 496.086799][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.581924][T23699] device syzkaller0 entered promiscuous mode [ 500.921226][T23763] device syzkaller0 entered promiscuous mode [ 501.336985][T23777] +: renamed from team_slave_1 [ 501.928659][T23823] device veth1_macvtap left promiscuous mode [ 501.935895][T23823] device macsec0 left promiscuous mode [ 501.955159][T23823] device veth1_macvtap entered promiscuous mode [ 501.979315][T23823] device macsec0 entered promiscuous mode [ 503.882161][T23882] device syzkaller0 entered promiscuous mode [ 505.086285][T23928] device wg2 left promiscuous mode [ 505.386681][T23942] device wg2 entered promiscuous mode [ 506.664455][T23999] syz.1.6717[23999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.664577][T23999] syz.1.6717[23999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.829676][T24001] device syzkaller0 entered promiscuous mode [ 507.254189][T24057] @0: renamed from bond_slave_1 [ 507.488680][T24094] tap0: tun_chr_ioctl cmd 1074025677 [ 507.494996][T24094] tap0: linktype set to 270 [ 507.821777][T24118] device syzkaller0 entered promiscuous mode [ 508.568725][T24200] device pim6reg1 entered promiscuous mode [ 509.395852][T24210] device syzkaller0 entered promiscuous mode [ 510.175386][T24242] device syzkaller0 entered promiscuous mode [ 511.700539][T24280] device wg2 left promiscuous mode [ 512.164439][T24277] device wg2 entered promiscuous mode [ 512.306819][T24291] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 513.477035][T24344] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 517.124799][T24459] device syzkaller0 entered promiscuous mode [ 518.108101][T24494] device veth0_vlan left promiscuous mode [ 518.184075][T24494] device veth0_vlan entered promiscuous mode [ 518.286827][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 518.295308][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 518.303177][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): [haX: link becomes ready [ 518.388621][T24501] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 519.885433][T24567] device sit0 entered promiscuous mode [ 524.136888][T24710] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.231508][T24710] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.262133][T24710] device bridge_slave_0 entered promiscuous mode [ 524.410309][T24710] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.501285][T24710] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.602252][T24710] device bridge_slave_1 entered promiscuous mode [ 524.738003][T24747] device syzkaller0 entered promiscuous mode [ 524.826913][T24754] syz.5.6931[24754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.827021][T24754] syz.5.6931[24754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.950930][T24758] syz.5.6932[24758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.990712][T24758] syz.5.6932[24758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.052933][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 525.085158][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 525.118754][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 525.128312][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 525.138124][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.145174][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.280935][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 525.331777][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 525.408358][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.415425][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.538345][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 525.620467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 525.758543][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 525.777041][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 525.916516][T24710] device veth0_vlan entered promiscuous mode [ 525.924298][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 525.932334][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 525.974798][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 525.983009][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 526.069302][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 526.078869][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 526.226525][T24710] device veth1_macvtap entered promiscuous mode [ 526.418049][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 526.446933][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 526.507514][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 526.528018][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 526.538981][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 528.043331][ T7] device veth1_macvtap left promiscuous mode [ 529.631653][T24870] syz.1.6965[24870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.631720][T24870] syz.1.6965[24870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.141529][T24892] device syzkaller0 entered promiscuous mode [ 530.503594][T24916] device team_slave_1 entered promiscuous mode [ 530.510303][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 530.518732][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 532.290284][T24995] device syzkaller0 entered promiscuous mode [ 533.151358][T25026] : renamed from pim6reg1 [ 534.299242][T25063] device syzkaller0 entered promiscuous mode [ 538.379330][T25197] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.539285][T25197] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.582691][T25197] device bridge_slave_0 entered promiscuous mode [ 538.651433][T25197] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.683861][T25197] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.704084][T25197] device bridge_slave_1 entered promiscuous mode [ 538.911755][T25197] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.918828][T25197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.926118][T25197] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.933146][T25197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 539.062977][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 539.072713][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 539.081206][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 539.091993][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 539.107181][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 539.142185][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 539.160333][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.182800][T25197] device veth0_vlan entered promiscuous mode [ 539.190741][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.201575][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 539.215292][T25197] device veth1_macvtap entered promiscuous mode [ 539.232704][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 539.251920][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 539.278153][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 541.964150][ T7] device veth1_macvtap left promiscuous mode [ 541.970193][ T7] device veth0_vlan left promiscuous mode [ 542.642073][T25377] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 542.650950][T25377] device syzkaller0 entered promiscuous mode [ 543.414507][T25424] syzkaller0: create flow: hash 3293449586 index 0 [ 543.445192][T25423] device syzkaller0 entered promiscuous mode [ 543.516057][ T454] syzkaller0: tun_net_xmit 48 [ 543.611649][T25426] syzkaller0 (unregistered): delete flow: hash 3293449586 index 0 [ 543.661339][T25434] device wg2 entered promiscuous mode [ 543.843911][T25450] cgroup: fork rejected by pids controller in /syz5 [ 544.194864][T25462] device syzkaller0 entered promiscuous mode [ 545.971912][T25481] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.978941][T25481] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.991875][T25481] device bridge_slave_0 entered promiscuous mode [ 546.003043][T25481] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.010323][T25481] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.037846][T25481] device bridge_slave_1 entered promiscuous mode [ 546.574969][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 546.591693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 546.677268][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 546.686878][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 546.702531][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.709605][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.727273][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 546.737571][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 546.747585][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.754643][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 547.015257][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 547.023041][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 547.031039][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 547.089384][T25481] device veth0_vlan entered promiscuous mode [ 547.101764][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 547.112432][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.125701][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.133695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.198490][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 547.210353][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 547.225379][T25481] device veth1_macvtap entered promiscuous mode [ 547.323402][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 547.336880][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 547.354682][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 547.428776][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 547.439519][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 548.900525][T25620] device syzkaller0 entered promiscuous mode [ 549.024624][T25605] bridge0: port 3(veth1) entered blocking state [ 549.030978][T25605] bridge0: port 3(veth1) entered disabled state [ 549.093479][T25605] device veth1 entered promiscuous mode [ 549.107384][T25605] bridge0: port 3(veth1) entered blocking state [ 549.113953][T25605] bridge0: port 3(veth1) entered forwarding state [ 549.141991][T25620] device veth1 left promiscuous mode [ 549.159699][T25620] bridge0: port 3(veth1) entered disabled state [ 549.173328][ T7] device bridge_slave_1 left promiscuous mode [ 549.185746][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.194052][ T7] device bridge_slave_0 left promiscuous mode [ 549.200286][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.217343][ T7] device veth1_macvtap left promiscuous mode [ 549.223594][ T7] device veth0_vlan left promiscuous mode [ 552.513463][T25807] device pim6reg1 entered promiscuous mode [ 553.136154][T25838] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.854719][T25925] device wg2 left promiscuous mode [ 556.946699][T25963] device syzkaller0 entered promiscuous mode [ 558.374287][T26043] device syzkaller0 entered promiscuous mode [ 559.495112][T26104] device syzkaller0 entered promiscuous mode [ 559.659564][T26112] syz.4.7308[26112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.659667][T26112] syz.4.7308[26112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.466308][T26377] device syzkaller0 entered promiscuous mode [ 566.980892][T26416] device dummy0 entered promiscuous mode [ 567.367281][T26436] sock: sock_set_timeout: `syz.1.7400' (pid 26436) tries to set negative timeout [ 567.435720][T26448] device bond_slave_1 entered promiscuous mode [ 567.461424][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 567.470122][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 568.083713][T26487] device pim6reg1 entered promiscuous mode [ 569.469462][T26531] device syzkaller0 entered promiscuous mode [ 570.053295][T26548] device veth1_macvtap left promiscuous mode [ 570.356706][T26549] device veth1_macvtap entered promiscuous mode [ 570.363246][T26549] device macsec0 entered promiscuous mode [ 572.703979][T26617] device syzkaller0 entered promiscuous mode [ 573.732358][T26667] device syzkaller0 entered promiscuous mode [ 574.894739][T26735] device syzkaller0 entered promiscuous mode [ 575.708195][T26763] GPL: port 1(erspan0) entered blocking state [ 575.714586][T26763] GPL: port 1(erspan0) entered disabled state [ 575.802133][T26763] device erspan0 entered promiscuous mode [ 575.914489][T26765] GPL: port 1(erspan0) entered blocking state [ 575.920617][T26765] GPL: port 1(erspan0) entered forwarding state [ 576.447032][T26822] device bridge_slave_0 entered promiscuous mode [ 576.825374][T26850] device syzkaller0 entered promiscuous mode [ 576.972954][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 576.983599][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.990659][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.431993][T26863] device syzkaller0 entered promiscuous mode [ 579.637172][T26971] device syzkaller0 entered promiscuous mode [ 579.826328][T26981] device syzkaller0 entered promiscuous mode [ 580.068080][T26998] device pim6reg1 entered promiscuous mode [ 580.084970][T27003] : renamed from bond_slave_0 [ 580.545761][T27055] device syzkaller0 entered promiscuous mode [ 580.921888][T27077] device wg2 left promiscuous mode [ 581.456093][T27094] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 582.908799][T27209] device veth1_macvtap entered promiscuous mode [ 582.921586][T27209] device macsec0 entered promiscuous mode [ 582.958187][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 583.293338][T27224] device syzkaller0 entered promiscuous mode [ 583.359420][T27232] device syzkaller0 entered promiscuous mode [ 583.772078][T27254] : port 1(ip6gretap0) entered blocking state [ 583.778400][T27254] : port 1(ip6gretap0) entered disabled state [ 583.785353][T27254] device ip6gretap0 entered promiscuous mode [ 584.062716][T27263] device syzkaller0 entered promiscuous mode [ 584.091355][T27263] tap0: tun_chr_ioctl cmd 1074025677 [ 584.101559][T27263] tap0: linktype set to 769 [ 589.484458][T27436] device wg2 entered promiscuous mode [ 590.699159][T27509] syz.4.7703[27509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.699223][T27509] syz.4.7703[27509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.185579][T27526] device syzkaller0 entered promiscuous mode [ 593.650119][T27641] syz.4.7745[27641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.650182][T27641] syz.4.7745[27641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.058436][T27665] device veth0_vlan left promiscuous mode [ 594.094793][T27665] device veth0_vlan entered promiscuous mode [ 594.114008][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 594.125762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 594.143474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 594.265051][ T24] audit: type=1400 audit(1771988575.899:180): avc: denied { create } for pid=27674 comm="syz.0.7752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 594.788479][T27705] device syzkaller0 entered promiscuous mode [ 595.124551][T27733] device syzkaller0 entered promiscuous mode [ 595.134572][ T1684] syzkaller0: tun_net_xmit 48 [ 595.143147][T27733] syzkaller0: create flow: hash 3293449586 index 0 [ 595.351715][T27732] syzkaller0 (unregistered): delete flow: hash 3293449586 index 0 [ 595.368967][T27754] device syzkaller0 left promiscuous mode [ 596.127642][T27793] device syzkaller0 entered promiscuous mode [ 596.191876][T27789] device syzkaller0 entered promiscuous mode [ 596.210934][T27803] device syzkaller0 entered promiscuous mode [ 596.218759][T27803] device syzkaller0 left promiscuous mode [ 597.154142][T27876] device syzkaller0 entered promiscuous mode [ 598.466945][T27950] device sit0 entered promiscuous mode [ 598.991813][T27989] device syzkaller0 entered promiscuous mode [ 599.026776][T27988] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.034230][T27988] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.042398][T27988] device bridge_slave_0 entered promiscuous mode [ 599.054075][T27988] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.061324][T27988] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.068979][T27988] device bridge_slave_1 entered promiscuous mode [ 599.489480][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 599.517330][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 599.569126][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 599.603812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.627881][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.635009][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.735292][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 599.776534][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 599.821739][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.828853][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 599.855993][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 599.864053][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 599.904169][ T7] device veth1_macvtap left promiscuous mode [ 599.910192][ T7] device veth0_vlan left promiscuous mode [ 600.082809][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 600.098934][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 600.127590][T27988] device veth0_vlan entered promiscuous mode [ 600.144256][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 600.157997][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 600.170594][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 600.179246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 600.195707][T27988] device veth1_macvtap entered promiscuous mode [ 600.202527][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 600.211051][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 600.223728][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 600.242949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 600.254623][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 600.265331][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 600.276813][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 602.987097][T28097] device syzkaller0 entered promiscuous mode [ 606.970091][T28246] device syzkaller0 entered promiscuous mode [ 607.467561][T28285] device sit0 left promiscuous mode [ 607.697758][T28323] device syzkaller0 entered promiscuous mode [ 608.696410][T28407] device syzkaller0 entered promiscuous mode [ 608.871042][T28411] device syzkaller0 entered promiscuous mode [ 611.802247][T28553] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.809305][T28553] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.816966][T28553] device bridge_slave_0 entered promiscuous mode [ 611.825268][T28553] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.832797][T28553] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.840256][T28553] device bridge_slave_1 entered promiscuous mode [ 612.283305][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 612.301454][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 612.333280][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 612.363540][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.385596][ T668] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.392671][ T668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.411496][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 612.419985][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 612.430420][ T668] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.437476][ T668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 612.566358][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 612.574973][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 612.592429][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 612.631283][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 612.750122][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 612.760526][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 612.768105][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 612.781269][T28553] device veth0_vlan entered promiscuous mode [ 612.848414][T28553] device veth1_macvtap entered promiscuous mode [ 612.863776][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 612.912110][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 612.962165][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 612.986674][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 612.997454][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 613.363727][ T7] device veth1_macvtap left promiscuous mode [ 613.372953][ T7] device veth0_vlan left promiscuous mode [ 613.694977][T28609] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.702416][T28609] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.715887][T28609] device bridge_slave_0 entered promiscuous mode [ 613.724627][T28609] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.755653][T28609] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.765299][T28609] device bridge_slave_1 entered promiscuous mode [ 613.966795][T28609] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.973890][T28609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.981210][T28609] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.988250][T28609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.077564][ T668] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.086690][ T668] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.471756][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 614.479353][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 614.495386][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 614.505824][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.514185][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.521216][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.534539][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 614.546096][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 614.554973][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.562021][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.604464][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 614.613692][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 614.658892][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 614.667348][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 614.679062][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 614.687412][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 614.713828][T28609] device veth0_vlan entered promiscuous mode [ 614.728266][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 614.736820][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.745282][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 614.753395][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 614.764975][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 614.782968][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 614.835625][T28609] device veth1_macvtap entered promiscuous mode [ 614.853817][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 614.861872][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 614.876555][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 614.976234][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 614.995706][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 618.121538][T28788] erspan0: refused to change device tx_queue_len [ 618.815643][T28851] device syzkaller0 entered promiscuous mode [ 619.955563][T28881] device syzkaller0 entered promiscuous mode [ 621.262453][T28996] syz.4.8144[28996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.262551][T28996] syz.4.8144[28996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.560522][T29000] device syzkaller0 entered promiscuous mode [ 621.703748][T29011] syz.2.8151[29011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.703867][T29011] syz.2.8151[29011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.789706][T29167] device syzkaller0 entered promiscuous mode [ 626.954481][ T24] audit: type=1400 audit(1771988608.589:181): avc: denied { ioctl } for pid=29280 comm="syz.0.8232" path="" dev="cgroup2" ino=414 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 627.033028][T29281] 7B: renamed from syzkaller0 [ 627.675125][T29299] device syzkaller0 entered promiscuous mode [ 627.748342][T29304] device syzkaller0 entered promiscuous mode [ 628.113674][T29339] device wg2 left promiscuous mode [ 628.202729][T29348] device veth0_vlan left promiscuous mode [ 628.294570][T29348] device veth0_vlan entered promiscuous mode [ 630.549008][T29438] device pim6reg1 entered promiscuous mode [ 632.274208][T29555] device syzkaller0 entered promiscuous mode [ 633.922338][T29630] device sit0 entered promiscuous mode [ 635.781221][T29737] batadv0: tun_chr_ioctl cmd 1074025684 [ 635.979621][T29744] -: renamed from syzkaller0 [ 636.541586][T29760] device lo entered promiscuous mode [ 637.081409][T29790] device syzkaller0 entered promiscuous mode [ 637.553735][T29791] device syzkaller0 entered promiscuous mode [ 639.251141][T29866] device syzkaller0 entered promiscuous mode [ 640.500128][T29912] device syzkaller0 entered promiscuous mode [ 640.573853][T29912] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 640.601840][T29912] syzkaller0: Linktype set failed because interface is up [ 640.877012][T29930] batadv0: tun_chr_ioctl cmd 1074025677 [ 640.884087][T29930] batadv0: linktype set to 776 [ 641.380200][T29958] device veth0_vlan left promiscuous mode [ 641.445503][T29958] device veth0_vlan entered promiscuous mode [ 647.257107][T30235] device wg2 entered promiscuous mode [ 649.945996][T30461] bridge0: port 4(veth1) entered blocking state [ 649.954679][T30461] bridge0: port 4(veth1) entered disabled state [ 649.971120][T30461] device veth1 entered promiscuous mode [ 649.991677][T30461] device veth1 left promiscuous mode [ 650.031482][T30461] bridge0: port 4(veth1) entered disabled state [ 650.515284][T30481] device veth1_macvtap left promiscuous mode [ 653.129434][T30571] device veth0_vlan left promiscuous mode [ 653.140650][T30571] device veth0_vlan entered promiscuous mode [ 653.226144][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.248102][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.256654][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 656.705966][T30763] device wg2 left promiscuous mode [ 664.043908][T31041] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.051144][T31041] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.813279][ T24] audit: type=1400 audit(1771988654.449:182): avc: denied { create } for pid=31188 comm="syz.0.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 673.145575][T31210] device wg2 entered promiscuous mode [ 676.220506][T31362] bY4`Ҙ: renamed from lo [ 676.855876][T31410] syz.1.8853[31410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.487194][T31426] device veth1_macvtap left promiscuous mode [ 689.772004][T31997] sock: sock_set_timeout: `syz.1.9018' (pid 31997) tries to set negative timeout [ 691.033817][ T112] bridge0: port 3(gretap0) entered disabled state [ 691.054693][ T112] device gretap0 left promiscuous mode [ 691.060181][ T112] bridge0: port 3(gretap0) entered disabled state [ 691.253160][ T112] device bridge_slave_1 left promiscuous mode [ 691.259365][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.280323][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.293983][ T112] device veth1_macvtap left promiscuous mode [ 698.738217][T32252] device wg2 left promiscuous mode [ 703.169213][T32317] GPL: port 1(erspan0) entered blocking state [ 703.180706][T32317] GPL: port 1(erspan0) entered disabled state [ 703.193005][T32317] device erspan0 entered promiscuous mode [ 703.211546][T32317] GPL: port 1(erspan0) entered blocking state [ 703.217690][T32317] GPL: port 1(erspan0) entered forwarding state [ 704.231391][ T668] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 711.188299][ T24] audit: type=1400 audit(1771988692.819:183): avc: denied { create } for pid=32427 comm="syz.1.9142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=9003 state=3 status=67 (errno 32: Broken pipe) [ 714.015461][ T24] audit: type=1400 audit(1771988695.649:184): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14578]" dev="pipefs" ino=14578 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 715.233052][ T668] GPL: port 1(erspan0) entered disabled state [ 715.241534][ T668] device erspan0 left promiscuous mode [ 715.247167][ T668] GPL: port 1(erspan0) entered disabled state [ 715.552811][ T668] device bridge_slave_1 left promiscuous mode [ 715.558961][ T668] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.566469][ T668] device bridge_slave_0 left promiscuous mode [ 715.572732][ T668] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.580578][ T668] device bridge_slave_1 left promiscuous mode [ 715.586910][ T668] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.594388][ T668] device bridge_slave_0 left promiscuous mode [ 715.600481][ T668] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.608409][ T668] device bridge_slave_1 left promiscuous mode [ 715.614579][ T668] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.621929][ T668] device bridge_slave_0 left promiscuous mode [ 715.628012][ T668] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.635769][ T668] device bridge_slave_1 left promiscuous mode [ 715.641928][ T668] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.649234][ T668] device bridge_slave_0 left promiscuous mode [ 715.655422][ T668] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.663810][ T668] device veth1_macvtap left promiscuous mode [ 715.669997][ T668] device veth0_vlan left promiscuous mode [ 715.675897][ T668] device veth1_macvtap left promiscuous mode [ 715.681935][ T668] device veth0_vlan left promiscuous mode