last executing test programs: 54m2.318017371s ago: executing program 1 (id=4097): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) 54m2.249386632s ago: executing program 1 (id=4098): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000005c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r2, r1, 0x0, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r2, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'erspan0\x00', @local}) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000005c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r2, r1, 0x0, 0x1}, 0x50) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r2, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'erspan0\x00', @local}) (async) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) (async) 54m2.211784603s ago: executing program 1 (id=4100): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x8, 0x1, 0x0, 0x0, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x1980, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230007) close(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000000000000000000000a0300"/79], 0x0, 0x56}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000012c0)="ebfd81c221cd15f8627c179676a4709bcec72b39d4e37a675c33efa84b5ee8b68170d17575a09068a093bccb7ecf8c8f218450573c64ff87c04f69e5ac2c464534b497488764a850367f4b9ed2a04609c53aecd4af0c157edabbf2609a47038d6118208f5bf0f15355f5909987e2ba9c44dfe5cb4720954a1ae4ea15e6d256fd685820e4a0a55eab4c6a33271134c7c2ad0139f13047d6ec7e1905c139eade99b34139b021d77d8ccdd1751e861f1016a239b4fbec23cd4b10ae1cbda33a0818b049a6e467ab54031e0b8fe56495a6", 0x0, 0x4}, 0x34) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x800, 0x829, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000001a00), 0x0, 0xfe, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000140)) 54m1.640312439s ago: executing program 1 (id=4108): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback=0x14}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x1000}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x210000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x1, 0x9}, 0x48) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0xf3, 0xa, 0x0, 0x0, 0xd006e1258c4875cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f0000000300)='./file0\x00', r4}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="04000000030000000000000000000100000000f036aa9fb17118c8d1f1e20000000000"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000200)=""/144, 0x2b, 0x90, 0x1}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000001080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdfffff7ffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x20, 0x1, 0x1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000340)}, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x9, 0x5, 0x7, 0xc1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r8}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r8}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x11, 0x3, 0x0, &(0x7f0000000140)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000fc0)={r7}, 0x4) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000026c0)=r6, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={r2, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000027c0)={0x6, 0x14, &(0x7f0000001340)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x1, 0x6, 0x2, 0x7, 0x4, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @alu={0x7, 0x0, 0x2, 0xb, 0x2, 0x18, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000001280)='syzkaller\x00', 0x5, 0xec, &(0x7f00000025c0)=""/236, 0x40f00, 0x10, '\x00', r5, @fallback=0x23, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002700)={0x1, 0x0, 0x9, 0x3}, 0x10, r6, r3, 0x6, 0x0, &(0x7f0000002740)=[{0x2, 0x5, 0xc, 0xc}, {0x4, 0x2, 0xb, 0x9}, {0x3, 0x3, 0x5, 0x7}, {0x3, 0x1, 0xa, 0x7}, {0x2, 0x2, 0x2, 0xb}, {0x1, 0x5, 0x3, 0x7}], 0x10, 0x8c}, 0x94) sendmsg$inet(r9, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) 54m1.444688534s ago: executing program 1 (id=4117): r0 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x1, 0x6, 0x7}, 0x0, 0xffefffffffffffff, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="000000000000000066000000ffffff80180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000072000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES64=r3, @ANYRES32=r2, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000380)={&(0x7f0000000200)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@ip_retopts={{0x28, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0xd6, [@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @private=0xa010100, @multicast2]}]}}}, @ip_retopts={{0x10}}], 0x38}, 0x8000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000740)={&(0x7f0000000440)="5603dad39d28539e48da2b4ed4ffdfc9aadc06b8aa002d2a9d1c2a6d57e86222706d75f2c1176f2322b10cfe7b452b64eb5a9bff72446259523a73fed3eb07dba619906fd1fe8bb1920a0c02e1fb0a950239609ebb142d88255fa17f8198cf280ed55807136f0f4246febd2de166632979aeeec94aff56113c56f923f30172", &(0x7f00000004c0)=""/243, &(0x7f00000005c0)="5c57a51cf45dea5f64d80abc8aafa9214f8c90e8f3b0fa3d0e3a29383ae43e8585a5e645c745475145589718c9a698445fef3c7608a5bba8e066459c93161e2ccd03818feb8a2caa8affd7ce3bd983beb0c505478cfbdd217bcf6cb9544a44f74ca0e16af0e0a79293f268ec5a535fcd6ee4f6544f7ae33e3942736925a39cb344f9d2", &(0x7f0000000680)="222aa0e7e29ff1560d3b674475df1755f1edaa836907b0ba7bcafc774314d4d067ee7ccecde30b477a1599d6e38c17d9af9b91da2fd631b58e7322534f59c509f2920273393306e7cd5206d27a9026fd54166c7df4681c809f34ea9fb4347816424fe1a1748aaa83449b8377aca6cb4606b764cf80b49e40d2aceb6d9f89d624c35b1a7716a20df5ce0069f08a44fe63459ecd3b700332211d7fdb35f2b9928dd62acba59643", 0x100, r4}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r7, 0x27, 0xe, 0x0, &(0x7f0000000080)="f8ad48cc02cb29dcc8007f5b88a8", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) syz_clone(0xa012c000, 0x0, 0x0, 0x0, 0x0, 0x0) 54m1.159907032s ago: executing program 1 (id=4121): perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1818, 0x2, 0x0, 0x0, 0x0, 0x1b24, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r4, &(0x7f00000001c0)="ad8f02a3c259fdc525b149ed8cf7d8912d08535d2692121bfbbe73a80f5ceac938cf3a8e634f381782a57e5090f892625fb29137cd812fe7f6577544803a1461008d0d995826588253679fac5efe13e6352cc1155cfbf556f1391dc635ecd23c7f196acd9f82b5f3586a58db24af1df74a25438da333a4f5ceaf873fa8b3d504872d1f71a2f74aa8ab30e2ab07fb805295050c44d63fbdad4252a1847e32290c26f9101a2fb85069421031ff8566f5d4f1f646f13a9d7a883ac1fbbcf44b51c03212d87defa7adfcfa3eee29213e6b6a493035c08b722203", &(0x7f00000002c0)=""/130, 0x4}, 0x20) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 53m46.149762141s ago: executing program 32 (id=4121): perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1818, 0x2, 0x0, 0x0, 0x0, 0x1b24, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r4, &(0x7f00000001c0)="ad8f02a3c259fdc525b149ed8cf7d8912d08535d2692121bfbbe73a80f5ceac938cf3a8e634f381782a57e5090f892625fb29137cd812fe7f6577544803a1461008d0d995826588253679fac5efe13e6352cc1155cfbf556f1391dc635ecd23c7f196acd9f82b5f3586a58db24af1df74a25438da333a4f5ceaf873fa8b3d504872d1f71a2f74aa8ab30e2ab07fb805295050c44d63fbdad4252a1847e32290c26f9101a2fb85069421031ff8566f5d4f1f646f13a9d7a883ac1fbbcf44b51c03212d87defa7adfcfa3eee29213e6b6a493035c08b722203", &(0x7f00000002c0)=""/130, 0x4}, 0x20) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 21m57.986503809s ago: executing program 33 (id=31433): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x6, 0x4b, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x24c9fdd2, 0x8}, 0x200, 0x10001, 0x1, 0x8, 0x0, 0x846, 0x6, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.dequeue\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@map=0xffffffffffffffff, 0x36, 0x1, 0x9, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x21, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4db}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @tail_call]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0xd2, &(0x7f0000000400)=""/210, 0x41100, 0x40, '\x00', 0x0, @sk_skb=0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000540)=[0x1], &(0x7f0000000580)=[{0x1, 0x2, 0x1, 0xb}, {0x3, 0x2, 0xa, 0x8}, {0x4, 0x2, 0x7, 0x6}], 0x10, 0xa}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r4, 0xffffffffffffffff, 0xa, 0x7, r1, @void, @value=r5, @void, @void, r3}, 0x20) perf_event_open$cgroup(&(0x7f00000006c0)={0x1, 0x80, 0x11, 0x0, 0x59, 0x2, 0x0, 0xe, 0x110, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000680), 0xe}, 0x102810, 0x6, 0x6, 0x6, 0x343f, 0x7, 0x6, 0x0, 0x41, 0x0, 0xe08}, r1, 0x7, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000740)='memory.events.local\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r6, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x10, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0x2, 0x7, 0xb, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x93, &(0x7f0000000840)=""/147, 0x41100, 0x8, '\x00', r8, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x6, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000a00)=[{0x5, 0x1, 0xd, 0x6}, {0x4, 0x4, 0x6, 0x6}, {0x0, 0x2, 0x7, 0x8}, {0x4, 0x3, 0x3, 0x2}, {0x4, 0x4, 0x1, 0x4}], 0x10, 0x8}, 0x94) sendmsg$tipc(r6, &(0x7f0000000dc0)={&(0x7f0000000b40)=@name={0x1e, 0x2, 0x2, {{0x41, 0x4}, 0x1}}, 0x10, &(0x7f0000000cc0)=[{&(0x7f0000000b80)="9269", 0x2}, {&(0x7f0000000bc0)="004e67c8c34a845d31eee7ff058c6c6cbca6bd9a7f09e71315ca46fdee32aaf9be800722cf7879979312acb880183c486b844242aa99cf249a2749bcd0db7f252d74fc34b6d3f5673ffea47e3bb5d0abfc216b7c5840d4d44711bc1682103bab02da026dbad2e23dfd3bae939525d657b6979c7686159b2cc12db02941aabb86eca9a2792aaf6e18a74ec974d6b728f6706fe7b5e5ad30544a66e1076015458ddd95e382b9ec8e8b74dfd5488a5af4a30e79aa95e56f3b07dd08bb1cc31f9e3902f56f8dd5ad37c1ea3337d51b7e24c964a85a", 0xd3}], 0x2, &(0x7f0000000d00)="0365ee609fd56c1bb92ad3004e363ce3d9b66bd953ba9ea9cda3b73940c5fb1abf0ea71b0fabeb260b9a4f22b4c17e54ad854a9f22ed10ab77e3050215baaf9aada0f0fe096392777771785a729bac0691c0d7d8fcea9f820718f7f693c59ddaacf5cec44c4a0672f825b87e303de391ad3121c76223e9a37ceeacc7f038cd5686c29c8ef476ba654a5754b50df911e66ac76a950d4a17ad49a45174c028dff3bf11bb1e6e", 0xa5, 0x40}, 0x40000) mkdirat$cgroup(r1, &(0x7f0000000e00)='syz0\x00', 0x1ff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0xe, 0x2, &(0x7f0000000e40)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x1}], &(0x7f0000000e80)='GPL\x00', 0x0, 0x54, &(0x7f0000000ec0)=""/84, 0x100, 0x42, '\x00', r8, @sk_skb=0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000f40)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000f80)={0x1, 0x1, 0x5, 0x6}, 0x10, 0x0, r1, 0x3, 0x0, &(0x7f0000000fc0)=[{0x5, 0x5, 0x2, 0x5}, {0x4, 0x2, 0x3, 0xc}, {0x7, 0x4, 0xa}], 0x10, 0x1}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001140)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000001100)='@\x00', 0x0}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000010c0)={@fallback=r1, r9, 0x30, 0x20, 0x0, @void, @void, @void, @value=r10, r3}, 0x20) r11 = openat$cgroup_procs(r4, &(0x7f0000001180)='cgroup.procs\x00', 0x2, 0x0) r12 = syz_clone(0x10980280, &(0x7f00000011c0)="affa59a91ece5d35e76a9790b8447be06a1223c94e4fb25ad05c6b974f4f0e21ae8257dfb0f03cab9f74e29425b2cbc83eeb342a544593ea1098ab33d766d9e897057a500afaca3c42d32c96110106469e20d157a14097dda0a9cc6a2e3a", 0x5e, &(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)="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") write$cgroup_pid(r11, &(0x7f00000022c0)=r12, 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002440)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002400)={@map=r13, 0x1e, 0x0, 0x1, &(0x7f0000002300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000002340)=[0x0], &(0x7f0000002380), &(0x7f00000023c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000025c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x50429854, '\x00', r8, r6, 0x1, 0x3, 0x3}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002700)=@bpf_tracing={0x1a, 0x7, &(0x7f0000002480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3083f68c, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x8001}, @generic={0x7, 0x6, 0xb, 0x3, 0x7f}]}, &(0x7f00000024c0)='GPL\x00', 0x100, 0x7b, &(0x7f0000002500)=""/123, 0x41000, 0x0, '\x00', r8, 0x18, r6, 0x8, &(0x7f0000002580)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1ad75, r6, 0x7, &(0x7f0000002640)=[r1, r15, r6, r6], &(0x7f0000002680)=[{0x4, 0x2, 0xa, 0x15}, {0x5, 0x2, 0x10, 0x6}, {0x4, 0x4, 0x5, 0x2}, {0x1, 0x5, 0x6, 0xb}, {0x0, 0x3, 0x8, 0x4}, {0x3, 0x5, 0x1, 0x8}, {0x2, 0x4, 0x6, 0x5}], 0x10, 0x5}, 0x94) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000027c0)={r7, 0x849, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002c80)={r1, 0xe0, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000029c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000002a00)=[0x0, 0x0, 0x0], &(0x7f0000002a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000002a80)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000002ac0), &(0x7f0000002b00), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000002b40)}}, 0x10) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002cc0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002d80)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002e40)={0x7, 0x21, &(0x7f0000002800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x1, 0x6, 0x8, 0xb, 0x40}, @alu={0x7, 0x0, 0x6, 0x3, 0x7, 0xfffffffffffffffe, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8ca}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}]}, &(0x7f0000002940)='syzkaller\x00', 0x4a9, 0x36, &(0x7f0000002980)=""/54, 0x41100, 0x2, '\x00', r17, @fallback=0x9, r18, 0x8, &(0x7f0000002d00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000002d40)={0x4, 0x9, 0x1, 0xfffffff7}, 0x10, r19, r9, 0x2, &(0x7f0000002dc0)=[r15], &(0x7f0000002e00)=[{0x2, 0x1, 0x3, 0x54d77fce5be80b8a}, {0x3, 0x5, 0x1, 0x8}], 0x10, 0x80}, 0x94) syz_clone(0x54008100, &(0x7f0000002f00)="d129272b9e860c75751d5270ccbe836108dee745bc77425a2bf7f55dc1c3418105fa8ec594a0c9eb10fd964fbc427595164527abe5868116155f6aa2bce0405561593324e2c0fe99056646198908bfc2b3539c2a87a01c70d93916e0c6f8064a1f3ca64b93c0ccb058f51a560201bb8776157a13301740d30b85fb08bb4acfdf4a7671c14b40bf210ce49803e72ab869bd787501d495816c6b42cd40b744699fea8ed39db41cbf4c1dfe0e10b15fa1bf5acf1e23d9247baa8542a8d01ed82493f9e10e6a47fe6ff0b98a6423a3321060f66b78140fc85a8f79ea8326cbe579a7e97485a5ed4caf921645a5a3d599a01b3e5309f3bd5044cf", 0xf8, &(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)="272cefb7ed0c13eee4d3150ad616a53446a55cd0") 21m41.517419673s ago: executing program 0 (id=31700): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10, 0x2b, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x13fe, 0x0, 0x0, 0x0, 0x81}, {}, {}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6f}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) (async) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) close(0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x0, &(0x7f0000000800)="0000000000000000606b53cc7273", 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x1, 0x1, 0xffffffffffffffff, 0x12}, 0x50) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) sendmsg$unix(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000200)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2c00dbf6e97158cf474fec87891f6d76745b686158bbcfe8875afdef00010000000029"], 0x66) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x600000000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) (async) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) 21m39.518513957s ago: executing program 0 (id=31703): sendmsg$inet(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x64010101}, 0x10, &(0x7f00000029c0)=[{&(0x7f0000001740)="0335dc8ede2c0350da197afd38ed394c2ab829e620116218e774855194a3544b50aa5bfec72b24bf6cf2a6f65515f4a72ebb4a055000ddec9dd7288560b77627f38e0a36cad3bc35c5fcc8977cda6379468e7b5626cac80d5371eae39f708b3576da172475e151b02e10acc42558e5c875559c99697edb8ec50a107aab81e3d812b9c096fe0879633a2fee52467d5ff8784ce18f69ffbe47ba8c2e4369065eb11f651b43c930f1e5bc0b768fce2cbe9dd1c8dc1ea84f94681e113131f29153c282b8a8b03974127720ef1418137d53b8c8e23167a7fc75b78cfaff139db2db4d7614da0867c7b7c04eb484e43a2ca9f905911e95c25fa4706909e3f9c050c6c2975535a4bffd60b0e0190dc8a217a0953fad27335dcfd6bd351adaf450c5c0c3ebb95bcb50cdd5f4d4b6850e4f44130adaa662fd7f13ecfe5b8d8773e6799c4dcec7cd15186214020c566ec82394fd088909bc94f2a7e8f480b983bbff5b3ee5418286e3571a90e934a42c99b8cdb88a7a5d64e0b069402b59e44501cc724212cd31cc1dcb7ec21d49e1220e1f56cfd0218e731592aa419982c1c182084a5d0865d40168eb22851f85b40119a01c9376ecfc7903e3aa5a09e578aa8739d1966004f04c215aef2f1697530ef931786cd8946135dd80bac42aced8364f883be5ea64683f0737dcc7fcdb5cbb9cab31654ad2a4ba6ef468038b57b456934f08d9f7c32bd942b11afdc1f915a4ed1d50cb334edb9832bc02a46e838946e20edaab15a1cb0bd834497e0c92d318a3cfd239bca69d4821631dd7c22ae97b8b23212ce7bd97fa0a5783b39ece8e1f4183a7f9822d44af398231dac399567394b51841003d65979bc0f6f7c20efab6bca839a7689d6b69a7f4b932775ebaf6c03d0d180935d55c2b0bd428ad1dffdb9a17c01970ce18371c1ea86a5ff5726683c6957ec25f2bc53ee84fdf07964b593d5c6bc4a497e02a2732b32fd8916f98a18a2b520a500320eee5345b891a913dd0df1f990bb6a189b59f367df420a8cdb97a14507f9255f833e6f91efe5abd2a7ccde8335e3745f7a906f623818809a024a20ae384b0ede7839ee54dbf96cd4425bf0ea6abbf9f4a819246821cd22b46967e70134debf78bd1a7cf79c55e98a15a60629374f8d233b2d5aa010a0791e6b656aa1fafd080a6b0e91bde2676aeceb6b7cc1a3178dc2cbc6afbf41da8b187e0924a6990d762e96f36e3e2badda61e15ab55ae81ad6599f56b97b32cdde8ef078169fd9322f937b974caae062ee3c845055017f3b097d3db3ff8d2843aa572c113b30ee8389c2d507f32aa77b5633a8a17c39e07cc1cbfb8e5d14460c01a0658989a5105261dc48142c39d647cbd09506e43b6cd67b5e4d058265fb46e5f9309422231673d82be55346253c7d643b6ec104ae5720d056a8bde2793a0c01b3f32c72af1983339aee3cb8b15a8368a2240413680cf8129f1ca2df9ef333840557ef6556eaa9b0bc0a570c15c1970e124780feb48a8af20d40c8c6bfa489d94e72a95464cf7dc38d96b8e9ca6dc67c22e92e7bbf5f2538aee9a18eca636dacd411ebe91c3de5d511eded768bded334c9fa5315d7db86c7095a671db52664424892df0576b4f4db93ece3fe9a34500f58cbed9ba25a3316b1b9ad74c8cd8f0aa6eec673137d48aaaa22a5ff396a0125ae7f6680d353b2de7d5b08259f644cd29f8efa359c4db6d63b780aedd93525a77d6af924003ee718fc5b93a743bfb1e737e465e874ceba3c3e1f0a580d37db349f9aaca5b93007f749edcfd9ec1493a3cc77d828f0d449dd34453dabe2f29ec19599b9e8bce88795d61e196fb64a618cf2bad6c9340d1d3a117d7ff888209c57510359d8f61244c25c160dceeb67dc13d9a9e8c606adafda854bb06aa6a5406c811b413c9a5843dd4e1e061b21e2ee508e6d09cca3fa5df3b0d8d8066ac3c041ef3012c643c837da7d2b1245a8590187ae21d1544ab68aff8413c76eba1b0fee67ee98f83cb6321806b137840f3abd7e7ace269f96af623d81b04b6b5720386bf6026b98263b0b1b6670d2653103e529a3a7a40d29d0c9e16570b936414d3ebeb3ea44551da724106592217620a703b497e58188fd425e8a8483a83e97a69dee7b98397757bfc83769f20e877050e23260a0d5ed944cb9cacc41e0fa81577ac75c7df412097d9605d8c29241e1eef44f372f236ef91f4a63ddea3a4335fe164211f9af02261a886b7726ffd5f3df069597f5257cff69ea70a7af5c22fb58cc1782aabe971d278e0683332e3994b2a6f45fbd8df0462d8bdebb7ad6c765a55b9084828071d9ac1ced1063b876f9ae47c599ce9579b0fd88f3e4d42728174f5713cf2f2095eed5b898404cea870343f44e610142fdc7aa89bfbebfab01f1c5b6d057a949d5eebbe80117334f15cec4cd0c8dd1fb77c60c001cf943f75e341438bf2406cd8bd8b0a7c33bdc8e7e6ca59f774182efbb0a0272b7fd5980bbba70a66c70857133d320590034320860fc16b134dd320b4cf4a05a726a1fe137f1817690b1d731a931471b3715c467805ece3a0a5656a3805fc043d18de3a07b87179661ba204323ade02846bf71917df2f7d54e2687e223c0e046c67a717f0d0dcf03a63044aaeead0761246e778948479efc988f6ac3bf6b6704b24bc0ef112c33843c9e19963ae8ddb351ecc4ea8d01d7324e4b5b5bb47ee6d62e6a805c409795f598c8f3a79b8c05bfe509e293129ff36320cdb7e527339eb03dd3f0a7813c53a07559b24ddd460b87c7ddc4caccf4d026354d6165fdd03caf98e9ff39a9d98f06bc3c90a84f300dd68d480b999fa735abe6e1055b083263a02be7033b48896c93f765ea8b2c714c2a897934dd8ff667ff213a971507d3456deac08f9d6f812482a74738ca3177ffcbc0f33c85224be6bb2a4855d45b8a0b3870a7df0ab8dd9d7cedf49aabb13783d0b963bf59c1129adc3e473ba93075fc7abcda57a0292490d650d65fff49d39917b0b88908ef5df001744706223f2b66c22d764f720aafb2565906737ccd2cf17cdd84ee12d0f01072bb5bb1789f5a3331914c2718107b28194447fa5d71df07524d455a66401fae2b8d9dfe6097057676678466059e7b5c0af5cb7c4f024eb1a53361022a3c43d3580032d7b293fad1da3332a48c30724070aac7cdd34f99ed19c00ca26623581154a08ad20a693cc8f1bb517f33b0df0e497b06019b49edfafbf068d19a4e8c7dbb04f8a8e842d6fb0bd9391436cf55bd4856ca746cf3b3bb46751e0f955c245e31007932a0903d881cb514ea8ab9368495df2105d1bd1c21de645d365d775e6d14ce70e455a5c3aa3bce02e46b1441c9074cb3c86f8c60cf0caeeed2c8ac4fd5d5a392e19ce3fa3e0b81d099c10a70d480b34b78bf5386369de7f1eddfd0d8d9bcbcafaa03dc9d70d2fab1255999e896722cdbaed5168f8279f102eda51b0850663fcc2a1e2e6215cddccec467641f23445bd238ed1d9e66aad4ef1dae5d2d67e49a509f2baa694373f1045023467fc81fe619d9129b61be23c7082d319e07a48ebc0613825226701b745068f30db94dba2d94226d966eecadfbadf481c3b4323f0722eb28cee89e28dfe10052c6923cf304b746863e4e5ec2d9ae03e13baf7be295b830724d206354307447b97eeb3b0a7d912171e09e141554c0ae8a31fee26b76d48c1e1420cc5dc577887ee6d3f2547aa90c00d6f1ee33a4f2d074618c40ea31d3c8c042c1cea9cd3e8c3249d0c27d1cec6d1314e3b5ff0ebe55cc0ce12c0ec9092fd4496ebeb745c70c96ad6e55c7a1474b5b3b506e2a36aa1af66c34b4c4c96884df4b12fa3f4458b316c9abeeb14c9fcb63f1b789d67655c7b3c56410979b61f46808746094112451284e0f83c0fb0ddd6c58abd620f8df17211356f2737b9792687ccea34f7ffe103dacb620f8c6b65395515988cd50deb6b902bbe4db481c04c9730ce5543251b382fd2fbf37fa8371fd77708dd199e21b4ca6a9ea3d25ec69da81002892057e2a34637c1016aa539b701c2a4a3360d2da7b01903feb955f9b8abeb99fdf76c3f46f5930485d61886fd5fc0f2cbcb69701c6fb548ef75d23814ed7c1fdc76cc939afca2ed497b4b640cc840e1843c7dcc3e866a801c2f64f9cfd509cf06b03e9491f0291870b3fdedaece07b3d23147c2473f50a73144885acf11ee59c3c3d2b153f48253c017881d801401a2fa92e27115f569f7192443e3cbf5e2fc30ba71026d224a9e4d3d3041157ee4f0258960ef421f127cc30609501b9f9c98ec0e22e38a109b9d92f5f1a7ca8f7ff3894525d932b460d2c60c4e0d481f77717558c25362ac835f030ad70f91257d9a7ca33400000a06504498899bf2c56caf47ed5ea0551cc7eb9c046ff0f054c3f23ff9a22afc84c180adc2ccde5eda68c35be83c9c5d8345f4a5d8fb7bd21f9ab578b7d6b45c8139b6f5f705cb13ebe9a380cadc6f9d869285793be93a9bf8d2694c76560ba754f36016a4fe5388dfce76248b80f8642c391b28f5417c18d9b64b2553bb2637b1de4fd0defbbecff0dbcc8f2aaaceb0b57e76efdcd449673e30d19413f1d9f86bb891f7de541522ad30ec3fcd7aa696b20191c8e7ea1414193141ec1c9fcdc33b350a8bddd02e86ab6acf6481fa295a19046ef7d77abf04d1a67f3b57afd2494e5ce7e9287d3f9c7cbe22e8cfd05645cd734ce68f08054c649714d9dbb53d90b8ee8dd9b9291e90186c87dc8fe94685e0024260f5765f617d83cebed4ded0b28b8bee22557d9677bc3ef8e93edba605c8e6d10c182705347472f49969d4a72d884192a92798471203edeff99ed20ee42e7d2c369e2f24a28bf3c6bc1feb913907243557d70286e2abfb5c8aa459fa51df16f5cbbcddb5544b8371ac32b828a97d3038d47deff9270372b3429193011ccbb56325e865f91e8fe2a698f89bc63e66fd6eebc115e836e35e0c4760a68bd59a58010c434360dd628fb429bc9ab92c00331ec02de1bae91ee938f12bb030beec53a5bd88cb7efd8d5e3d00ac434168abc136b380314ad1f22a69420e0803c6cca11dff7246fd539e1eb8b5cb40e54bafc48c702973d3fb2e61c8cf4ade225fda573bca0afb3e9d740991103c7f2b66975dc548694691fefd1570dce1b869e14e291de314fc4825f7b0c83e0f170d5a669aaddd5b257024abe5e84d5bbd3654b0e8449d80372a6d909d6a932d9ed219ea7fc2c5bf3a21ea0e3a3bb31bbf41ad00f3c03ac7c8f2daa69e3a552ccf557f135fc3b7979a3c8fbd0ede5ae9cf16abee71d510d0f9c218c1b9eb6a1846ef835682ab5b2bb378e4073263717467384dd0eb76aad5fcb0e1094daa839e6b4ee0c9fb6fa60b96cc3fabd9b33fa9b5fee5661b5b1401a9f994a0690e8bad51e8e19c3b2484b9479a6ed85aee67aa7af4f7e721b01287c9998801c3bf7d33e7006e7f5e99fb538768ab838a5d853071d6984d418d745a3e87ed2c6f4de46e18a15e95e4e3199b3881ea07446e130a66d9456a06549dc3294a63a57d51c78cb301b73e351346615398c4e31a98970e655ddacdb2803ce56172d4bcc0bfc303984def433dc1fec79fc743da177af97c7423b31b2cdfb83b1f9b9e6dddf91092ec72cd39ef1616b75d3faf199e887830d2d51e66e46cdcdf9ccfb002b1a8482e91fc9fec811bfda9180cc506b0b28a3d272b1d0183b94a8a505604d8cdef825c06a1407106424eac5bde5cdc65d74fdc99bd2df6bfc62b84c1eb17c31d85e6f8d15f7b159ef0d904fad0fd0753aca0", 0x1000}, {&(0x7f0000002740)="b39700610ce9b2652a517ff2e60271b85af4560d722770ff7de60e0b2024bfbd9ac7816bdc3fb464ca3a38b31a1fe99ed7cb6c01ba551527a6d6646179949fd68db23ba26ce419360f4845451a574ccf8506a1b9d4cf0dfa3d8e0ebf5fd0907ace595b34858c5ea737e39bcf63d8", 0x6e}, {&(0x7f00000027c0)="9f5a23aab0b95ca035848f0aa1", 0xd}, {&(0x7f0000002800)="477f08ccf9063c3c4c6b28b679a7dabb10e17549fecd1d99b3ddbadac8fccdc0f656d32a12ff82", 0x27}, {&(0x7f0000002840)="dc97903e2d3cb813c1c80250c17b96eaff030565e6ad88311f9c34d3859c637143e0281040159dc3487884ac3a653e13810b419eb4a133314109169f3685fb16bb041f3218d08cba775ec6c051a826a2786fb50f7d4dedebafc0d2c61391b6f2bec5e70e33c436435c8cc061976c5db4f0674e3bbf89456b00e26ed85109ca9191aa8c729f8795362876730bf410a3ee775dcf1dce04f3268102634fa9c710e5f00fcb7d8173c8d6bf5bb37f880e6a36acf0954b43b6a6b7b3419d6895fc014d8bf346d1fef92df257880cf40a2bc14021ffd5ae8cff4e2cce7ee838a689108369", 0xe1}, {&(0x7f0000002940)="848e0c2a98a4047bf04481bb7e331c53ed45c1647f38724930c21605a5478dcab30cf6099d347eabc46551f879ebfdee18fbef3950a72974247d3b55ad029c525529", 0x42}], 0x6, &(0x7f0000002a40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x30}, 0x24010810) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x110059, 0x0, 0x10000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0xa, 0x5, 0x7, 0xc1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0xa, 0x5, 0x7, 0xc1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0xe43986f95b0e4309}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0xe43986f95b0e4309}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800}, 0x8050) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000840), 0x4) sendmsg$tipc(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x4014) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) sendmsg$sock(r2, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x81) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000077cb0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0xa}, 0x800, 0x80000000000000c8, 0x7fff, 0x0, 0xfffffffffffffffd, 0xffffffff, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x33}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2212102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa00006558"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x3, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 21m36.927591637s ago: executing program 0 (id=31709): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x69) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r1, 0x0, 0x111, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000000180)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x58d700, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xc, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x4, &(0x7f0000000080)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xfff0000000000002, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000400000004000000f4ffffff00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000015f2000400000000006df0993f4b2af32190ce4ef6be4cef42da9054216f353279763e88ba7fb037d4048ee4dd436a000000000000000000"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400000005000000aa"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r5}, 0x38) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2b80"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="08000000000000000000000000000000000000009663e0c6bdd91c081054df5daad0b1deaf1dd105414636f6f14f74428035edce0c9ccd76f15cec0765eccd4f", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="00000000020000000500"/28], 0x50) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000010, 0x0, @perf_config_ext={0x10}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8983, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000280)={'ip6gretap0\x00'}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 21m36.171714847s ago: executing program 0 (id=31713): r0 = syz_clone(0xae242e80, 0x0, 0x29, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x6, 0x4, 0x2, 0xec, 0x0, 0x1, 0x80049, 0xd, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x200000000}, 0x18, 0x3, 0xb, 0x6, 0x1, 0x9ac0, 0x94e6, 0x0, 0x6, 0x0, 0x9}, r0, 0x7, 0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180)=r0, 0x12) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0xc948}, 0x8) 21m36.170316197s ago: executing program 0 (id=31714): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711807000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r2}, 0x4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000e40)='ns/net\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0xb704, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x3b) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r5) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10d018, 0x400000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x80000002, 0x0, 0x200002}, 0x0, 0xfffffffffffffffe, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3, '\x00', 0x0, r9, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x0, 0x3b, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x1, 0x5, 0x3, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000040)=@raw=[@ldst={0x1, 0x2, 0x3, 0x8, 0xa, 0x20, 0xffffffffffffffef}, @jmp={0x5, 0x0, 0xd, 0x3, 0x9, 0xffffffffffffffc0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x4a, &(0x7f00000001c0)=""/74, 0x41000, 0x12, '\x00', r10, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x1, 0x7fffffff, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000980)=[r4, r4, r11], &(0x7f00000009c0)=[{0x5, 0x1, 0xd, 0x7}, {0x0, 0x5, 0xc, 0x6}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r12) 21m30.12694586s ago: executing program 35 (id=31685): close(0xffffffffffffffff) (async) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe40, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8862c00dffd0013dd000000000000000088a8f5df86dd", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) (async) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='N-'], 0x6a) (async) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='N-'], 0x6a) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="b4050000000000006110040500000000000000f79900"/32, @ANYBLOB="8064250f89a326af15ceaa4f6a6f3c22b3d16822977fade928acf271252592b3fb54cf2d33e1ca3bfdbd", @ANYBLOB="e5f41d8e864012c32beb61a9a3d559318863882fcaf5cdfa60be2e8403db53205015be42d29e2a483dc77935aa767bc742"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x6, 0x1}, {0x4}, {0x8}]}]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f0000001140)=""/204, 0x49, 0xcc, 0x1}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000080)=ANY=[], 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="011af1a900"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 21m21.899545652s ago: executing program 36 (id=31711): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000010000"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x5, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8941, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)=@o_path={0x0}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000180)="5fb90c5c4426cc8fa8574be842c1", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1300000000000d0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000010c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002f00000000000000181000008cda5fe7b0f198baefbe1778a20ef299a72ae2c8390afc8dba48fb454fc2cb51922470ea6241f92d04603d86c2aae06bed5c3bd3fc240e8d0f60ffb3948bf2539a6dcbad0ff5a5aea213f8e1aff8d62e1bfe6495bd64ee7378a550904de9e0248fecc80d8d5375e1515c0e56867d9168de1f69edfb34f08701aee93bc2d24d9a28efa4d2dff28fb6f79f2bbf8a75dadfa4764b6f9aeb4120f53e6b0ebbbab0d4cea0d095eeb2af6218617b2884429e8a03f7b026c60de94f264800b7229b72c31a669d856c9f17965220809253eee348c239259f6c0b54a3f39b4b68caf616de79b4978acb0386613120f1a16ea094c642970b638814cf795c6f0760785c8d908f41fb914dae1cf0393738639aec5fd9ff80aad4048068ede440ed1969f59caab22da1f8f686985f33788ad630c74e44849edc58fa9e03fd2c2c94fa7186daa149ae6eede8b73a1a5369273cd3b367fae5b9dea3987d4d8ee3475fa2fdfcbba91d10aed1f00da8920fd35542b1511d6d5fbae624d84f7b0b89f98e23c5e6b98c78a0b0a54508b821add4f9fd1bdd5fe0da3b251a15e548d5d142b0c99209bde20f2efe1a4cfd56e18971f780f6920939aa29997b796eeaaf2b5cfd564bf85b0defc217ea04b06a9e4e484553444a67561cae8c3cd23ba804a036b95568bfdb78110f28ecd067b4e25815a1", @ANYRES32=r2, @ANYBLOB="00000000000000009500000c000000009500007000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x20, 0x1, 0x1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000340)}, 0x40) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000090000000500000007000000c1000000", @ANYRES32, @ANYBLOB="0000000000000080000000000000000062adf9d9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="2002000000000000000095000000000000003c5cc9b66d9477ba06277f27d938ceac5afc2d2a2134c5cf234b91684bae42cc439118237deff04d9ddee569fedea727bcf65ef5d7ff90d2ffa099fae36cc6782fcdc84b0a775bff7f000068edfaf8de1788be5670ad39430c5763e242a5af549a607d3a824c290d144a06a5249fe0de87b78785c777d3a166e7b9ebef132f0084856cdfea71319dff9826ebb9223a584bbd174526f231b24125840b672545a67cce9144b029a3961e7c5f"], 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) 21m21.741241636s ago: executing program 37 (id=31712): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000010000"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x5, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8941, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)=@o_path={0x0}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000180)="5fb90c5c4426cc8fa8574be842c1", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1300000000000d0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000010c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000000000009500000c000000009500007000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x20, 0x1, 0x1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000340)}, 0x40) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000090000000500000007000000c1000000", @ANYRES32, @ANYBLOB="0000000000000080000000000000000062adf9d9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="2002000000000000000095000000000000003c5cc9b66d9477ba06277f27d938ceac5afc2d2a2134c5cf234b91684bae42cc439118237deff04d9ddee569fedea727bcf65ef5d7ff90d2ffa099fae36cc6782fcdc84b0a775bff7f000068edfaf8de1788be5670ad39430c5763e242a5af549a607d3a824c290d144a06a5249fe0de87b78785c777d3a166e7b9ebef132f0084856cdfea71319dff9826ebb9223a584bbd174526f231b24125840b672545a67cce9144b029a3961e7c5f"], 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) 21m20.802078751s ago: executing program 38 (id=31714): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711807000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r2}, 0x4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000e40)='ns/net\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0xb704, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x3b) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r5) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10d018, 0x400000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x80000002, 0x0, 0x200002}, 0x0, 0xfffffffffffffffe, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3, '\x00', 0x0, r9, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x0, 0x3b, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x1, 0x5, 0x3, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000040)=@raw=[@ldst={0x1, 0x2, 0x3, 0x8, 0xa, 0x20, 0xffffffffffffffef}, @jmp={0x5, 0x0, 0xd, 0x3, 0x9, 0xffffffffffffffc0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x4a, &(0x7f00000001c0)=""/74, 0x41000, 0x12, '\x00', r10, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x1, 0x7fffffff, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000980)=[r4, r4, r11], &(0x7f00000009c0)=[{0x5, 0x1, 0xd, 0x7}, {0x0, 0x5, 0xc, 0x6}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r12) 21m5.825192959s ago: executing program 7 (id=31814): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000640)={r0}, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000003000000003800000700000011"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r2, 0x0, 0x1c000000007400}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000a80)={&(0x7f00000007c0)="1c21b3938f2b02261fe31881c8dc37bfadf675ef9004f74ca91a0416362edd6f73ba156e83a2a972c20bdcab484c15edf0d554c01d400560944c864d235ec687ead4f8592e4b51d41bbfd0f9cba4187bb5b36b35a4accdb13d795b91fa2afbce0b8edc5c9a621255c6dad1ccd752e215886911074b2038d9335644a58652e1904c9fb0af29a7524fcc8a1730333a05f9c68d", &(0x7f0000000880)=""/172, &(0x7f0000000940)="043a1516aaf5453b01a114e2a129dd03541cee26d61bed2450ef7cca5c08da342d35de5a5c85c611f678ef", &(0x7f0000000980)="8a2f845d9ad3a21c60a5c8a885164e77a6725ffa85842493a4dee55d30b0a586d6094853e3d90281f28137a332f436faac21ca926e3ec6635cb13ce03537f16e813b6040d460e22eb3fe222925a756cca6b5073187e7c6485b528e0b8783f8062b4f1e5f11ba9efffca1e344ef4cc252dfa4f0b50b5d0719d18b4b660b77fad1e32ff49b923cfa947cffc892cb81c9fe4d14258352fe9626934830959be37b8987f56c5ff09e04cdb6c74253798e9f48be5c3fd9a1b52209daeb4f9d33122c811dfbadf1c171bf1569d489318460415720a453", 0x1, r2, 0x4}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r2, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000006000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000100000000000095000040000000002af3183cacdeba8c19b84c9c4c928619d73646677d69b822df1b9a48a1c58fec78450904be5bbf2f402899dd870ec7f6b55ed12aea3b8a26fbd2e4b95946895a0ab65656393805cf956c154a450bed37c61d6cac07e02a"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x120, &(0x7f00000003c0)=""/189, 0x41100, 0xd, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0xf, 0x4, 0xe7}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r6, r3, r3, r2, r1, r2, r3], &(0x7f0000000680)=[{0x4, 0x4, 0x7, 0x3}, {0x3, 0x5, 0x9, 0xa}, {0x3, 0x4, 0xf, 0x9}, {0x3, 0x5, 0xc, 0x2}, {0x4, 0x4, 0x3, 0x2}, {0x0, 0x2, 0xb, 0x5}, {0x3, 0x2, 0xd, 0x1}], 0x10, 0xb7}, 0x94) close(r4) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x800141, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x80047456, &(0x7f0000001200)) 21m3.351392535s ago: executing program 7 (id=31822): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x72, 0x8, 0x0, 0x0}}, 0x10) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8}, 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x8, 0x80, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000001000), 0x0}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x59, 0x1, 0xffffffffffffffff, &(0x7f0000000300)=[0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}], 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x59, 0x1, 0xffffffffffffffff, &(0x7f0000000300)=[0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}], 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 21m3.244074888s ago: executing program 7 (id=31823): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x69) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r1, 0x0, 0x111, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000000180)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./cgroup/../file0\x00', 0x0, 0x18}, 0x18) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x10}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 21m2.066111939s ago: executing program 7 (id=31824): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8913, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a08\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="d6", 0x20000041}], 0x1, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @multicast2}}}], 0x20}, 0x0) close(r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x18, &(0x7f0000000300)=@raw=[@call={0x85, 0x0, 0x0, 0x1e}, @jmp={0x5, 0x1, 0x6, 0x9, 0x8, 0x100, 0x4}, @jmp={0x5, 0x0, 0xa, 0x8, 0xb, 0xfffffffffffffffe}, @alu={0x4, 0x1, 0x0, 0x1, 0xa, 0x0, 0x4}, @exit, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @alu={0x7, 0x1, 0x7, 0x4, 0x4, 0x50, 0xffffffffffffffff}], &(0x7f00000003c0)='syzkaller\x00', 0x38, 0x0, &(0x7f0000000400), 0x40f00, 0x90, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x8, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[0x1, r0, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x4, 0x2, 0xa}, {0x0, 0x4, 0x6}], 0x10, 0x9}, 0x94) close(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xb0}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2e0, 0x3f, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008001be0ffff00fe4000631177fbac141432e000031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25", 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e00000000002f"], 0xffdd) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r8 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x7, 0x8b, 0x3, 0x5, 0x0, 0x6, 0x410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x88e700f476c20a2b, @perf_bp={&(0x7f0000000180), 0xc}, 0x100280, 0x101, 0x1, 0xc84127a2bc29a3af, 0x8000, 0x95a, 0x9, 0x0, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r8, 0x0) perf_event_open(0x0, 0x0, 0xffefffffbfffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 20m59.336691791s ago: executing program 7 (id=31831): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110c200000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8fffdffb702000008000000b7030000000000008500000008000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xdbc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8948, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="c5198be3fb20b3d93ff74cefbee056a8a0d248dec5cbc34aabafa7bac964c7895f3b703122082c69ebd28454ceb621e8310af25e183e53d9022d1703c419a6d74c40586933310488e7bfa3f4", @ANYRESDEC, @ANYBLOB="00000000000020000000ff0f0300000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r4], 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r2, r6}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000027c0)={0x6, 0x14, &(0x7f0000001340)=ANY=[@ANYBLOB="18280000", @ANYRES32=r1, @ANYBLOB="00000000040000006f7204000100000018360000020000000000000000000000b7080000000000007b8af8ff00000000b7080000ffffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000160007040000f0ffffffb70200000800001018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000800000085000000a5000000272b1800ffffffff8520000001000000"], &(0x7f0000001280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x10, '\x00', r7, @fallback=0x23, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002700)={0x1, 0x0, 0x9, 0x3}, 0x10, r8, r2, 0x0, 0x0, &(0x7f0000002740), 0x10, 0x8c}, 0x94) 13m3.108016768s ago: executing program 9 (id=36998): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xffc0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r0}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000010000000500000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r6}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f0000000880), &(0x7f0000000100)=""/55}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r7, 0xc0189436, 0x8000001ffffffd) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) getpid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r4, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', r10, 0xffffffffffffffff, 0x6, 0x5, 0x4}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="090000000500000008000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa10000000000000701000008000000b702000008000000b703000000000000850000000500000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0xffffa22c, 0x18}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x7}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x6}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x4e, &(0x7f0000000100)=""/78, 0x41100, 0x49, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000180)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x8, 0x1000, 0x8000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000600)=[r3, r4, r5, 0x1, r6, r7, r11, r12, r13, r14], &(0x7f0000000640)=[{0x5, 0x5, 0x8, 0x9}], 0x10, 0xceb}, 0x94) 13m2.222587492s ago: executing program 9 (id=37007): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="150a0000000000006111040000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0x53, 0x0, &(0x7f0000000080)="481ead4ffcd3c39ffc84ed045c38c3fac9d4a6289c36724019f9e5c4e6cc504262d8fbae650c9dbc8ca31e9d61b44b38ee54eb866712406fed1a085530b81db69b54fcb5164738de2d77c4ba96c7475555f28d", 0x0, 0x8, 0x0, 0x29, 0xa0, &(0x7f00000001c0)="e3715fc07d5d2e129719312a2a6878ad9c44b4890454dbfcda29bd9c0b7b73a5439fb94923fd157772", &(0x7f0000000200)="2128f7720b94964664fd89b853c6c8d1fbada92d85acf3364b353d7e345adaa1ccf6b089906b25d8f31626716c27c7973c0d8f0c19261833c64a95d6bd46348167722b2adf3f0babcdcbdecf51687c48473e57151d9d914e76fb0c70246fa453834f9bbdf5fbbe4a6827ff7b3ec104aa9a7d8b508ee56598750b6b6f14484f93333eb54991c8e2061ded3a3c684243873c3614facc00a229d76cc6b8bb3ec1f7", 0x5, 0x0, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000780)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5c, &(0x7f0000000840)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xdf, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="c5198be3fb20b3d93ff74cefbee056a8a0d248dec5cbc34aabafa7bac964c7895f3b703122082c69ebd28454ceb621e8310af25e183e53d9022d1703c419a6d74c40586933310488e7bfa3f4", @ANYRESDEC=r6, @ANYBLOB="00000000000020000000ff0f0300000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r4], 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r2, r8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000027c0)={0x6, 0x14, &(0x7f0000001340)=ANY=[@ANYBLOB="18280000", @ANYRES32=r1, @ANYBLOB="00000000040000006f7204000100000018360000020000000000000000000000b7080000000000007b8af8ff00000000b7080000ffffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000160007040000f0ffffffb70200000800001018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70500000800000085000000a5000000272b1800ffffffff8520000001000000"], &(0x7f0000001280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x10, '\x00', r9, @fallback=0x23, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002700)={0x1, 0x0, 0x9, 0x3}, 0x10, r10, r2, 0x0, 0x0, &(0x7f0000002740), 0x10, 0x8c}, 0x94) 13m2.118635514s ago: executing program 9 (id=37008): write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) r0 = syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002366d6c796b74ef500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000021", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES8=r0, @ANYRES32=r2, @ANYBLOB="00000200000000030b0464000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES64=r3], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280)=r4, 0x4) r6 = getpid() recvmsg(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/180, 0xb4}], 0x1}, 0x40000100) sendmsg$unix(r4, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000240)='c', 0x1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee00, 0xee01}}}], 0x20}, 0x80) 13m1.214781948s ago: executing program 9 (id=37019): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x8, 0x3, 0x2, 0x6, 0x0, 0xffffffff}, 0x0, 0xffefffffffffffff, r0, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 13m0.154598446s ago: executing program 9 (id=37036): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00'}, 0x65) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x101800, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000240)={'bond_slave_1\x00', 0x400}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f110800", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f00000002c0)=r4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104042, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC=0x0, @ANYBLOB="43da5f5f"], 0x48) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) 12m54.114893196s ago: executing program 4 (id=37132): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @fwd={0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x60}, 0x28) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) (async, rerun: 64) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40}, 0x10}, 0x94) 12m54.032672828s ago: executing program 4 (id=37133): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x2, 0x10}, 0xc) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) (async) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x8008080, &(0x7f0000000180)="f11828a652370a59be9b0219399f9c5ba5a7cea36fa009d339b5254c6bc612dd08cbbf9f34a92c3cbe4dfabcfbc4a1d432fe09e38414d728c2be47cd4e5925476eab86ee14ebc0d095c4e8ab8867590913d64db95a42793bc8830f21163bc1d2ee76bf1f9fccd6777a5e58a7841adeb8114aa7ec3c2d0c809e161369", 0x7c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="00dd62fda323ff244f0d2c83273941d21693e0c832ccbbed943791824d52eb8a2b3b82633579f9c897599d7274c8a467f1ef722a1db92dd6d3e6f97d1af4dc66f920899d02a561338fbd40a4e2a48162daa01a05a40d53ae") (async) r3 = syz_clone(0x8008080, &(0x7f0000000180)="f11828a652370a59be9b0219399f9c5ba5a7cea36fa009d339b5254c6bc612dd08cbbf9f34a92c3cbe4dfabcfbc4a1d432fe09e38414d728c2be47cd4e5925476eab86ee14ebc0d095c4e8ab8867590913d64db95a42793bc8830f21163bc1d2ee76bf1f9fccd6777a5e58a7841adeb8114aa7ec3c2d0c809e161369", 0x7c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="00dd62fda323ff244f0d2c83273941d21693e0c832ccbbed943791824d52eb8a2b3b82633579f9c897599d7274c8a467f1ef722a1db92dd6d3e6f97d1af4dc66f920899d02a561338fbd40a4e2a48162daa01a05a40d53ae") write$cgroup_pid(r2, &(0x7f0000000300)=r3, 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r1}, 0x4) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x9, 0x4, 0x9, 0x0, 0x0, 0x10006, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xfffffffffffffffc}, 0x120000, 0x5, 0x81, 0x1faedb36a0526ede, 0x1, 0x1, 0x4, 0x0, 0x57d, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0x1, &(0x7f0000000440)="a55219dd38baefef86dd542dda6f5a394e3c4169bca7b253ccd9ed5def2ce3687cdf70b43f28dd07883fe4871e6dad3d5272bee375919b8906bd649b55a6df3a497f1c6bc60803c6ad60f3345d5386", &(0x7f00000004c0)=""/171}, 0x20) syz_open_procfs$namespace(r3, &(0x7f00000005c0)='ns/time\x00') perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x8, 0x9, 0x38, 0x86, 0x0, 0xf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000600), 0x9}, 0x80, 0x7, 0x9, 0x2, 0x924, 0x5, 0xfff9, 0x0, 0xfff, 0x0, 0x1498}, r3, 0x2, r4, 0x0) (async) perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x8, 0x9, 0x38, 0x86, 0x0, 0xf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000600), 0x9}, 0x80, 0x7, 0x9, 0x2, 0x924, 0x5, 0xfff9, 0x0, 0xfff, 0x0, 0x1498}, r3, 0x2, r4, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup, 0x22, 0x1, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup=0xffffffffffffffff, 0x22, 0x1, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000880)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)={@fallback=r2, r5, 0x0, 0x2008, 0x0, @value=r8, @void, @void, @void, r7}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000ac0)={r1, &(0x7f00000008c0)="ab4a68c9f1e7a2c077f58ac19c14766c632f10f2a24ae56677b8bde9f0b481a6f51fd0dcb99f9fdcc6a84311e854ecf1e15d9e760f6f880df5b6514a636db519f310b191d582332de3d39eaf0693b7a37dd554aef9fc40409c01248f61b9a0bc15cbfd92ffd91f7c76880146eaf4fc3eb64b4748f10baaeaf9e557f141c092d80b5e6344f39a5e74ac4f7d135c649d888389b09e7145ea42fcf007e14598a0d89040ffe219b8e64754cad299585901bed6ee6a60eecf3d97d51dd5bee913bf2c8cb9859cff5f3f439962025a8f5cc77e13fd31", &(0x7f00000009c0)=""/249}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000ac0)={r1, &(0x7f00000008c0)="ab4a68c9f1e7a2c077f58ac19c14766c632f10f2a24ae56677b8bde9f0b481a6f51fd0dcb99f9fdcc6a84311e854ecf1e15d9e760f6f880df5b6514a636db519f310b191d582332de3d39eaf0693b7a37dd554aef9fc40409c01248f61b9a0bc15cbfd92ffd91f7c76880146eaf4fc3eb64b4748f10baaeaf9e557f141c092d80b5e6344f39a5e74ac4f7d135c649d888389b09e7145ea42fcf007e14598a0d89040ffe219b8e64754cad299585901bed6ee6a60eecf3d97d51dd5bee913bf2c8cb9859cff5f3f439962025a8f5cc77e13fd31", &(0x7f00000009c0)=""/249}, 0x20) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00)={r8}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={r3, r9, 0x0, 0x11, &(0x7f0000000b40)='\xcd(%^^@$+^(\xad#\\:$\\\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={r3, r9, 0x0, 0x11, &(0x7f0000000b40)='\xcd(%^^@$+^(\xad#\\:$\\\x00'}, 0x30) close(r9) (async) close(r9) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000bc0)={@cgroup=r6, r9, 0x10, 0x0, 0x0, @void, @value=r5, @void, @void, r7}, 0x20) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000bc0)={@cgroup=r6, r9, 0x10, 0x0, 0x0, @void, @value=r5, @void, @void, r7}, 0x20) r10 = openat$cgroup_ro(r9, &(0x7f0000000c80)='blkio.bfq.time\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000c00)={0xc, 0x80, 0x0, 0x8, 0x8, 0x2, 0x0, 0x9, 0x26000, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x6, 0xf8c4}, 0x10111, 0x200, 0x48000000, 0x8, 0x100000000, 0x5, 0x7, 0x0, 0x8, 0x0, 0x2}, r10, 0x6, r4, 0x1) (async) perf_event_open$cgroup(&(0x7f0000000c00)={0xc, 0x80, 0x0, 0x8, 0x8, 0x2, 0x0, 0x9, 0x26000, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x6, 0xf8c4}, 0x10111, 0x200, 0x48000000, 0x8, 0x100000000, 0x5, 0x7, 0x0, 0x8, 0x0, 0x2}, r10, 0x6, r4, 0x1) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r8}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000d00)={r9, r11}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000010c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e80)=[0x0], 0x0, 0xa, &(0x7f0000000ec0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000f00), &(0x7f0000000f40), 0x8, 0x91, 0x8, 0x8, &(0x7f0000000f80)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001180), 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001180)={0x0, 0x0}, 0x8) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001200)=@o_path={&(0x7f00000011c0)='./file0\x00', 0x0, 0x10, r5}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000012c0)={{r5, 0xffffffffffffffff}, &(0x7f0000001240), &(0x7f0000001280)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0xe, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, [@map_fd={0x18, 0x5, 0x1, 0x0, r11}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}]}, &(0x7f0000000d80)='GPL\x00', 0x0, 0x1, &(0x7f0000000dc0)=""/1, 0x40f00, 0x0, '\x00', r12, @sk_skb=0x26, r11, 0x8, &(0x7f0000001100)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001140)={0x0, 0x2, 0x0, 0xffffffff}, 0x10, r13, r9, 0x0, &(0x7f0000001300)=[r14, r1, r15, r11, r1, r1], 0x0, 0x10, 0x101}, 0x94) 12m54.032066998s ago: executing program 4 (id=37134): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1888}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 12m53.993171449s ago: executing program 4 (id=37136): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 12m53.067564444s ago: executing program 4 (id=37147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x12}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x55}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="82", 0x1}], 0x1}, 0x80) (async, rerun: 32) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) (async) r7 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000000)=0x8001) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) (async, rerun: 32) close(r4) (async, rerun: 32) recvmsg(r3, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', r1, 0x4000, r0}, 0x18) (rerun: 32) 12m52.996362986s ago: executing program 4 (id=37148): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000700600000000000009000000731117000000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x9, 0x0, 0x0, 0xc2094, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0xb}, 0x2081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x33}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x8a, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000640)='\\$\x00') perf_event_open(0x0, r5, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108222, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x8, 0x4a, 0x85, 0x6c, 0x0, 0x19, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x9, 0x2}, 0x8014, 0xe9a, 0x9, 0x9, 0x9, 0x3635, 0x6, 0x0, 0xff, 0x0, 0x7}, r5, 0x9, r6, 0x8) write$cgroup_pid(r1, &(0x7f0000000180)=r5, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000380), 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 12m45.135668353s ago: executing program 40 (id=37036): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000000000000000000000008500000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095000000000000002f81c461b3fea834ceb0e17d802cfb227e656a3698c79205e02f1561b0010095448e9f7024b45fb2006c9117fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab02174911d5e51b76d2c31b8bece7b0f841f393c401d8f51383f0f28d4c00fa2149870f1779f204103dbebff2a0e292b42f01b0bb114fa6e1889a6437285a0c9f00c4245e4d3524af00636736e812558294430bf4b365e0a9c468c9eb4977fb131145e0179c4ddb37a6704a36503e63d66ddcf9b8e1035383b90de09d000c223ffb7f13624e3ac52b248f92d041959c1f7985eb94aad8c0adf4e8730313d1b02662c6847a9851f40a969486ebbe7bfcb5b28fc7dbe1bb80c4a2c18a53fecc51e51de59049b0400000000000000394000000000000000d27022ca2e6e8190f483d0da08eef67837ed671c2154513111dbc0ee58c70889a1c6306b98300a49147242d3f8a6e4aea9b51d0e182153e1283089c3b42cca072dce78b07806950d2b5fd0b448fdf18269cbe47fae4cedeb356536d94534260fa7d6e6b7aa30d8dd5c82e448ef52da9f0894bb3993edafc976ad43adbe9731dd41d181a9c2"], &(0x7f0000000080)='GPL\x00'}, 0x65) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x101800, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000240)={'bond_slave_1\x00', 0x400}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f110800", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f00000002c0)=r4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104042, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC=0x0, @ANYBLOB="43da5f5f"], 0x48) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) 12m38.034737161s ago: executing program 41 (id=37148): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000700600000000000009000000731117000000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x9, 0x0, 0x0, 0xc2094, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0xb}, 0x2081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x33}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x8a, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000640)='\\$\x00') perf_event_open(0x0, r5, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108222, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x8, 0x4a, 0x85, 0x6c, 0x0, 0x19, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x9, 0x2}, 0x8014, 0xe9a, 0x9, 0x9, 0x9, 0x3635, 0x6, 0x0, 0xff, 0x0, 0x7}, r5, 0x9, r6, 0x8) write$cgroup_pid(r1, &(0x7f0000000180)=r5, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000380), 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 9m36.644585496s ago: executing program 6 (id=39961): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x4f}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x51d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000009c0)=[{0x4, 0x5, 0x5, 0x4}], 0x10, 0xffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xff9d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000003000), 0x201, 0x0) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000027c0)={r6, 0xe0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002500)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002580)=[0x0, 0x0], 0x0, 0x37, &(0x7f00000025c0), 0x0, 0x10, &(0x7f0000002600), &(0x7f0000002640), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000002680)}}, 0x10) sendmsg$inet(r5, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000003c0)="f91c67b00de40cbd6124b8616ed162fbe815d694d8e4a25316d779472d1ba2f3177df2cfa8ea3e9b9fa11e94d80becade388ce1f058e1a881bf6e2f618618a0462a13640ef93a13cc421cc41", 0x4c}, {&(0x7f0000002240)="545e5dc0331942303c42629c780d421cd54102cc8c97a6b4182e5fd266335f7f6d4a8c665dde9b620260535daf36c6fa2a2af5", 0x33}, {&(0x7f0000002340)="7e22952550db8baadb12936b9446b94a0e3396d13dd713100d2187104677968e2586c9d021278e0d2c75e1524dd91eecb6cc3e5756a0dd2496418eeb", 0x3c}], 0x3, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x64010102, @private=0xa010102}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6f7d}}, @ip_retopts={{0x28, 0x0, 0x7, {[@end, @lsrr={0x83, 0x13, 0xc0, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x3, 0x7b}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0xb0}, 0x4090) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000580)=r8}, 0x20) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x6, 0x1b, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000800000085000000a50000008510000008000000950000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], 0x0, 0x8, 0xfd, &(0x7f0000000740)=""/253, 0x41000, 0x1, '\x00', 0x0, @xdp, r11, 0x8, &(0x7f0000000880)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r8, 0x8, 0x0, &(0x7f0000000b00)=[{0x5, 0x1, 0x8}, {0x2, 0x3, 0x0, 0x6}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0xb, 0x1}, {0x3, 0x2, 0x9, 0x9}, {0x4, 0x4, 0x2}, {0x4, 0x5, 0x5, 0x2}, {0x0, 0x5, 0x1, 0x9}], 0x10, 0x2af}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r1, @ANYBLOB="0400"/20, @ANYRES32=r7, @ANYRES32=r11, @ANYBLOB="05000000040000000500"/25], 0x50) openat$cgroup_subtree(r4, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\r.'], 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='.'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 9m36.592912907s ago: executing program 6 (id=39964): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000030000000000000000000000850000008700000085000000070000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9557ed387dbe8abc89b6d5bec", 0x0, 0xa71f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9m36.403667902s ago: executing program 6 (id=39971): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000010c0)="8c2e076879", 0x5}], 0x1}, 0x20004011) close(r2) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000380)=""/193, 0xc1}], 0x1, 0x0, 0xffffffffffffff03}, 0x0) r3 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x2, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x9) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x16, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000fcffffff1801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018010000696c6c2500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000000850000000600000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r7, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000004c0)={0x4, 0x80, 0xf, 0x5, 0x43, 0x8, 0x0, 0x6000000, 0x28000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x5}, 0x1b400, 0x1, 0x7, 0x3, 0x7, 0x3, 0x1, 0x0, 0x2, 0x0, 0x6}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000001e40), &(0x7f0000001f40), 0x2248, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES16=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14}, 0x94) 9m36.300108965s ago: executing program 6 (id=39975): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) (async) r1 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300)}, 0x0, 0x0, 0x0, 0x0, 0x384}, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r3 = perf_event_open(&(0x7f0000002100)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x10, 0x0, 0x80000003, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001f00)}}, 0x10) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x102d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x5}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) (async) close(0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000030000000080000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r4], 0x48) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x13c2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x103e40, 0x1, 0x0, 0x0, 0x0, 0x40, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, 0x0, &(0x7f0000000c80)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x541b, 0x200000000000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) 9m36.219192577s ago: executing program 6 (id=39976): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x139) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000005800000058000000050000000d00000000000002000000040e00000000000001000000005f002e000d00000001000004060000000f0000000300000000000000020000000000000a03000000020000000000000b020000000f0000000000000905000000003071300065fa44506c0a228923cdcebba370e039c23ae6c318c2d1179b7c58fb112676629a598fd7f96eba6b020045860b07"], &(0x7f00000006c0)=""/119, 0x75, 0x77, 0x0, 0x4}, 0x28) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x100, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x6, 0x0, 0x0, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x490, 0x1fffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000600)=0xfffffffffffffffe, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) openat$cgroup_ro(r2, &(0x7f00000002c0)='blkio.throttle.io_service_bytes\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x7602, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xe, 0x0, 0x4000000}, 0x0, 0x2, 0xffffffffffffffff, 0x3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000006c0000000000711219009500000000000000773d6dbeef899e21a244ee321f4c7820afd6d6859bedf06b5c7359c7e35ba04f80caf1e4fa44a316cb5fc40bf1bd5ee6f162475ff58e0e77941714df0f0eeed1c65bb7c164b85521a6b6ca4706274f7ed4dcf1f1eaee2e096dcaa2748a487ec299f08e52e7fa5fc20242a6182feb151910fa09bb8039bdfde89c92a308dd0e1e6525"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getpid() r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x104046}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r8 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x7606, 0x1003ff, 0x0, 0x1, 0xffffffffffffffff, 0x20, 0xffff, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYRESOCT=r6, @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], 0x48) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r5, @ANYRES64=r5, @ANYRES16=r4, @ANYRES8=r1, @ANYRES64=r0, @ANYRESHEX=r7], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r2, &(0x7f0000000a00)="e2da82a038532ca708072023476608b9fdca8f442cb73b14b1d272250e6508fdbf9594141e1e8ef62bc7ee83bfebbb876120ab34bedf14601a9e14aa0bf2aa3519ade36f19ed28c959c810472ea1466515531446a36e327787cd941da4713a9e3206d432f7df81c675c7a2cd695520043a733b32eb6dc110ac2b466c7cbe8222994ec17bfb42fe8d473f4d18acf5086e15a20a37a0bb48ac122e0a276ee1f914", 0x0, 0x4}, 0x20) 9m36.128403209s ago: executing program 6 (id=39977): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r9, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'team0\x00', 0x112}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x7, &(0x7f0000000040)=[{0x4, 0x7, 0x80, 0x8}, {0x4000, 0x4, 0x4d, 0x7}, {0x2, 0x0, 0x3, 0x6}, {0x5, 0x6, 0x35, 0x7}, {0x80, 0x0, 0x2, 0x7}, {0x4, 0x6, 0x0, 0x1}, {0x2, 0x1, 0x2, 0x7f}]}) 9m21.036281338s ago: executing program 42 (id=39977): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r9, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'team0\x00', 0x112}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x7, &(0x7f0000000040)=[{0x4, 0x7, 0x80, 0x8}, {0x4000, 0x4, 0x4d, 0x7}, {0x2, 0x0, 0x3, 0x6}, {0x5, 0x6, 0x35, 0x7}, {0x80, 0x0, 0x2, 0x7}, {0x4, 0x6, 0x0, 0x1}, {0x2, 0x1, 0x2, 0x7f}]}) 2.681808638s ago: executing program 2 (id=48374): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x1, 0x8, 0x40, 0x42, 0x1}, 0x50) close(0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x818, 0x55, 0x0, 0x0, 0x20}, [@call={0x6f, 0x0, 0x0, 0x2}], {0x95, 0x0, 0xa}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback=0x14}, 0x94) 2.548971722s ago: executing program 2 (id=48376): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x410, 0x2000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="090000000800000004000000094000000a000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00280900a831d1c200"/26], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="d31caf4bbeef013bc0a2a535800257f0cb5ae419c2c55a652bccec9c0b6abc91707095b0b13e115e1347a9e8a5bb4dff66df6e8006d1dae4ff2518c8b142201801ac17e417c0ef373d838878b1471830bd52f77481cd6fcd", 0x58}, {&(0x7f0000000240)="96fedd5f5fcaa1e0966e6acfc04cead7e0bffacc2d97a774b6b5c9f014f48f81c99d0cecb98665280e6e9616b9cabef3cfa4e874788ae0c4cbc2f3a862247113b6f2815c0cfe9b42033db05ea6e1221e3e59db710fa62af1aa60f0cfe3a167be02ee95ddd8502395cf127f44a4e61d6bcde517555278aba1943f7725dc560d392b432920b92c02ff9efc8870a4ed1db39f", 0x91}], 0x2}, 0x8000) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xb4, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x7, 0x3}, 0xc27a, 0x40, 0x7, 0x5, 0x1, 0x200200, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b44, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c000000000000001800000000000000000000450000000095000000000000009500faff00000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x20048011) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850a57ea000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x63, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.983052566s ago: executing program 8 (id=48387): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2020) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000500)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c"], 0x280) r4 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="b400000000000000dd0b00000000000063010400000000009500000000000000415b7dd4a10ffd8007d29325a2aff28a5b275413fc64e9160819c5c4765f5b"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = syz_clone(0xa2214100, &(0x7f0000000640)="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", 0x1000, &(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)="d45ea877d7d071684da711b2fd2d516c11c0449ecd220e4475b3a3") perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x8f, 0xcd, 0x1, 0x8, 0x0, 0x8, 0x610, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x4}, 0x208, 0x1, 0x7, 0x6, 0x9, 0x77, 0x7, 0x0, 0x8, 0x0, 0x1}, r6, 0x1, r0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000631124000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @cgroup_sock=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r7}, 0xc) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000004c0)={'team0\x00', 0x112}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x2, 0x45, 0xfffff010}, {0x6, 0x2, 0x2, 0xfffffdfc}]}) 1.782585252s ago: executing program 3 (id=48394): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) (rerun: 32) socketpair(0x1, 0x1, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000003000000"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x26, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9805, 0x0, 0x7fc, 0x6, 0x7}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex, r1, 0x11, 0x0, 0x0, @void, @value=0x0}, 0x20) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$tipc(r2, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) (async, rerun: 64) sendmsg$tipc(r2, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) (rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x2, 0x6, 0xf7ff, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3, 0x4, 0x8}, 0x50) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000000500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.726651723s ago: executing program 3 (id=48395): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711812000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.722244473s ago: executing program 2 (id=48396): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0xfffffffffffffcaf) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x4a) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x4a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r1, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000000)="b9ff03076844268cb8be14f086dd0f1326", 0x0, 0x20000005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x29, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x29, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) (async) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002180)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000480000000820000095000000000000002ba7e1d30c04aa8b3382022ce2a1d97411a0f6b599e83f24a3aa81d36bb7019c13bd23212fb56f040026fbfefc4a056bdc17487902317142fac7e7be168c1886d0d4d94f2f4eb45c652fbc1626cca2a28d67893547db51ee988e6e06c8cedf7ceb9fc40400ae5e4aa74c92c6a51cbf9b0a4def23d410f6accd3641130bfc4e90a6341865c3f5ab3e89cf6c662ed4148d3b3e22278d00031e5388ee5c867de2c6211d6ececb0c18ce7400dae15cb7947c491b8bea3fd2f73902ebcfcf4982277d9800011b405bbf7b02433a9bcd715f5888b2007f000000001c000000010000000000000600000000309329170ee5b567e70f000006a10f58fa64533500000000000000000000000031000000000000001208e75a89faffbfb11b7dc6ea31001e846c12423a169f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a80d0900f4d433623c850af895abba14f6fbd7fbad1f98e26ad4deaf1a4f294b2a431ab9142f3a06d54740a4bc5e3abd378af7c9676a08e774c48785f895b4ec8d1141d5e8744d7f09ab4df6027bf48cabecead649f96ea24d32872c494160cb7f46ce680eeb80157eb23f9902519ac655fa73103170cbc496d7122034b85e7e87a2db762cbb253fbd76b9117c1a11d18aa2040c5f0c289906000000000000005ffe91ff799a11d9b219c00c369a12bf8685b862d0dbdd956cbda1bae489bcef5ae59136aaadc59609f4d42617c0e6066938b521a0f2e2467a6c435ad5b800262a5da053ced5e95394e500000072737638ac44fb61310e2df511c60b3c88113996a81fb64bce5eb95ce91738640ff7ae6ed6b62086e699955926934389cdf9bcffff3ffd86fe9ce05268bfca3958f2206cdc7095682c14f10ba1075832956762b2dcc6251e7b74cb1da627e332765511c58215bf84d263e8778e6e8ffe4ea50b076446f35efffc806b340658342d2d9e1ef68c6ef3e98407d2fcefb34a0000000000000000895ddbb76122b1222e4da37177fe833e4fcaa67997e92a206ebd085bd9f90008d3fdd528efe6c1dca17f45ba5e8bd311a40030f9ffce75ffff996a80153a0077bb43f8a63dd390d18f0239b41da1a52383a4c6768ca1bb66b8fb3c5000f6f246fd20356a60769b461b6cdf133de073b1df08ae09268b0073bb97d88d741a5546e76caf4b6b1387ff37ec13d262dae0260be74cdf7bb6d3107597430ef5bbd476bb9d69b2aef9f3cb644b4bf01ccf16d40720939daf2af469bdfb361b8ee8d414e757b6cce3c66f5c343afb78a7cfd852f3e05c089887d7df2ff4f9982030019421af6b78ff9c444a17091875cfe4eab0e7f50eb69c860b1613a6b4f5af04f9c635d8d646c89f8b85f820ce7464c731deba39f9ff7b815f7b0acba754c01ed8bf1bba0010a8c6a2b966d861f9dd547abf2e9b23e5607f00f80b5e749bf5271efd93ce76e67758fd76e4bc46c84799aa792cdaeb6cfb858e577dacff607ba513250e13ae696cd6ed7d318190a93b9ee07927efca6b8d1f5980994690bbe002db5146439d906a0d4aef065214b15666cdca81091b69acee2c7ce0821fc19e0891f0b53469f935c5ac420100010000000000fb53faf4420638489e6a1c696d8c414a87b60000000000080000b6be1557951854c01dbc2d061827ae6349a045b780893771524a424335b9fc34616ee9f09141057262530b7c2f7c9b969938779736ece7b470078ac0b1b4b528000000009866e9994ca9096672ec9f3800c2fc35ba6516e542624c47bdba76a816c3a3dd6c3fa87a3ec91df199a9af91a7babf2b8d0e7b77e6dfb4bbc9817847b705000000a1000000000000ab8353f3800f045b90b0eaab6d731199c9447eabbc8c740183aff5389742e47de5000000826a570d14310700cf2ae3366ebdb7f1000000000000333c00e6addbf4c71ffad6bfb5babb49109f92a5a52042c425190a6e3f1a8a3abfe6059da9c952cf35c98ce7616355493d280f2d0be99e18fd0900c769e7eb4edc1c03a33676590bd2047229e0237c1e34641848531712ff09e89fb062a3e66f4fced0ae679733830039cb61ea0691f0b4e0b33194404e643243c3841e1e7fe301f7f47a7f89512d92e83624e3de705bdfbfd0e5e381398e9d5428a00cc8a6d097d97e6ac8bd09b1a5577920a650114a522c1e2dcdc4f606fcbcee91770a9fada34d38cd7976a9228a0a0dd8661be8162e966aac26bea4c11458cd6ce22ddf7054cdd0a60ef3ec000000000000000000425cb75dc7ec92e9a5d29f9c99697d2a98ae0a9f35e4196c3faeb7a60a0290bf897846f6f0f1c163d6075119169d55d10da9ad0e4b2c636d200000009baaf94e2b2c48e70d8453f832eecfb1de2a3f38a5c986de9e37737dac74db251d5e9ea2b8ed39e91a7a17d01b49f7aaff7c4c73c3484bdcab362838ed940035b239a3646ef55b9f070ae14466b3acef9f8b28fb938a237e2e068ae4a6bce4407b54cc14614c2cdf877f000000000000000000000000bdcf23144e6c16b9235552aed83b6428f34d88c258a9ad16386bba51b60838fb11bc193a206b5a25b7233b222e4e68e0d1e88f26b9a45b6c29469530a37ea92aaf421cdcc1f594ecfaff9a79b56f8b38038002d29142a369b14607b5e48987541ed2cb5a3512a877da93174aa5bf4ee9fbf1bd0f42d221d7cbfec3feff2ef0a1d3316421ee72754aea5b5abb253295c2d87aeb468bd4f73d391c07a4831b4b0bf962e6cfa0f0445ba37524c8c062c4787f9bff922b012e833c08ff0c365c289657b88ff8aa4c26260956f6e9b640f90cacb464007c3717fd9ec6d618bd3ff950b9dc4d7f9c94205db3b47bdded6a47911088f1a1d06649c3ac08c7f6194604786d0a1fe96667fcf082caac73dda1b9c0dda7dd90c38107b8a016132b63ec21a988cc2788efc9d5f6fbfd7ddbe800a5382bbc4b2624a4b9976b2c5f4c611e88370a5dff77de5d0960a3bd91321a8e0b27a48cbc2607a4c6c406cd4ac5d5a18ba185ad620beeb77f1c6bc1697151600bd3491d5a8358ef635d50d54af5b24d11d52eb75c970ab41ee0afbd2a01d249fabacc95695efc923da1800f1439d385bbb00ac0d7c8043f4e2661ffec2eafbac5b483885d76ff5b2358986923a5fa8aad707a0aba60e4fae6dd3decf94ead2dfb52fd0be70d5d14a5f6c6a6786b0ce6a5eeeae8fb8c6ed627c348d9bf64a7aa47e02b8dd67c12141bfd5efb2b05501f57bcf3f0660dd63cb4f4912fd386647f9a9e32f5e7f00f21063f4d262bc29e8a4edd8cba7ee7fd9cf4a21cb93a9eb232acbce357044d3c99154e4ba0ed25e2ecbad23b08b2073a8a7de2c6dac3cfcab3fd33b082ddc278776963c5ad1fa244360716dc571d6e95a767ad6bf69d4c8d132155ad94b610d4a42161e7532dd5fe80556dc149d70f002ce4006bbac4549e4b48f8360e1b2353cf636ca348db1c5e8335066efe415560683c7b5eadcffe56a58093756d20609a1ea83831a430818d1e5090b2608290469eede3f81e0e4f402b63c2b54374af37aafcae614bb3936cf952f2f944f5740c4c2c629a7935eb86abb14cfcdde8b371119f1ccda5850d8c6194775b8a5f8de7000000000000a1c7e2233be2fe4254f6a9c1fc414252a4ceefd417f37b4a1507da7b4d870f3fea9757a8c24e6a72e9e3a41da13496e27952b373c776a939540527c01661ed7d0026ad4b6ee543cfac2b7f48916212dddb2eca1e2ab0861ab94a693f6b9fc9a9c2ec231588ecef2907c47fe1344eee20d3c1024ebbfbe50d6bf4543db64f8cc0d82c532d75479ad8afe72cffbd569f448d6f2f88d88b9f12ce5b56cb0731ee8e5c70598f5608726a0a5a7d57352a996722"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x57, 0x10, &(0x7f0000000000), 0xffffffffffffffc9}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) close(r7) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="fa82", 0x3e80}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) (async) close(r9) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x48) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 1.626704366s ago: executing program 5 (id=48397): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2c, &(0x7f0000000040), 0x4) recvmsg$unix(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/14, 0xe}, {&(0x7f0000000140)=""/120, 0x78}], 0x2, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x2140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x9, &(0x7f0000000540), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.626352666s ago: executing program 5 (id=48398): r0 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/time\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='blkio.reset_stats\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000080000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000285000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0xcb1f, 0x0, 0x0, 0x100, 0x16, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) 1.427196461s ago: executing program 8 (id=48399): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="12000000040000000400000001"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000870000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c00)={r3, &(0x7f0000000b80), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="00d10a1549000000b703009050db0c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x27, 0xd, 0x0, &(0x7f0000000000)="f8ad1dcc02cb29dcc800320081", 0x0, 0x4002, 0xf2ffffff, 0x0, 0x35, 0x0, 0x0}, 0x3f) (async) write$cgroup_subtree(r6, &(0x7f0000000000), 0xe) 1.396936912s ago: executing program 8 (id=48400): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000006000000080000000800000040000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000001a00"/28], 0x50) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000002020207b1af8fff0000000bfa1000000000000070100faf8ffffffb702000008000000b703399fcf6220000000000000850000002d0000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, 0x0, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r8 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r8, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.308416875s ago: executing program 3 (id=48401): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\a\x00\x00'], 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1e, 0x1, 0x1, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000"], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r8 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6c08, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @perf_config_ext={0x101, 0xd}, 0x104c11, 0x2000001, 0x0, 0x3, 0x0, 0xf, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'veth0_to_hsr\x00', 0x1000}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000005cb5a2d8178300"/34], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107a00000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00'}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r8, 0x0, 0xd, &(0x7f0000000040)='/dev/net/tun\x00'}, 0x30) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000500)=r10, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00'}, 0x1a) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.295987155s ago: executing program 5 (id=48402): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0xff, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfff0000000000003, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000030000000000000000400000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000100008500000004000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x410, 0x2000000}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000007000000000000000104000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000088455000ffffffff7f4600007500000018150000", @ANYRES32=0x1, @ANYBLOB="000000000000000018290000", @ANYRES32=0x1, @ANYBLOB="0000000001000000018502000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000008500000082000000bf9100000000000098080000010000008500000000a8aa46b7000000000000009500000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0xf2, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0xe366, 0x40}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000480)=[{0x2, 0x3, 0xb, 0x4}, {0x4, 0x2, 0xf, 0x9}, {0x2, 0x2, 0xe, 0xc}, {0x1, 0x1, 0x7, 0x8}, {0x0, 0x1, 0x2}], 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x48) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x19, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="0ab718000000011b0000140000000000000095146c4bda59e235534c3386ad45fd1d634a118b303c880980af9dcdd7"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r3, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r2, 0x16, 0x0, 0x14000, &(0x7f0000000e00)=[0x0, 0x0], 0x2, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) r6 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r6, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x81, 0x9, 0x40, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xd8, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x1011, 0xcb9, 0xffff7fff, 0x1, 0x10001, 0x3, 0x3, 0x0, 0x4, 0x0, 0x1}, r6, 0x7, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x9, 0xfe, 0x0, 0x0, 0x2, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x10000, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x80047456, &(0x7f0000000180)) 1.09256481s ago: executing program 5 (id=48403): r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800094a2d94fb9d3e0e5364909a2aa9000000000000280000002800000006000000000000000200000d0000000004000000020000000d00000001000004000000000000000604000000000000005f00"], &(0x7f0000000600)=""/4074, 0x46, 0xfea, 0x1}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x408) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x49, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRES32], 0x50) r5 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0x6}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c00)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000800000000000000090000000a1550000800000085000000a800000018480000feffffff0000000000000000852000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000009d000000860000007d2b140afeffffff9512002644000000000000000104000085000000b20000009500000000000000"], &(0x7f00000004c0)='GPL\x00', 0xace0, 0x96, &(0x7f0000001980)=""/150, 0x1f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001b00)={0x0, 0xfffffffe}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001b40)=[r5, r2], &(0x7f0000001bc0)=[{0x2, 0x3, 0x8, 0x4}, {0x0, 0x1, 0xb, 0xb}], 0x10, 0x5}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="05000000060000000800000008"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r8}, 0xc) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp}, 0x94) write$cgroup_subtree(r9, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2212102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa00006558"], 0xcfa4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001780)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000018c0)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000700000000000000080000005478fffffc6da23379120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018530000020000000000000000000000850000004e000000186700000a000000000000000200000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xeb, &(0x7f0000001600)=""/235, 0x40f00, 0x10, '\x00', 0x0, 0x17, r12, 0x8, &(0x7f00000017c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x0, 0x4, 0x8, 0x7}, 0x10, 0x11f61, r9, 0x4, &(0x7f0000001840)=[r9, r4], &(0x7f0000001880)=[{0x4, 0x2, 0xb, 0x8}, {0x2, 0x2, 0xb, 0x8}, {0x2, 0x1, 0xd, 0x5}, {0x2, 0x5, 0xd, 0xf}], 0x10, 0x49e4}, 0x94) sendmsg$tipc(r10, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 1.09230481s ago: executing program 8 (id=48404): perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2d, &(0x7f0000000040), 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000280), &(0x7f0000000180)=r2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x0, 0x0, 0x40, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x50) r11 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r11, r12, 0x0, 0x0, 0x0}, 0x30) 851.828437ms ago: executing program 8 (id=48405): r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000040)="e0ca2f451cd12bb0ee17c1cb04852a73a729118014815b55a7cec41c9a259c1ce6f9f8fa84d41fe7ab3928d7e57d4aa18c5b6240dbd4967c8a319772109c43772bc3fd8f96c21eb194ffaa13abc61e64addbd5bff5223a5e00fcf301db522f4b74b53c98c0bb9e4bfa36d8f6cae7e55e9250c0f09d4f84", &(0x7f0000000180)=""/115}, 0x20) socketpair(0x2b, 0x80000, 0x4, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x13, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x0, 0x0, 0x0, 0x2, 0x6, 0xfffffffffffffff6, 0x4}, @jmp={0x5, 0x1, 0xa, 0x6, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}, @exit, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xec}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0xb4, &(0x7f0000000340)=""/180, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0x5, 0x101, 0xfffffff9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000440)=[r1, r1, r1, r1, r1, r1, r1, r1], &(0x7f0000000480)=[{0x1, 0x4, 0xb, 0xb}, {0x5, 0x4, 0x7, 0x2}], 0x10, 0x9}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000900)) close(0x3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0xf, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffeffff, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000680)='syzkaller\x00', 0xd65, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x1, 0x5, 0xc425}, 0x10, 0x0, r3, 0x7, &(0x7f0000000740)=[r1, 0xffffffffffffffff, r1, r1, r1, r1], &(0x7f0000000780)=[{0x1, 0x1, 0x6, 0x9}, {0x3, 0x3, 0xa, 0x9}, {0x2, 0x2, 0xc, 0xa}, {0x2, 0x4, 0xc, 0x6}, {0x0, 0x4, 0x7, 0x5}, {0x1, 0x2, 0xc, 0xa}, {0x4, 0x3, 0x7, 0x2}], 0x10, 0x1}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f00000008c0)={r4, r1}, 0xc) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000040)="e0ca2f451cd12bb0ee17c1cb04852a73a729118014815b55a7cec41c9a259c1ce6f9f8fa84d41fe7ab3928d7e57d4aa18c5b6240dbd4967c8a319772109c43772bc3fd8f96c21eb194ffaa13abc61e64addbd5bff5223a5e00fcf301db522f4b74b53c98c0bb9e4bfa36d8f6cae7e55e9250c0f09d4f84", &(0x7f0000000180)=""/115}, 0x20) (async) socketpair(0x2b, 0x80000, 0x4, &(0x7f00000000c0)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x13, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x0, 0x0, 0x0, 0x2, 0x6, 0xfffffffffffffff6, 0x4}, @jmp={0x5, 0x1, 0xa, 0x6, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}, @exit, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xec}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0xb4, &(0x7f0000000340)=""/180, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0x5, 0x101, 0xfffffff9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000440)=[r1, r1, r1, r1, r1, r1, r1, r1], &(0x7f0000000480)=[{0x1, 0x4, 0xb, 0xb}, {0x5, 0x4, 0x7, 0x2}], 0x10, 0x9}, 0x94) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000900)) (async) close(0x3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0xf, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffeffff, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000680)='syzkaller\x00', 0xd65, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x1, 0x5, 0xc425}, 0x10, 0x0, r3, 0x7, &(0x7f0000000740)=[r1, 0xffffffffffffffff, r1, r1, r1, r1], &(0x7f0000000780)=[{0x1, 0x1, 0x6, 0x9}, {0x3, 0x3, 0xa, 0x9}, {0x2, 0x2, 0xc, 0xa}, {0x2, 0x4, 0xc, 0x6}, {0x0, 0x4, 0x7, 0x5}, {0x1, 0x2, 0xc, 0xa}, {0x4, 0x3, 0x7, 0x2}], 0x10, 0x1}, 0x94) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000008c0)={r4, r1}, 0xc) (async) 690.692711ms ago: executing program 8 (id=48406): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x410, 0x2000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="090000000800000004000000094000000a000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00280900a831d1c200"/26], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="d31caf4bbeef013bc0a2a535800257f0cb5ae419c2c55a652bccec9c0b6abc91707095b0b13e115e1347a9e8a5bb4dff66df6e8006d1dae4ff2518c8b142201801ac17e417c0ef373d838878b1471830bd52f77481cd6fcd", 0x58}, {&(0x7f0000000240)="96fedd5f5fcaa1e0966e6acfc04cead7e0bffacc2d97a774b6b5c9f014f48f81c99d0cecb98665280e6e9616b9cabef3cfa4e874788ae0c4cbc2f3a862247113b6f2815c0cfe9b42033db05ea6e1221e3e59db710fa62af1aa60f0cfe3a167be02ee95ddd8502395cf127f44a4e61d6bcde517555278aba1943f7725dc560d392b432920b92c02ff9efc8870a4ed1db39f", 0x91}], 0x2}, 0x8000) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xb4, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x7, 0x3}, 0xc27a, 0x40, 0x7, 0x5, 0x1, 0x200200, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b44, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c000000000000001800000000000000000000450000000095000000000000009500faff00000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x20048011) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850a57ea000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x63, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 672.393772ms ago: executing program 2 (id=48415): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xb16}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x3}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1100) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff, 0x1000000}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x3129b7164949479, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') r9 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x98629, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x1, @perf_config_ext={0x9, 0x80000000000}, 0x800, 0x0, 0x20, 0x6, 0x0, 0x0, 0x80, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 570.685745ms ago: executing program 3 (id=48407): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x20900000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000005c0)=r0, 0x12) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000003c0)={'ip6_vti0\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000080)={'ipvlan1\x00', 0x400}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6a6, 0x0, 0x0, 0x0, 0xfffe}, r0, 0x0, 0xffffffffffffffff, 0x8) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 258.812873ms ago: executing program 3 (id=48408): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0xfc, 0x0, 0xcb, 0x0, 0x7, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1, @perf_config_ext={0xfffffffbfffffffc, 0x7fff}, 0x10000, 0xc8, 0xffd, 0x0, 0x0, 0xd63, 0x400, 0x0, 0x0, 0x0, 0x200200000401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000d0000000000de060000000000850000000800838d950000000000000013cdc0c41979247567624f38cda84626c420ad89c66d32727af52759b04d09438de7eb3f452d596295168e846e14888825598062dd3848708b872647afabf02841a5e4f74ccddafcd1ecb618e0e1d80a9a0b1225ba69a57ce95622a7db273b682e7cadf13df3363fff082f63b0b69138ed84f5f13ee56faa666fd217bb179372bfc3d1983f395aaff2a4fd3b80a1"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 258.392523ms ago: executing program 2 (id=48409): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x1, 0x2, 0x0, 0x4, 0x250, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x8001, 0x2000001, 0x0, 0x6, 0xfffffffffffffffe, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40000, &(0x7f0000001140)="9866474764daa13e7e59435bd5b88c03d9fda9a608abc8e4237fc74508ee69ecd46ba883f34f8bde97813944c65fb064a37bd265bfb0e1e0e146697b563d856b2e2a831c7311cd9b07b83566c719e289f6f032ef5192d0d24a574d1b1f0204a229205863dd19772e82b147c226d472a80d6818eda4588b523fbcbcb49d3055f45b77b019a18bc1f7678ca1403db84337142addd26ce914ba38735ccab516e72274ff61ce9a3306807354715cbaee07be03e6a5a26fbbcb5be7e523fb5f69e9defddbf21393e96865e602d566960664fbd241ee8fff20dc4a1148", 0xda, &(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)="33a040df48aa4be08d0deb08b35c916b3e81e710aebe9a1a03f6ae7fb0220c7ecfd8425cbad7768d8664b6b8f465") mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0xfc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="1e0000000400"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000f1ffffffffffff529d107003d31b0b918d4b0000ffd94fa5c973bc45793d4f703ccde95b000000000000ddff0000000000"], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r5) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000001300), 0x1) socketpair(0x0, 0x3, 0x10003, &(0x7f0000000040)={0x0, 0x0}) close(r6) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 166.805606ms ago: executing program 5 (id=48410): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, 0x0}, 0x42) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x24200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0xff}, 0x0, 0xc8, 0x9, 0x7, 0xffffffffffffffff, 0x9, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa3c"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x1, '\x00', 0x0, r6, 0x3, 0x1, 0x5}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x3, 0x0, r7, 0x7f, '\x00', 0x0, r6, 0x3, 0x3, 0x4}, 0x50) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff, 0x0, 0xfffffffc}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4e}, 0x48) 148.990476ms ago: executing program 3 (id=48411): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 300.2µs ago: executing program 5 (id=48412): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000000000d00000000000000000000000a01000000000000000000000a02000000000000000000000b000000000000000000000005"], 0x0, 0x56}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r4, 0x1, 0x3}, 0x50) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES64=0x0], 0x8202) close(r2) close(r1) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x1a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=48413): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r1, &(0x7f00000009c0)={0x0, 0xfffffeb6, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14}}], 0x18, 0x404c0d1}, 0x40808) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ffc40bffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400210000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f0170720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/172], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1f}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000000000001507"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313f, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x2}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, 0x0, 0x4e}, 0x28) kernel console output (not intermixed with test programs): 89.512907][ T9296] device macsec0 entered promiscuous mode [ 3089.548746][ T9296] device  entered promiscuous mode [ 3089.822837][ T9320] device syzkaller0 entered promiscuous mode [ 3089.878626][ T9321] : port 2(ip6gretap0) entered blocking state [ 3089.885448][ T9321] : port 2(ip6gretap0) entered disabled state [ 3089.914890][ T9321] device ip6gretap0 entered promiscuous mode [ 3089.931255][ T9318] device ip6gretap0 left promiscuous mode [ 3089.950899][ T9318] : port 2(ip6gretap0) entered disabled state [ 3090.387723][ T9363] FAULT_INJECTION: forcing a failure. [ 3090.387723][ T9363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3090.467563][ T9363] CPU: 1 PID: 9363 Comm: syz.8.42760 Tainted: G W syzkaller #0 [ 3090.476463][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3090.486546][ T9363] Call Trace: [ 3090.489855][ T9363] __dump_stack+0x21/0x24 [ 3090.494201][ T9363] dump_stack_lvl+0x1a7/0x208 [ 3090.498895][ T9363] ? show_regs_print_info+0x18/0x18 [ 3090.504111][ T9363] dump_stack+0x15/0x1c [ 3090.508276][ T9363] should_fail+0x3c1/0x510 [ 3090.512879][ T9363] should_fail_alloc_page+0x4f/0x60 [ 3090.518092][ T9363] __alloc_pages_nodemask+0x119/0x620 [ 3090.523560][ T9363] ? alloc_skb_with_frags+0xa2/0x560 [ 3090.528862][ T9363] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3090.534416][ T9363] ? __kmalloc_track_caller+0x17e/0x320 [ 3090.539967][ T9363] ? __kasan_check_write+0x14/0x20 [ 3090.545212][ T9363] ? __alloc_skb+0x38b/0x520 [ 3090.549812][ T9363] alloc_skb_with_frags+0x1bc/0x560 [ 3090.555020][ T9363] sock_alloc_send_pskb+0x87f/0x9a0 [ 3090.560227][ T9363] ? sock_kzfree_s+0x60/0x60 [ 3090.564824][ T9363] ? iov_iter_advance+0x1f7/0x750 [ 3090.569860][ T9363] tun_get_user+0xb4e/0x3270 [ 3090.574458][ T9363] ? putname+0xfe/0x150 [ 3090.578626][ T9363] ? tun_do_read+0x1c70/0x1c70 [ 3090.583402][ T9363] ? kstrtouint_from_user+0x1c4/0x220 [ 3090.588954][ T9363] ? __fsnotify_parent+0x6d2/0x7c0 [ 3090.594072][ T9363] ? avc_policy_seqno+0x1b/0x70 [ 3090.598929][ T9363] ? selinux_file_permission+0x2a5/0x510 [ 3090.604569][ T9363] ? fsnotify_perm+0x66/0x4b0 [ 3090.609258][ T9363] tun_chr_write_iter+0x1bf/0x270 [ 3090.614382][ T9363] vfs_write+0x758/0xdc0 [ 3090.618676][ T9363] ? perf_trace_kmem_free+0x3f/0x110 [ 3090.623970][ T9363] ? kernel_write+0x3c0/0x3c0 [ 3090.628757][ T9363] ? __fget_files+0x2c4/0x320 [ 3090.633445][ T9363] ? __fdget_pos+0x1f7/0x380 [ 3090.638132][ T9363] ? ksys_write+0x71/0x250 [ 3090.642570][ T9363] ksys_write+0x149/0x250 [ 3090.646993][ T9363] ? __ia32_sys_read+0x90/0x90 [ 3090.651765][ T9363] ? debug_smp_processor_id+0x17/0x20 [ 3090.657149][ T9363] __x64_sys_write+0x7b/0x90 [ 3090.661836][ T9363] do_syscall_64+0x31/0x40 [ 3090.666316][ T9363] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3090.672314][ T9363] RIP: 0033:0x7f7bc3c25dd9 [ 3090.676747][ T9363] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3090.696741][ T9363] RSP: 002b:00007f7bc2680028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3090.705358][ T9363] RAX: ffffffffffffffda RBX: 00007f7bc3e9efa0 RCX: 00007f7bc3c25dd9 [ 3090.713341][ T9363] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 3090.721422][ T9363] RBP: 00007f7bc2680090 R08: 0000000000000000 R09: 0000000000000000 [ 3090.729412][ T9363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3090.737831][ T9363] R13: 00007f7bc3e9f038 R14: 00007f7bc3e9efa0 R15: 00007fff0827e5a8 [ 3091.310350][ T9415] FAULT_INJECTION: forcing a failure. [ 3091.310350][ T9415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3091.330140][ T9415] CPU: 0 PID: 9415 Comm: syz.2.42778 Tainted: G W syzkaller #0 [ 3091.339130][ T9415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3091.349434][ T9415] Call Trace: [ 3091.352751][ T9415] __dump_stack+0x21/0x24 [ 3091.357099][ T9415] dump_stack_lvl+0x1a7/0x208 [ 3091.361931][ T9415] ? show_regs_print_info+0x18/0x18 [ 3091.367456][ T9415] dump_stack+0x15/0x1c [ 3091.371939][ T9415] should_fail+0x3c1/0x510 [ 3091.376464][ T9415] should_fail_alloc_page+0x4f/0x60 [ 3091.381672][ T9415] __alloc_pages_nodemask+0x119/0x620 [ 3091.387064][ T9415] ? alloc_skb_with_frags+0xa2/0x560 [ 3091.392533][ T9415] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3091.398187][ T9415] ? __kmalloc_track_caller+0x17e/0x320 [ 3091.403835][ T9415] ? __kasan_check_write+0x14/0x20 [ 3091.409062][ T9415] ? __alloc_skb+0x38b/0x520 [ 3091.413926][ T9415] alloc_skb_with_frags+0x1bc/0x560 [ 3091.419142][ T9415] sock_alloc_send_pskb+0x87f/0x9a0 [ 3091.424352][ T9415] ? sock_kzfree_s+0x60/0x60 [ 3091.428952][ T9415] ? iov_iter_advance+0x1f7/0x750 [ 3091.433986][ T9415] tun_get_user+0xb4e/0x3270 [ 3091.438585][ T9415] ? putname+0xfe/0x150 [ 3091.442751][ T9415] ? tun_do_read+0x1c70/0x1c70 [ 3091.447527][ T9415] ? kstrtouint_from_user+0x1c4/0x220 [ 3091.452924][ T9415] ? __fsnotify_parent+0x6d2/0x7c0 [ 3091.458130][ T9415] ? avc_policy_seqno+0x1b/0x70 [ 3091.462992][ T9415] ? selinux_file_permission+0x2a5/0x510 [ 3091.468641][ T9415] ? fsnotify_perm+0x66/0x4b0 [ 3091.473328][ T9415] tun_chr_write_iter+0x1bf/0x270 [ 3091.478373][ T9415] vfs_write+0x758/0xdc0 [ 3091.482719][ T9415] ? perf_trace_kmem_free+0x3f/0x110 [ 3091.488013][ T9415] ? kernel_write+0x3c0/0x3c0 [ 3091.492799][ T9415] ? __fget_files+0x2c4/0x320 [ 3091.497479][ T9415] ? __fdget_pos+0x1f7/0x380 [ 3091.502071][ T9415] ? ksys_write+0x71/0x250 [ 3091.506502][ T9415] ksys_write+0x149/0x250 [ 3091.510837][ T9415] ? __ia32_sys_read+0x90/0x90 [ 3091.515610][ T9415] ? debug_smp_processor_id+0x17/0x20 [ 3091.520991][ T9415] __x64_sys_write+0x7b/0x90 [ 3091.525595][ T9415] do_syscall_64+0x31/0x40 [ 3091.530108][ T9415] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3091.536097][ T9415] RIP: 0033:0x7f42c4cbadd9 [ 3091.540527][ T9415] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3091.560153][ T9415] RSP: 002b:00007f42c3715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3091.568678][ T9415] RAX: ffffffffffffffda RBX: 00007f42c4f33fa0 RCX: 00007f42c4cbadd9 [ 3091.576667][ T9415] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 3091.584651][ T9415] RBP: 00007f42c3715090 R08: 0000000000000000 R09: 0000000000000000 [ 3091.592634][ T9415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3091.600626][ T9415] R13: 00007f42c4f34038 R14: 00007f42c4f33fa0 R15: 00007ffd8615f6f8 [ 3091.725988][ T9419] -1: renamed from syzkaller0 [ 3091.910318][ T9435] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 3091.916189][ T9435] syzkaller0: linktype set to 774 [ 3091.921573][ T9435] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 3093.037361][ T9509] device wg2 entered promiscuous mode [ 3093.320922][ T9522] device syzkaller0 entered promiscuous mode [ 3093.723707][ T9531] device syzkaller0 entered promiscuous mode [ 3095.388467][ T9613] device syzkaller0 entered promiscuous mode [ 3096.824929][ T9665] bridge0: port 3(gretap0) entered blocking state [ 3096.867574][ T9665] bridge0: port 3(gretap0) entered disabled state [ 3096.874574][ T9665] device gretap0 entered promiscuous mode [ 3096.893624][ T9665] bridge0: port 3(gretap0) entered blocking state [ 3096.900307][ T9665] bridge0: port 3(gretap0) entered forwarding state [ 3097.460535][ T9700] device wg2 entered promiscuous mode [ 3098.527718][ T9771] bridge0: port 3(gretap0) entered disabled state [ 3098.534302][ T9771] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.541466][ T9771] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.557652][ T9771] device bridge0 left promiscuous mode [ 3098.601774][ T9771] bridge0: port 3(gretap0) entered blocking state [ 3098.608275][ T9771] bridge0: port 3(gretap0) entered forwarding state [ 3098.614989][ T9771] bridge0: port 2(bridge_slave_1) entered blocking state [ 3098.622104][ T9771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3098.629529][ T9771] bridge0: port 1(bridge_slave_0) entered blocking state [ 3098.636583][ T9771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3098.694952][ T9771] device bridge0 entered promiscuous mode [ 3098.729611][ T9777] device syzkaller0 entered promiscuous mode [ 3098.811556][ T9781] device syzkaller0 entered promiscuous mode [ 3100.909777][ T9893] device wg2 entered promiscuous mode [ 3101.037012][ T9900] device syzkaller0 entered promiscuous mode [ 3101.142835][ T9927] device wg2 left promiscuous mode [ 3101.173038][ T9926] device wg2 entered promiscuous mode [ 3101.318346][ T9963] device sit0 entered promiscuous mode [ 3102.927345][T10036] FAULT_INJECTION: forcing a failure. [ 3102.927345][T10036] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3102.972847][T10036] CPU: 1 PID: 10036 Comm: syz.8.42954 Tainted: G W syzkaller #0 [ 3102.981820][T10036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3102.991880][T10036] Call Trace: [ 3102.995190][T10036] __dump_stack+0x21/0x24 [ 3102.999512][T10036] dump_stack_lvl+0x1a7/0x208 [ 3103.004472][T10036] ? show_regs_print_info+0x18/0x18 [ 3103.009670][T10036] dump_stack+0x15/0x1c [ 3103.013827][T10036] should_fail+0x3c1/0x510 [ 3103.018253][T10036] should_fail_alloc_page+0x4f/0x60 [ 3103.023730][T10036] __alloc_pages_nodemask+0x119/0x620 [ 3103.029099][T10036] ? alloc_skb_with_frags+0xa2/0x560 [ 3103.034463][T10036] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3103.040020][T10036] ? __kmalloc_track_caller+0x17e/0x320 [ 3103.045558][T10036] ? __kasan_check_write+0x14/0x20 [ 3103.050705][T10036] ? __alloc_skb+0x38b/0x520 [ 3103.055470][T10036] alloc_skb_with_frags+0x1bc/0x560 [ 3103.060685][T10036] sock_alloc_send_pskb+0x87f/0x9a0 [ 3103.065880][T10036] ? sock_kzfree_s+0x60/0x60 [ 3103.070906][T10036] ? iov_iter_advance+0x1f7/0x750 [ 3103.076015][T10036] tun_get_user+0xb4e/0x3270 [ 3103.080703][T10036] ? putname+0xfe/0x150 [ 3103.084854][T10036] ? tun_do_read+0x1c70/0x1c70 [ 3103.089611][T10036] ? kstrtouint_from_user+0x1c4/0x220 [ 3103.094990][T10036] ? __fsnotify_parent+0x6d2/0x7c0 [ 3103.100092][T10036] ? avc_policy_seqno+0x1b/0x70 [ 3103.104963][T10036] ? selinux_file_permission+0x2a5/0x510 [ 3103.110749][T10036] ? fsnotify_perm+0x66/0x4b0 [ 3103.115436][T10036] tun_chr_write_iter+0x1bf/0x270 [ 3103.120464][T10036] vfs_write+0x758/0xdc0 [ 3103.124721][T10036] ? perf_trace_kmem_free+0x3f/0x110 [ 3103.130002][T10036] ? kernel_write+0x3c0/0x3c0 [ 3103.134975][T10036] ? __fget_files+0x2c4/0x320 [ 3103.139829][T10036] ? __fdget_pos+0x1f7/0x380 [ 3103.144521][T10036] ? ksys_write+0x71/0x250 [ 3103.148937][T10036] ksys_write+0x149/0x250 [ 3103.153347][T10036] ? __ia32_sys_read+0x90/0x90 [ 3103.158116][T10036] ? debug_smp_processor_id+0x17/0x20 [ 3103.163486][T10036] __x64_sys_write+0x7b/0x90 [ 3103.168178][T10036] do_syscall_64+0x31/0x40 [ 3103.172610][T10036] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3103.178682][T10036] RIP: 0033:0x7f7bc3c25dd9 [ 3103.183233][T10036] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3103.202830][T10036] RSP: 002b:00007f7bc2680028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3103.211253][T10036] RAX: ffffffffffffffda RBX: 00007f7bc3e9efa0 RCX: 00007f7bc3c25dd9 [ 3103.219412][T10036] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 3103.227491][T10036] RBP: 00007f7bc2680090 R08: 0000000000000000 R09: 0000000000000000 [ 3103.235500][T10036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3103.243473][T10036] R13: 00007f7bc3e9f038 R14: 00007f7bc3e9efa0 R15: 00007fff0827e5a8 [ 3103.448552][T10054] device wg2 left promiscuous mode [ 3103.576472][T10052] device wg2 entered promiscuous mode [ 3103.623273][T10058] device sit0 entered promiscuous mode [ 3103.938542][T10062] device syzkaller0 entered promiscuous mode [ 3104.006949][T10069] device sit0 left promiscuous mode [ 3104.056682][T10067] device sit0 entered promiscuous mode [ 3104.268647][T10071] bridge0: port 3(gretap0) entered disabled state [ 3104.276425][T10071] bridge0: port 2(bridge_slave_1) entered disabled state [ 3104.285285][T10071] bridge0: port 1(bridge_slave_0) entered disabled state [ 3104.295642][T10071] device bridge0 left promiscuous mode [ 3104.360905][T10075] device gretap0 left promiscuous mode [ 3104.366690][T10075] bridge0: port 3(gretap0) entered disabled state [ 3104.373771][T10075] device bridge_slave_1 left promiscuous mode [ 3104.379991][T10075] bridge0: port 2(bridge_slave_1) entered disabled state [ 3104.387586][T10075] device bridge_slave_0 left promiscuous mode [ 3104.393811][T10075] bridge0: port 1(bridge_slave_0) entered disabled state [ 3106.108643][T10123] device syzkaller0 entered promiscuous mode [ 3108.402574][ T300] device bridge_slave_1 left promiscuous mode [ 3108.427889][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3108.448193][ T300] device bridge_slave_0 left promiscuous mode [ 3108.459004][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3108.479052][ T300] device veth1_macvtap left promiscuous mode [ 3108.486720][ T300] device veth0_vlan left promiscuous mode [ 3108.624869][T10249] device syzkaller0 entered promiscuous mode [ 3108.666895][T10265] device syzkaller0 entered promiscuous mode [ 3108.699960][T10238] bridge0: port 1(bridge_slave_0) entered blocking state [ 3108.707118][T10238] bridge0: port 1(bridge_slave_0) entered disabled state [ 3108.715398][T10238] device bridge_slave_0 entered promiscuous mode [ 3108.723131][T10238] bridge0: port 2(bridge_slave_1) entered blocking state [ 3108.736172][T10238] bridge0: port 2(bridge_slave_1) entered disabled state [ 3108.764267][T10238] device bridge_slave_1 entered promiscuous mode [ 3108.943577][T10281] device syzkaller0 entered promiscuous mode [ 3109.010404][T10238] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.017503][T10238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3109.024886][T10238] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.031949][T10238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3109.076679][T10290] tun0: tun_chr_ioctl cmd 1074025677 [ 3109.082174][T10290] tun0: linktype set to 270 [ 3109.094133][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3109.101846][T30023] bridge0: port 1(bridge_slave_0) entered disabled state [ 3109.109311][T30023] bridge0: port 2(bridge_slave_1) entered disabled state [ 3109.119034][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3109.127644][T30023] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.134911][T30023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3109.159609][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3109.169975][T30023] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.177051][T30023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3109.240127][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3109.257963][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3109.276110][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3109.296086][T10238] device veth0_vlan entered promiscuous mode [ 3109.303012][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3109.312403][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3109.327038][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3109.350189][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3109.360582][T10238] device veth1_macvtap entered promiscuous mode [ 3109.397716][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3109.418713][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3109.455405][T10325] device veth1_macvtap left promiscuous mode [ 3109.470387][T10325] nr0: port 1(macsec0) entered disabled state [ 3109.547823][T10329] device veth1_macvtap entered promiscuous mode [ 3109.555803][T10329] nr0: port 1(macsec0) entered blocking state [ 3109.562028][T10329] nr0: port 1(macsec0) entered forwarding state [ 3109.617860][T30023] nr0: port 1(macsec0) entered disabled state [ 3109.738723][T10333] device syzkaller0 entered promiscuous mode [ 3110.667429][T10390] device syzkaller0 entered promiscuous mode [ 3110.805966][T10425] device syzkaller0 entered promiscuous mode [ 3110.834286][T10427] device syzkaller0 entered promiscuous mode [ 3110.843118][T10427] FAULT_INJECTION: forcing a failure. [ 3110.843118][T10427] name failslab, interval 1, probability 0, space 0, times 0 [ 3110.863185][T10427] CPU: 0 PID: 10427 Comm: syz.8.43068 Tainted: G W syzkaller #0 [ 3110.872267][T10427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3110.882401][T10427] Call Trace: [ 3110.885872][T10427] __dump_stack+0x21/0x24 [ 3110.890202][T10427] dump_stack_lvl+0x1a7/0x208 [ 3110.894865][T10427] ? show_regs_print_info+0x18/0x18 [ 3110.900312][T10427] dump_stack+0x15/0x1c [ 3110.904463][T10427] should_fail+0x3c1/0x510 [ 3110.908876][T10427] ? alloc_skb_with_frags+0xa2/0x560 [ 3110.914146][T10427] __should_failslab+0xa4/0xe0 [ 3110.918903][T10427] should_failslab+0x9/0x20 [ 3110.923653][T10427] __kmalloc_track_caller+0x5f/0x320 [ 3110.928926][T10427] ? kmem_cache_alloc+0x162/0x2d0 [ 3110.933950][T10427] ? __alloc_skb+0x9e/0x520 [ 3110.938460][T10427] ? alloc_skb_with_frags+0xa2/0x560 [ 3110.943740][T10427] __alloc_skb+0xdc/0x520 [ 3110.948150][T10427] alloc_skb_with_frags+0xa2/0x560 [ 3110.953257][T10427] sock_alloc_send_pskb+0x87f/0x9a0 [ 3110.958466][T10427] ? sock_kzfree_s+0x60/0x60 [ 3110.963050][T10427] ? iov_iter_advance+0x1f7/0x750 [ 3110.968077][T10427] tun_get_user+0xb4e/0x3270 [ 3110.972660][T10427] ? putname+0xfe/0x150 [ 3110.976865][T10427] ? tun_do_read+0x1c70/0x1c70 [ 3110.981800][T10427] ? kstrtouint_from_user+0x1c4/0x220 [ 3110.987449][T10427] ? __fsnotify_parent+0x6d2/0x7c0 [ 3110.992665][T10427] ? avc_policy_seqno+0x1b/0x70 [ 3110.997606][T10427] ? selinux_file_permission+0x2a5/0x510 [ 3111.003261][T10427] ? fsnotify_perm+0x66/0x4b0 [ 3111.007932][T10427] tun_chr_write_iter+0x1bf/0x270 [ 3111.012946][T10427] vfs_write+0x758/0xdc0 [ 3111.017246][T10427] ? perf_trace_kmem_free+0x3f/0x110 [ 3111.022673][T10427] ? kernel_write+0x3c0/0x3c0 [ 3111.027379][T10427] ? __fget_files+0x2c4/0x320 [ 3111.032053][T10427] ? __fdget_pos+0x1f7/0x380 [ 3111.036816][T10427] ? ksys_write+0x71/0x250 [ 3111.041407][T10427] ksys_write+0x149/0x250 [ 3111.045735][T10427] ? __ia32_sys_read+0x90/0x90 [ 3111.050508][T10427] ? debug_smp_processor_id+0x17/0x20 [ 3111.055875][T10427] __x64_sys_write+0x7b/0x90 [ 3111.060548][T10427] do_syscall_64+0x31/0x40 [ 3111.064963][T10427] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3111.070931][T10427] RIP: 0033:0x7f7bc3c25dd9 [ 3111.075403][T10427] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3111.095363][T10427] RSP: 002b:00007f7bc2680028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3111.103941][T10427] RAX: ffffffffffffffda RBX: 00007f7bc3e9efa0 RCX: 00007f7bc3c25dd9 [ 3111.112025][T10427] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 3111.120468][T10427] RBP: 00007f7bc2680090 R08: 0000000000000000 R09: 0000000000000000 [ 3111.128519][T10427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3111.136505][T10427] R13: 00007f7bc3e9f038 R14: 00007f7bc3e9efa0 R15: 00007fff0827e5a8 [ 3111.346359][T10455] device syzkaller0 entered promiscuous mode [ 3111.386591][T10458] device syzkaller0 entered promiscuous mode [ 3111.612221][T10466] device syzkaller0 entered promiscuous mode [ 3111.915818][T10490] device syzkaller0 entered promiscuous mode [ 3112.005967][T10508] device syzkaller0 entered promiscuous mode [ 3112.157989][T10528] device syzkaller0 entered promiscuous mode [ 3112.350421][T10542] device syzkaller0 entered promiscuous mode [ 3112.481241][T10557] device syzkaller0 entered promiscuous mode [ 3112.531834][T10559] tun0: tun_chr_ioctl cmd 1074025677 [ 3112.537304][T10559] tun0: linktype set to 0 [ 3112.823253][T10581] device syzkaller0 entered promiscuous mode [ 3113.531369][T10638] device syzkaller0 entered promiscuous mode [ 3113.539759][T10640] device wg2 left promiscuous mode [ 3113.619126][T10640] device wg2 entered promiscuous mode [ 3114.198241][T10702] device syzkaller0 entered promiscuous mode [ 3114.368701][T10718] pim6reg: tun_chr_ioctl cmd 2148553947 [ 3114.751028][T10749] device syzkaller0 entered promiscuous mode [ 3115.313190][T10793] device syzkaller0 entered promiscuous mode [ 3115.479973][T10802] device syzkaller0 entered promiscuous mode [ 3115.776028][T10822] device syzkaller0 entered promiscuous mode [ 3115.988334][T10831] device syzkaller0 entered promiscuous mode [ 3116.058338][T10826] device syzkaller0 entered promiscuous mode [ 3116.226132][T10855] Ð6±ÿ: renamed from team_slave_1 [ 3116.289319][T10865] device wg2 left promiscuous mode [ 3116.296537][T10865] device wg2 entered promiscuous mode [ 3116.525504][T10879] device syzkaller0 entered promiscuous mode [ 3116.880517][T10917] device syzkaller0 entered promiscuous mode [ 3117.262378][T10940] device syzkaller0 entered promiscuous mode [ 3117.506930][T10972] device syzkaller0 entered promiscuous mode [ 3117.597623][T10984] device syzkaller0 entered promiscuous mode [ 3117.949464][T11015] device syzkaller0 entered promiscuous mode [ 3118.494733][T11042] device syzkaller0 entered promiscuous mode [ 3118.501585][T19236] syzkaller0: tun_net_xmit 76 [ 3118.506472][T19236] syzkaller0: tun_net_xmit 48 [ 3118.585539][T11046] device syzkaller0 entered promiscuous mode [ 3119.109235][T11076] device syzkaller0 entered promiscuous mode [ 3119.604879][T11108] device syzkaller0 entered promiscuous mode [ 3119.921031][T11117] device syzkaller0 entered promiscuous mode [ 3120.322452][T11132] device veth0_vlan left promiscuous mode [ 3120.348053][T11132] device veth0_vlan entered promiscuous mode [ 3120.369372][T11130] sit0: mtu greater than device maximum [ 3120.666635][T11151] device syzkaller0 entered promiscuous mode [ 3120.701354][T11154] device pimreg0 entered promiscuous mode [ 3121.003010][T11185] tun0: tun_chr_ioctl cmd 2148553947 [ 3121.027074][T11186] tun0: tun_chr_ioctl cmd 2148553947 [ 3122.090139][T11253] device syzkaller0 entered promiscuous mode [ 3122.125449][T11251] pim6reg0: tun_chr_ioctl cmd 1074025692 [ 3122.576335][T11278] device syzkaller0 entered promiscuous mode [ 3122.999008][T11320] device syzkaller0 entered promiscuous mode [ 3123.880154][T11361] device syzkaller0 entered promiscuous mode [ 3124.526949][T11391] device syzkaller0 entered promiscuous mode [ 3124.715804][T11399] device syzkaller0 entered promiscuous mode [ 3125.096388][T11424] device syzkaller0 entered promiscuous mode [ 3125.720708][T11440] device syzkaller0 entered promiscuous mode [ 3126.103441][T11460] device syzkaller0 entered promiscuous mode [ 3127.279882][T11527] device syzkaller0 entered promiscuous mode [ 3127.645088][T11543] device sit0 left promiscuous mode [ 3127.692954][T11543] device sit0 entered promiscuous mode [ 3127.964930][T11569] device syzkaller0 entered promiscuous mode [ 3128.730401][T11609] device syzkaller0 entered promiscuous mode [ 3128.817201][T11618] device syzkaller0 entered promiscuous mode [ 3129.070740][T11627] : port 1(syz_tun) entered blocking state [ 3129.076807][T11627] : port 1(syz_tun) entered disabled state [ 3129.084247][T11627] device syz_tun entered promiscuous mode [ 3129.751144][T11676] device syzkaller0 entered promiscuous mode [ 3130.990981][T11717] device syzkaller0 entered promiscuous mode [ 3131.384506][T11726] device syzkaller0 entered promiscuous mode [ 3131.826114][T11761] device syzkaller0 entered promiscuous mode [ 3131.882900][T11772] device syzkaller0 entered promiscuous mode [ 3131.901083][T11774] device syzkaller0 entered promiscuous mode [ 3132.069297][T11797] device syzkaller0 entered promiscuous mode [ 3132.230769][T11800] device wg2 left promiscuous mode [ 3132.626989][T11809] device syzkaller0 entered promiscuous mode [ 3136.299097][T11996] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.306445][T11996] bridge0: port 1(bridge_slave_0) entered disabled state [ 3136.314640][T11996] device bridge_slave_0 entered promiscuous mode [ 3136.382346][T11996] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.423802][T11996] bridge0: port 2(bridge_slave_1) entered disabled state [ 3136.457895][T11996] device bridge_slave_1 entered promiscuous mode [ 3136.684249][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.692337][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.710154][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.718790][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.727285][T28267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.734504][T28267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.752495][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.766411][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.775531][T28267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.782597][T28267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.820212][ T300] device gretap0 left promiscuous mode [ 3136.825883][ T300] bridge0: port 3(gretap0) entered disabled state [ 3136.918902][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3136.936964][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3136.945605][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3136.975416][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3136.989166][T11996] device veth0_vlan entered promiscuous mode [ 3136.997767][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3137.036349][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3137.061497][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3137.092418][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3137.112178][T11996] device veth1_macvtap entered promiscuous mode [ 3137.140864][ T300] nr0: port 1(macsec0) entered disabled state [ 3137.158997][ T300] device bridge_slave_1 left promiscuous mode [ 3137.169890][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3137.177939][ T300] device bridge_slave_0 left promiscuous mode [ 3137.184225][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3137.193386][ T300] device veth1_macvtap left promiscuous mode [ 3137.285287][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3137.310047][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3138.695640][ T8023] device syz_tun left promiscuous mode [ 3138.717665][ T8023] : port 1(syz_tun) entered disabled state [ 3139.303806][T12117] bridge0: port 1(bridge_slave_0) entered blocking state [ 3139.327535][T12117] bridge0: port 1(bridge_slave_0) entered disabled state [ 3139.347774][T12117] device bridge_slave_0 entered promiscuous mode [ 3139.360764][T12124] ªªªªª»: renamed from bond_slave_1 [ 3139.377144][T12117] bridge0: port 2(bridge_slave_1) entered blocking state [ 3139.409889][T12117] bridge0: port 2(bridge_slave_1) entered disabled state [ 3139.437512][T12117] device bridge_slave_1 entered promiscuous mode [ 3139.731567][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3139.741534][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3139.767201][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3139.781273][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3139.795253][T23061] bridge0: port 1(bridge_slave_0) entered blocking state [ 3139.802339][T23061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3139.819606][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3139.832843][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3139.846578][T23061] bridge0: port 2(bridge_slave_1) entered blocking state [ 3139.853752][T23061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3139.878325][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3139.890882][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3139.904858][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3139.919693][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3139.932363][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3139.968185][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3139.979287][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3139.995802][T12117] device veth0_vlan entered promiscuous mode [ 3140.017920][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3140.027808][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3140.048358][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3140.064219][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3140.076657][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3140.089621][T12117] device veth1_macvtap entered promiscuous mode [ 3140.111517][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3140.122875][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3140.138838][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3140.157978][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3140.773428][ T300] device bridge_slave_1 left promiscuous mode [ 3140.785598][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3140.806971][ T300] device bridge_slave_0 left promiscuous mode [ 3140.813373][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3140.822151][ T300] device veth1_macvtap left promiscuous mode [ 3140.828321][ T300] device veth0_vlan left promiscuous mode [ 3141.366337][T12211] : port 2(ip6gretap0) entered blocking state [ 3141.372738][T12211] : port 2(ip6gretap0) entered disabled state [ 3141.379632][T12211] device ip6gretap0 entered promiscuous mode [ 3142.394337][T12255] bridge0: port 3(vlan1) entered blocking state [ 3142.406549][T12255] bridge0: port 3(vlan1) entered disabled state [ 3142.413685][T12255] device vlan1 entered promiscuous mode [ 3142.611175][T12270] device wg2 entered promiscuous mode [ 3144.565333][T12358] device syzkaller0 entered promiscuous mode [ 3145.210781][T12401] device syzkaller0 entered promiscuous mode [ 3146.185312][T12435] device sit0 entered promiscuous mode [ 3148.156963][T12561] geneve1: tun_chr_ioctl cmd 2148553947 [ 3148.282985][T12568] device ip6gre0 entered promiscuous mode [ 3149.516861][T12641] syzkaller0: create flow: hash 3664474465 index 0 [ 3149.575968][T12630] device syzkaller0 entered promiscuous mode [ 3149.607258][T14421] syzkaller0: tun_net_xmit 48 [ 3149.624976][T12644] Â: renamed from pim6reg1 [ 3149.757981][T12629] syzkaller0 (unregistered): delete flow: hash 3664474465 index 0 [ 3150.373709][T12667] device sit0 entered promiscuous mode [ 3154.110945][T12949] syz.2.43844[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3154.111010][T12949] syz.2.43844[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3155.519156][T12995] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 3155.578441][T13000] device veth1_macvtap left promiscuous mode [ 3155.589081][T13000] device veth1_macvtap entered promiscuous mode [ 3155.595823][T13000] device macsec0 entered promiscuous mode [ 3158.146401][T13104] tap0: tun_chr_ioctl cmd 1074025681 [ 3159.150185][T13162] device syzkaller0 entered promiscuous mode [ 3159.254517][T13177] ³þ: renamed from bond_slave_0 [ 3159.434438][T13179] device syzkaller0 entered promiscuous mode [ 3159.818148][T13209] device syzkaller0 entered promiscuous mode [ 3159.863834][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3160.069187][T13216] device syzkaller0 entered promiscuous mode [ 3160.716139][T13261] device syzkaller0 entered promiscuous mode [ 3161.121141][ T24] audit: type=1400 audit(1777555293.900:182): avc: denied { search } for pid=13298 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.195878][ T24] audit: type=1400 audit(1777555293.900:183): avc: denied { getattr } for pid=13298 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.275733][ T24] audit: type=1400 audit(1777555293.930:184): avc: denied { write } for pid=13308 comm="rm" name="resolv.conf" dev="tmpfs" ino=416 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.314694][ T24] audit: type=1400 audit(1777555293.930:185): avc: denied { remove_name } for pid=13308 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.347467][ T24] audit: type=1400 audit(1777555293.930:186): avc: denied { unlink } for pid=13308 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.353959][T13318] device syzkaller0 entered promiscuous mode [ 3161.404435][ T24] audit: type=1400 audit(1777555293.960:187): avc: denied { getattr } for pid=13298 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=416 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.472011][ T24] audit: type=1400 audit(1777555293.960:188): avc: denied { add_name } for pid=13298 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.586507][T13347] device syzkaller0 entered promiscuous mode [ 3161.587492][ T24] audit: type=1400 audit(1777555293.960:189): avc: denied { create } for pid=13298 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.644897][ T24] audit: type=1400 audit(1777555293.960:190): avc: denied { write open } for pid=13298 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=160371 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.713794][ T24] audit: type=1400 audit(1777555293.970:191): avc: denied { read } for pid=13320 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=416 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3161.825785][T13357] device aaaaaaaaaaaaaaa entered promiscuous mode [ 3162.040757][T13366] device wg2 left promiscuous mode [ 3162.087843][T13375] device wg2 entered promiscuous mode [ 3164.314036][T13521] device ip6gretap0 left promiscuous mode [ 3164.322039][T13521] : port 1(ip6gretap0) entered disabled state [ 3164.799389][T13554] device syzkaller0 entered promiscuous mode [ 3166.600753][T13662] device syzkaller0 entered promiscuous mode [ 3166.704920][T13666] +: renamed from team_slave_1 [ 3169.798285][ T300] device bridge_slave_1 left promiscuous mode [ 3169.804412][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3169.811908][ T300] device bridge_slave_0 left promiscuous mode [ 3169.818324][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3169.850561][ T300] device veth1_macvtap left promiscuous mode [ 3169.864935][ T300] device veth0_vlan left promiscuous mode [ 3170.054092][T13694] device wg2 left promiscuous mode [ 3170.170878][T13697] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.178124][T13697] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.185788][T13697] device bridge_slave_0 entered promiscuous mode [ 3170.193287][T13697] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.201070][T13697] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.208748][T13697] device bridge_slave_1 entered promiscuous mode [ 3170.225427][T13710] device wg2 left promiscuous mode [ 3170.283625][T13710] device wg2 entered promiscuous mode [ 3170.353360][T13697] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.360734][T13697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3170.368063][T13697] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.375103][T13697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3170.525867][T13720] +: renamed from team_slave_1 [ 3170.644864][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3170.653260][T23061] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.709682][T23061] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.763392][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3170.773229][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3170.791764][T23061] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.798876][T23061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3170.824536][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3170.833511][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3170.842370][T23061] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.849526][T23061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3170.866814][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3170.875180][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3170.883802][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3170.892387][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3170.904044][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3170.912783][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3170.933987][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3170.942279][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3170.951448][T13697] device veth0_vlan entered promiscuous mode [ 3170.965975][T13697] device veth1_macvtap entered promiscuous mode [ 3170.979671][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3170.989578][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3171.000961][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3171.015038][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3171.043940][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3171.092997][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3171.140088][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3171.191013][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3171.241382][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3171.275682][T13729] tun0: tun_chr_ioctl cmd 1074025677 [ 3171.289344][T13729] tun0: linktype set to 270 [ 3172.657478][T13810] device syzkaller0 entered promiscuous mode [ 3172.778825][T13812] device syzkaller0 entered promiscuous mode [ 3173.371030][T13857] device syzkaller0 entered promiscuous mode [ 3173.441194][T13878] device syzkaller0 entered promiscuous mode [ 3175.227109][T13985] device wg2 left promiscuous mode [ 3175.271814][T13985] device wg2 entered promiscuous mode [ 3177.150500][T14123] device wg2 left promiscuous mode [ 3177.221532][T14123] device wg2 entered promiscuous mode [ 3177.332610][T14139] device syzkaller0 entered promiscuous mode [ 3177.719873][T14157] device wg2 entered promiscuous mode [ 3178.265774][T14185] device syzkaller0 entered promiscuous mode [ 3179.014869][T14227] device syzkaller0 entered promiscuous mode [ 3180.478393][T14305] device syzkaller0 entered promiscuous mode [ 3182.304673][T14450] device syzkaller0 entered promiscuous mode [ 3182.686676][T14482] geneve1: tun_chr_ioctl cmd 1074025673 [ 3183.692090][T14546] device syzkaller0 entered promiscuous mode [ 3184.108286][T14580] veth1_to_bond: mtu greater than device maximum [ 3186.263864][T14708] : port 1(syz_tun) entered blocking state [ 3186.270036][T14708] : port 1(syz_tun) entered disabled state [ 3186.278878][T14708] device syz_tun entered promiscuous mode [ 3186.287023][T14708] device syz_tun left promiscuous mode [ 3186.292940][T14708] : port 1(syz_tun) entered disabled state [ 3187.596748][T14794] device veth0_vlan left promiscuous mode [ 3187.631870][T14794] device veth0_vlan entered promiscuous mode [ 3187.708517][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3187.721410][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3187.740326][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3188.581495][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3188.597674][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3188.637767][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3188.645359][T23061] bridge0: port 3(vlan1) entered blocking state [ 3188.651652][T23061] bridge0: port 3(vlan1) entered forwarding state [ 3190.741722][T14939] device wg2 entered promiscuous mode [ 3192.024446][T15012] device  entered promiscuous mode [ 3192.669695][T15057] device syzkaller0 entered promiscuous mode [ 3193.859872][T15137] device syzkaller0 entered promiscuous mode [ 3193.992128][T15143] device syzkaller0 entered promiscuous mode [ 3194.086910][T15152] tun0: tun_chr_ioctl cmd 1074025677 [ 3194.092345][T15152] tun0: linktype set to 820 [ 3194.162406][T15162] device syzkaller0 entered promiscuous mode [ 3194.444404][T15212] tun0: tun_chr_ioctl cmd 1074025673 [ 3194.450020][T15213] tun0: tun_chr_ioctl cmd 2147767506 [ 3194.555720][T15221] device syzkaller0 entered promiscuous mode [ 3196.026476][T15279] device syzkaller0 entered promiscuous mode [ 3197.805028][T15349] device syzkaller0 entered promiscuous mode [ 3198.400825][T15370] device wg2 left promiscuous mode [ 3198.437722][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3199.096768][T15431] device syzkaller0 entered promiscuous mode [ 3200.624751][T15538] : port 3(syz_tun) entered blocking state [ 3200.630910][T15538] : port 3(syz_tun) entered disabled state [ 3200.649009][T15538] device syz_tun entered promiscuous mode [ 3200.664502][T15538] device syz_tun left promiscuous mode [ 3200.676681][T15538] : port 3(syz_tun) entered disabled state [ 3201.024488][T15596] bridge0: port 3(vlan1) entered disabled state [ 3201.063729][T15596] bridge0: port 3(vlan1) entered blocking state [ 3201.070065][T15596] bridge0: port 3(vlan1) entered forwarding state [ 3201.076845][T15596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3201.085323][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3201.094310][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3201.101674][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3201.571940][T15633] device syzkaller0 entered promiscuous mode [ 3201.878991][T15646] device veth0_vlan left promiscuous mode [ 3201.896715][T15646] device veth0_vlan entered promiscuous mode [ 3203.071688][T15691] device syzkaller0 entered promiscuous mode [ 3203.585120][T15729] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3203.617349][T15729] device syzkaller0 entered promiscuous mode [ 3204.680840][T15788] device syzkaller0 entered promiscuous mode [ 3205.167858][T15809] device syzkaller0 entered promiscuous mode [ 3206.431405][T15884] : port 1(ip6gretap0) entered blocking state [ 3206.438814][T15884] : port 1(ip6gretap0) entered disabled state [ 3206.451043][T15884] device ip6gretap0 entered promiscuous mode [ 3208.255834][T15985] device wg2 entered promiscuous mode [ 3208.631565][T16014] bridge0: port 1(bridge_slave_0) entered blocking state [ 3208.639097][T16014] bridge0: port 1(bridge_slave_0) entered disabled state [ 3208.646580][T16014] device bridge_slave_0 entered promiscuous mode [ 3208.653818][T16014] bridge0: port 2(bridge_slave_1) entered blocking state [ 3208.660888][T16014] bridge0: port 2(bridge_slave_1) entered disabled state [ 3208.668284][T16014] device bridge_slave_1 entered promiscuous mode [ 3208.725888][T16014] bridge0: port 2(bridge_slave_1) entered blocking state [ 3208.732987][T16014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3208.740819][T16014] bridge0: port 1(bridge_slave_0) entered blocking state [ 3208.747903][T16014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3208.770015][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3208.778540][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 3208.786479][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 3208.802516][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3208.811043][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 3208.818132][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3208.825768][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3208.834312][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 3208.841585][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3208.854553][T23061] device ip6gretap0 left promiscuous mode [ 3208.860391][T23061] : port 2(ip6gretap0) entered disabled state [ 3208.877661][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3208.885746][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3208.895562][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3208.903968][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3208.929863][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3208.939054][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3208.952412][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3208.961116][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3208.969915][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3208.978107][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3208.986390][T16014] device veth0_vlan entered promiscuous mode [ 3209.019837][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3209.029320][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3209.045589][T16014] device veth1_macvtap entered promiscuous mode [ 3209.065376][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3209.074452][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3209.090959][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3209.099677][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3209.109134][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3209.568998][T23061] device macsec0 left promiscuous mode [ 3209.575823][T23061] nr0: port 1(macsec0) entered disabled state [ 3209.592929][T23061] : port 1(dummy0) entered disabled state [ 3210.155157][T16092] @ÿ: renamed from bond_slave_0 [ 3210.212362][T16100] device syzkaller0 entered promiscuous mode [ 3210.227516][T16092] @0Ù: renamed from bond_slave_1 [ 3210.370359][T16121] device syzkaller0 entered promiscuous mode [ 3210.519440][T16138] device syzkaller0 entered promiscuous mode [ 3211.402173][T16178] tap0: tun_chr_ioctl cmd 1074025677 [ 3211.414303][T16178] tap0: linktype set to 805 [ 3211.424586][T16177] tap0: tun_chr_ioctl cmd 1074025673 [ 3211.436677][T16179] tap0: tun_chr_ioctl cmd 1074025677 [ 3211.447600][T16179] tap0: linktype set to 805 [ 3211.518206][T16182] device syzkaller0 entered promiscuous mode [ 3211.980835][T16221] device syzkaller0 entered promiscuous mode [ 3212.852323][T16275] device syzkaller0 entered promiscuous mode [ 3214.454428][T16346] device syzkaller0 entered promiscuous mode [ 3214.524393][T16347] device syzkaller0 entered promiscuous mode [ 3215.544226][T16384] device syzkaller0 entered promiscuous mode [ 3216.561714][T16446] device syzkaller0 entered promiscuous mode [ 3216.694564][T16459] device dummy0 entered promiscuous mode [ 3216.700881][T16458] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 3216.707953][T16458] syzkaller0: linktype set to 774 [ 3216.927972][T16474] device syzkaller0 entered promiscuous mode [ 3217.695259][T16494] device syzkaller0 entered promiscuous mode [ 3217.708652][T16492] device sit0 entered promiscuous mode [ 3218.906297][T16577] device syzkaller0 entered promiscuous mode [ 3219.507070][T16617] bridge0: port 3(gretap0) entered blocking state [ 3219.559473][T16617] bridge0: port 3(gretap0) entered disabled state [ 3219.602390][T16617] device gretap0 entered promiscuous mode [ 3219.611237][T16617] bridge0: port 3(gretap0) entered blocking state [ 3219.617976][T16617] bridge0: port 3(gretap0) entered forwarding state [ 3220.269469][T16668] device syzkaller0 entered promiscuous mode [ 3221.051313][T16731] device ip6gre0 entered promiscuous mode [ 3221.562003][T16745] device syzkaller0 entered promiscuous mode [ 3222.141190][T16791] device syzkaller0 entered promiscuous mode [ 3222.282231][T16814] : port 1(ip6gretap0) entered blocking state [ 3222.306071][T16814] : port 1(ip6gretap0) entered disabled state [ 3222.327345][T16814] device ip6gretap0 entered promiscuous mode [ 3222.469322][T16832] device syzkaller0 entered promiscuous mode [ 3222.562089][T16830] device syzkaller0 entered promiscuous mode [ 3222.578899][T16830] device syzkaller0 left promiscuous mode [ 3222.844175][T16853] device syzkaller0 entered promiscuous mode [ 3223.055648][T16894] ref_ctr_offset mismatch. inode: 0x128 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 3223.072333][T16899] device wg2 left promiscuous mode [ 3223.817546][T16920] device syzkaller0 entered promiscuous mode [ 3224.255714][T16932] device GPL entered promiscuous mode [ 3225.511265][T16950] device wg2 entered promiscuous mode [ 3225.601840][T16956] device syzkaller0 entered promiscuous mode [ 3226.167735][T16987] bridge0: port 3(veth1_macvtap) entered blocking state [ 3226.175210][T16987] bridge0: port 3(veth1_macvtap) entered disabled state [ 3226.193784][T16985] device dummy0 entered promiscuous mode [ 3226.316520][T16997] device syzkaller0 entered promiscuous mode [ 3227.247755][T17053] device ip6gretap0 left promiscuous mode [ 3227.254484][T17053] : port 1(ip6gretap0) entered disabled state [ 3228.103245][T17098] device syzkaller0 entered promiscuous mode [ 3229.652999][T17216] device syzkaller0 entered promiscuous mode [ 3229.806747][T17230] device wg2 entered promiscuous mode [ 3231.987411][T17271] device syzkaller0 entered promiscuous mode [ 3232.044650][T17256] bridge0: port 1(bridge_slave_0) entered blocking state [ 3232.052512][T17256] bridge0: port 1(bridge_slave_0) entered disabled state [ 3232.065199][T17256] device bridge_slave_0 entered promiscuous mode [ 3232.090374][T17256] bridge0: port 2(bridge_slave_1) entered blocking state [ 3232.107514][T17256] bridge0: port 2(bridge_slave_1) entered disabled state [ 3232.115348][T17256] device bridge_slave_1 entered promiscuous mode [ 3232.458617][T30023] device bridge_slave_1 left promiscuous mode [ 3232.471978][T30023] bridge0: port 2(bridge_slave_1) entered disabled state [ 3232.479760][T30023] device bridge_slave_0 left promiscuous mode [ 3232.486133][T30023] bridge0: port 1(bridge_slave_0) entered disabled state [ 3232.495297][T30023] device veth1_macvtap left promiscuous mode [ 3232.501425][T30023] device veth0_vlan left promiscuous mode [ 3232.653027][T17256] bridge0: port 2(bridge_slave_1) entered blocking state [ 3232.660239][T17256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3232.667589][T17256] bridge0: port 1(bridge_slave_0) entered blocking state [ 3232.674623][T17256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3233.068058][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3233.078333][T28267] bridge0: port 1(bridge_slave_0) entered disabled state [ 3233.087806][T28267] bridge0: port 2(bridge_slave_1) entered disabled state [ 3233.140878][T17321] device syzkaller0 entered promiscuous mode [ 3233.186946][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3233.195574][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3233.204495][T28267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3233.211689][T28267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3233.220305][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3233.228861][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3233.238093][T28267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3233.245165][T28267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3233.252816][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3233.261170][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3233.269443][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3233.277786][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3233.302141][T17256] device veth0_vlan entered promiscuous mode [ 3233.310039][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3233.319556][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3233.329182][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3233.337786][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3233.346088][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3233.353944][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3233.377922][T17256] device veth1_macvtap entered promiscuous mode [ 3233.400355][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3233.408922][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3233.417212][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3233.435163][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3233.444124][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3233.452647][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3233.461255][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3234.724722][T17388] device syzkaller0 entered promiscuous mode [ 3234.794796][T17391] device wg2 left promiscuous mode [ 3234.882292][T17391] device wg2 entered promiscuous mode [ 3235.493776][T17431] device syzkaller0 entered promiscuous mode [ 3236.845625][T17480] device syzkaller0 entered promiscuous mode [ 3237.622013][T17527] device syzkaller0 entered promiscuous mode [ 3237.656687][T17526] device wg2 left promiscuous mode [ 3237.925081][T17545] : port 2(syz_tun) entered blocking state [ 3237.931215][T17545] : port 2(syz_tun) entered disabled state [ 3237.937949][T17545] device syz_tun entered promiscuous mode [ 3238.073879][T17569] device syzkaller0 entered promiscuous mode [ 3238.128828][T17562] device syzkaller0 entered promiscuous mode [ 3238.750560][T17609] bridge0: port 2(bridge_slave_1) entered disabled state [ 3238.758174][T17609] bridge0: port 1(bridge_slave_0) entered disabled state [ 3238.878865][T17609] +: renamed from team_slave_1 [ 3239.213242][T17617] device syzkaller0 entered promiscuous mode [ 3240.419880][T17657] device syzkaller0 entered promiscuous mode [ 3240.875262][T17696] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3240.908329][T17696] device syzkaller0 entered promiscuous mode [ 3241.100239][T17703] device syzkaller0 entered promiscuous mode [ 3241.173422][T17706] device macsec0 entered promiscuous mode [ 3241.712193][T17741] device syzkaller0 entered promiscuous mode [ 3242.646669][T17799] device syzkaller0 entered promiscuous mode [ 3242.999828][T17802] syzkaller0: refused to change device tx_queue_len [ 3243.049815][T17804] syz.2.45283[17804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3243.049917][T17804] syz.2.45283[17804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3243.067170][T17807] @0Ù: renamed from bond_slave_1 [ 3243.174890][T17824] FAULT_INJECTION: forcing a failure. [ 3243.174890][T17824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3243.190617][T17824] CPU: 1 PID: 17824 Comm: syz.8.45288 Tainted: G W syzkaller #0 [ 3243.199599][T17824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3243.209673][T17824] Call Trace: [ 3243.212995][T17824] __dump_stack+0x21/0x24 [ 3243.217357][T17824] dump_stack_lvl+0x1a7/0x208 [ 3243.222158][T17824] ? thaw_kernel_threads+0x220/0x220 [ 3243.227458][T17824] ? vsnprintf+0x189c/0x1990 [ 3243.232069][T17824] ? show_regs_print_info+0x18/0x18 [ 3243.237293][T17824] dump_stack+0x15/0x1c [ 3243.241467][T17824] should_fail+0x3c1/0x510 [ 3243.245909][T17824] should_fail_usercopy+0x1a/0x20 [ 3243.250966][T17824] _copy_to_user+0x20/0x90 [ 3243.255424][T17824] simple_read_from_buffer+0xe9/0x160 [ 3243.260930][T17824] proc_fail_nth_read+0x1a6/0x220 [ 3243.266510][T17824] ? proc_fault_inject_write+0x310/0x310 [ 3243.272374][T17824] ? rw_verify_area+0x1c0/0x360 [ 3243.277261][T17824] ? proc_fault_inject_write+0x310/0x310 [ 3243.282917][T17824] vfs_read+0x209/0xa60 [ 3243.287116][T17824] ? kernel_read+0x70/0x70 [ 3243.291556][T17824] ? __kasan_check_write+0x14/0x20 [ 3243.296687][T17824] ? mutex_lock+0x92/0xf0 [ 3243.301158][T17824] ? mutex_trylock+0xa0/0xa0 [ 3243.305774][T17824] ? __fget_files+0x2c4/0x320 [ 3243.310481][T17824] ? __fdget_pos+0x2d2/0x380 [ 3243.315117][T17824] ? ksys_read+0x71/0x250 [ 3243.319519][T17824] ksys_read+0x149/0x250 [ 3243.324071][T17824] ? vfs_write+0xdc0/0xdc0 [ 3243.328600][T17824] ? ____fput+0x15/0x20 [ 3243.332864][T17824] ? debug_smp_processor_id+0x17/0x20 [ 3243.338266][T17824] __x64_sys_read+0x7b/0x90 [ 3243.342805][T17824] do_syscall_64+0x31/0x40 [ 3243.347355][T17824] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3243.353365][T17824] RIP: 0033:0x7fec230c260e [ 3243.357984][T17824] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3243.377898][T17824] RSP: 002b:00007fec21b5bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3243.386426][T17824] RAX: ffffffffffffffda RBX: 00007fec21b5c6c0 RCX: 00007fec230c260e [ 3243.394424][T17824] RDX: 000000000000000f RSI: 00007fec21b5c0a0 RDI: 0000000000000009 [ 3243.402424][T17824] RBP: 00007fec21b5c090 R08: 0000000000000000 R09: 0000000000000000 [ 3243.410828][T17824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3243.418829][T17824] R13: 00007fec2337b038 R14: 00007fec2337afa0 R15: 00007ffff831fba8 [ 3243.452845][T17826] bridge0: port 4(ip6gretap0) entered blocking state [ 3243.459923][T17826] bridge0: port 4(ip6gretap0) entered disabled state [ 3243.467133][T17826] device ip6gretap0 entered promiscuous mode [ 3243.473607][T17826] bridge0: port 4(ip6gretap0) entered blocking state [ 3243.480846][T17826] bridge0: port 4(ip6gretap0) entered forwarding state [ 3243.489645][T17827] device ip6gretap0 left promiscuous mode [ 3243.495561][T17827] bridge0: port 4(ip6gretap0) entered disabled state [ 3243.504608][T17829] sock: sock_set_timeout: `syz.3.45290' (pid 17829) tries to set negative timeout [ 3243.585771][T17833] device syzkaller0 entered promiscuous mode [ 3243.924177][T17852] device syzkaller0 entered promiscuous mode [ 3244.441367][T17881] device syzkaller0 entered promiscuous mode [ 3244.476587][T17874] device syzkaller0 entered promiscuous mode [ 3244.936724][T17917] device syzkaller0 entered promiscuous mode [ 3245.661708][T17942] device syzkaller0 entered promiscuous mode [ 3246.068394][T17983] device syzkaller0 entered promiscuous mode [ 3246.104655][T17992] device syzkaller0 entered promiscuous mode [ 3247.142439][T18018] device syzkaller0 entered promiscuous mode [ 3248.686413][T18033] device syzkaller0 entered promiscuous mode [ 3248.982881][T18052] device syzkaller0 entered promiscuous mode [ 3249.186974][T18073] IPv6: : Disabled Multicast RS [ 3249.264195][T18077] device wg2 left promiscuous mode [ 3249.592669][T18091] device syzkaller0 entered promiscuous mode [ 3249.622357][T18110] device syzkaller0 entered promiscuous mode [ 3249.842995][T18145] device syzkaller0 entered promiscuous mode [ 3250.715517][T18172] device syzkaller0 entered promiscuous mode [ 3250.987771][T18188] device syzkaller0 entered promiscuous mode [ 3251.182735][T18204] device syzkaller0 entered promiscuous mode [ 3251.696725][T18241] device syzkaller0 entered promiscuous mode [ 3252.005512][T18249] bridge0: port 1(bridge_slave_0) entered blocking state [ 3252.034582][T18249] bridge0: port 1(bridge_slave_0) entered disabled state [ 3252.055483][T18249] device bridge_slave_0 entered promiscuous mode [ 3252.083324][T18249] bridge0: port 2(bridge_slave_1) entered blocking state [ 3252.107066][T18249] bridge0: port 2(bridge_slave_1) entered disabled state [ 3252.138097][T18249] device bridge_slave_1 entered promiscuous mode [ 3252.292720][T18249] bridge0: port 2(bridge_slave_1) entered blocking state [ 3252.299844][T18249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3252.307194][T18249] bridge0: port 1(bridge_slave_0) entered blocking state [ 3252.314272][T18249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3252.504606][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3252.523283][T28267] bridge0: port 1(bridge_slave_0) entered disabled state [ 3252.551673][T28267] bridge0: port 2(bridge_slave_1) entered disabled state [ 3252.619785][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3252.629045][T28267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3252.636136][T28267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3252.644844][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3252.654543][T28267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3252.661618][T28267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3252.669265][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3252.680216][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3252.747984][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3252.756201][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3252.763940][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3252.772635][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3252.814484][T18249] device veth0_vlan entered promiscuous mode [ 3252.874541][T18290] device syzkaller0 entered promiscuous mode [ 3252.888460][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3253.013489][T18249] device veth1_macvtap entered promiscuous mode [ 3253.067685][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3253.092683][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3253.142405][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3253.183681][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3253.354906][ T48] device vlan1 left promiscuous mode [ 3253.370053][ T48] bridge0: port 3(vlan1) entered disabled state [ 3253.378048][ T48] device bridge_slave_1 left promiscuous mode [ 3253.384278][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 3253.392439][ T48] device bridge_slave_0 left promiscuous mode [ 3253.420365][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 3253.461524][ T48] device veth1_macvtap left promiscuous mode [ 3253.494847][ T48] device veth0_vlan left promiscuous mode [ 3254.061941][T18331] device syzkaller0 entered promiscuous mode [ 3254.837532][T18384] device syzkaller0 entered promiscuous mode [ 3255.249961][T18403] device syzkaller0 entered promiscuous mode [ 3256.170275][T18442] device syzkaller0 entered promiscuous mode [ 3256.500135][T18462] device wg2 left promiscuous mode [ 3256.568380][T18462] device wg2 entered promiscuous mode [ 3256.908754][T18487] device syzkaller0 entered promiscuous mode [ 3257.403555][T18527] device syzkaller0 entered promiscuous mode [ 3257.617838][T18535] device syzkaller0 entered promiscuous mode [ 3258.065152][T18558] device syzkaller0 entered promiscuous mode [ 3258.160861][T18567] device syzkaller0 entered promiscuous mode [ 3258.337844][T18576] device team_slave_0 entered promiscuous mode [ 3258.357176][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3258.376238][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3258.586193][T18621] device syzkaller0 entered promiscuous mode [ 3258.952832][T18643] device syzkaller0 entered promiscuous mode [ 3259.236340][T18664] device syzkaller0 entered promiscuous mode [ 3259.830062][T18697] device syzkaller0 entered promiscuous mode [ 3260.126781][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 3260.438852][T18728] device syzkaller0 entered promiscuous mode [ 3261.179199][T18767] device syzkaller0 entered promiscuous mode [ 3261.430735][T18806] device syzkaller0 entered promiscuous mode [ 3261.627180][T18828] device syzkaller0 entered promiscuous mode [ 3262.552858][T18876] device veth0_vlan left promiscuous mode [ 3262.574843][T18876] device veth0_vlan entered promiscuous mode [ 3262.678722][T18889] device syzkaller0 entered promiscuous mode [ 3262.952378][T18923] device syzkaller0 entered promiscuous mode [ 3263.985459][T18984] device syzkaller0 entered promiscuous mode [ 3264.414130][T19016] device veth0_vlan left promiscuous mode [ 3264.420981][T19016] device veth0_vlan entered promiscuous mode [ 3265.061375][T19133] device syzkaller0 entered promiscuous mode [ 3266.117226][T19192] device syzkaller0 entered promiscuous mode [ 3266.653518][T19219] device veth1_macvtap left promiscuous mode [ 3266.659881][T19219] device macsec0 left promiscuous mode [ 3267.764434][T19316] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 3268.178135][T19341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3269.169799][T19396] device syzkaller0 entered promiscuous mode [ 3269.642516][T19431] device veth0_vlan left promiscuous mode [ 3269.660019][T19431] device veth0_vlan entered promiscuous mode [ 3269.826299][T19444] device syzkaller0 entered promiscuous mode [ 3269.975745][T19450] device wg2 left promiscuous mode [ 3269.989607][T19450] device wg2 entered promiscuous mode [ 3270.348030][T19466] device syzkaller0 entered promiscuous mode [ 3270.584053][T19472] geneve1: tun_chr_ioctl cmd 1074025675 [ 3270.607246][T19472] geneve1: persist disabled [ 3272.038462][T19530] device syzkaller0 entered promiscuous mode [ 3272.135143][T19545] device syzkaller0 entered promiscuous mode [ 3272.328066][T19538] device syzkaller0 entered promiscuous mode [ 3272.593853][T19576] bridge0: port 2(bridge_slave_1) entered disabled state [ 3272.601163][T19576] bridge0: port 1(bridge_slave_0) entered disabled state [ 3273.401388][T19594] device syzkaller0 entered promiscuous mode [ 3273.613821][T19600] device syzkaller0 entered promiscuous mode [ 3274.174564][T19635] device syzkaller0 entered promiscuous mode [ 3274.302763][T19640] device syzkaller0 entered promiscuous mode [ 3274.493828][T19671] device syzkaller0 entered promiscuous mode [ 3274.610238][T19681] device syzkaller0 entered promiscuous mode [ 3275.086063][T19710] bridge0: port 1(bridge_slave_0) entered blocking state [ 3275.103839][T19710] bridge0: port 1(bridge_slave_0) entered disabled state [ 3275.114443][T19710] device bridge_slave_0 entered promiscuous mode [ 3275.143681][T19710] bridge0: port 2(bridge_slave_1) entered blocking state [ 3275.183178][T19710] bridge0: port 2(bridge_slave_1) entered disabled state [ 3275.199574][T19710] device bridge_slave_1 entered promiscuous mode [ 3275.249964][T19724] device syzkaller0 entered promiscuous mode [ 3275.433277][T19710] bridge0: port 2(bridge_slave_1) entered blocking state [ 3275.440477][T19710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3275.600281][T30023] bridge0: port 2(bridge_slave_1) entered disabled state [ 3275.619146][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3275.630271][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3275.651139][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3275.668409][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3275.697274][T30023] bridge0: port 1(bridge_slave_0) entered blocking state [ 3275.704568][T30023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3275.740743][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3275.766717][T30023] bridge0: port 2(bridge_slave_1) entered blocking state [ 3275.773917][T30023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3275.855180][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3275.873260][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3275.932922][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3275.961162][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3275.980805][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3276.005458][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3276.027865][T19710] device veth0_vlan entered promiscuous mode [ 3276.075956][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3276.092769][T19710] device veth1_macvtap entered promiscuous mode [ 3276.133837][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3276.149129][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3276.192746][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3276.232204][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3276.426101][T19753] device syzkaller0 entered promiscuous mode [ 3276.493516][T19758] device syzkaller0 entered promiscuous mode [ 3276.678471][ T314] device bridge_slave_1 left promiscuous mode [ 3276.684894][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 3276.752343][ T314] device bridge_slave_0 left promiscuous mode [ 3276.791859][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 3276.836243][ T314] device veth1_macvtap left promiscuous mode [ 3276.877633][ T314] device veth0_vlan left promiscuous mode [ 3277.670223][T19795] device syzkaller0 entered promiscuous mode [ 3278.429113][T19840] device syzkaller0 entered promiscuous mode [ 3279.012150][T19880] device syzkaller0 entered promiscuous mode [ 3279.412847][T19894] device syzkaller0 entered promiscuous mode [ 3279.459086][T19901] device syzkaller0 entered promiscuous mode [ 3279.772388][T19918] device syzkaller0 entered promiscuous mode [ 3280.563128][T19945] device syzkaller0 entered promiscuous mode [ 3281.278331][T19977] device wg2 left promiscuous mode [ 3281.362445][T19983] device syzkaller0 entered promiscuous mode [ 3281.419025][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3281.640691][T20005] device syzkaller0 entered promiscuous mode [ 3281.906657][T20008] device syzkaller0 entered promiscuous mode [ 3282.552605][T20035] device syzkaller0 entered promiscuous mode [ 3284.294316][T20130] device syzkaller0 entered promiscuous mode [ 3284.355324][T20136] device syzkaller0 entered promiscuous mode [ 3284.979451][T20175] device syzkaller0 entered promiscuous mode [ 3286.107726][T20232] device syzkaller0 entered promiscuous mode [ 3286.678957][T20263] device syzkaller0 entered promiscuous mode [ 3286.685751][T20259] lo: mtu less than device minimum [ 3286.869068][T20279] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 3286.937796][T20283] device wg2 entered promiscuous mode [ 3287.268772][T20296] : port 1(syz_tun) entered blocking state [ 3287.274810][T20296] : port 1(syz_tun) entered disabled state [ 3287.304792][T20296] device syz_tun entered promiscuous mode [ 3287.445809][T20298] lo: mtu less than device minimum [ 3287.682095][T20305] device syzkaller0 entered promiscuous mode [ 3288.533870][T20336] lo: mtu less than device minimum [ 3288.755810][T20343] bridge0: port 3(gretap0) entered disabled state [ 3288.762531][T20343] bridge0: port 2(bridge_slave_1) entered disabled state [ 3288.769708][T20343] bridge0: port 1(bridge_slave_0) entered disabled state [ 3289.333740][T19710] device syz_tun left promiscuous mode [ 3289.367622][T19710] : port 1(syz_tun) entered disabled state [ 3289.815200][T20410] bridge0: port 1(bridge_slave_0) entered blocking state [ 3289.843093][T20410] bridge0: port 1(bridge_slave_0) entered disabled state [ 3289.852122][T20410] device bridge_slave_0 entered promiscuous mode [ 3289.867928][T20408] device wg2 entered promiscuous mode [ 3289.886632][T20410] bridge0: port 2(bridge_slave_1) entered blocking state [ 3289.897496][T20410] bridge0: port 2(bridge_slave_1) entered disabled state [ 3289.907963][T20410] device bridge_slave_1 entered promiscuous mode [ 3290.197705][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3290.205294][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3290.228099][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3290.236637][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3290.245467][T28267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3290.252806][T28267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3290.278067][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3290.298180][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3290.306835][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3290.322966][T28267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3290.330072][T28267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3290.367052][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3290.378426][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3290.397821][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3290.411385][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3290.444281][T20410] device veth0_vlan entered promiscuous mode [ 3290.469421][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3290.487845][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3290.496532][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3290.518123][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3290.533579][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3290.548107][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3290.584693][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3290.600058][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3290.618808][T20410] device veth1_macvtap entered promiscuous mode [ 3290.639036][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3290.651574][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3290.668328][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3290.689539][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3290.708216][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3290.779141][ T300] device bridge_slave_1 left promiscuous mode [ 3290.787475][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3290.806056][ T300] device bridge_slave_0 left promiscuous mode [ 3290.830636][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3290.879300][ T300] device veth1_macvtap left promiscuous mode [ 3293.298113][ T300] device bridge_slave_1 left promiscuous mode [ 3293.304247][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3293.311957][ T300] device bridge_slave_0 left promiscuous mode [ 3293.318492][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3293.326404][ T300] device veth1_macvtap left promiscuous mode [ 3293.332664][ T300] device veth0_vlan left promiscuous mode [ 3293.494668][T20520] veth0_virt_wifi: mtu less than device minimum [ 3293.706786][T20528] device wg2 left promiscuous mode [ 3293.733871][T20526] bridge0: port 1(bridge_slave_0) entered blocking state [ 3293.762062][T20526] bridge0: port 1(bridge_slave_0) entered disabled state [ 3293.810901][T20526] device bridge_slave_0 entered promiscuous mode [ 3293.851374][T20528] device wg2 entered promiscuous mode [ 3293.890014][T20526] bridge0: port 2(bridge_slave_1) entered blocking state [ 3293.899505][T20526] bridge0: port 2(bridge_slave_1) entered disabled state [ 3293.923487][T20526] device bridge_slave_1 entered promiscuous mode [ 3294.692889][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3294.706277][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3294.730776][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3294.739468][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3294.748272][T30023] bridge0: port 1(bridge_slave_0) entered blocking state [ 3294.755518][T30023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3294.790060][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3294.838963][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3294.880223][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3294.892024][T30023] bridge0: port 2(bridge_slave_1) entered blocking state [ 3294.899474][T30023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3294.910524][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3294.922443][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3294.931554][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3294.940285][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3295.021382][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3295.031633][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3295.045132][T20526] device veth0_vlan entered promiscuous mode [ 3295.080815][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3295.094235][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3295.142252][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3295.186180][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3295.200715][T20526] device veth1_macvtap entered promiscuous mode [ 3295.381294][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3295.418253][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3295.455598][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3295.481247][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3295.518320][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3295.633292][T20616] device veth1_macvtap left promiscuous mode [ 3297.454424][T20689] device syzkaller0 entered promiscuous mode [ 3298.314844][T20719] device ip6gretap0 left promiscuous mode [ 3298.325726][T20719] : port 1(ip6gretap0) entered disabled state [ 3298.492698][T20730] device syzkaller0 entered promiscuous mode [ 3298.627159][T20737] device syzkaller0 entered promiscuous mode [ 3299.912962][T20816] device syzkaller0 entered promiscuous mode [ 3299.926484][T20816] device syzkaller0 left promiscuous mode [ 3300.865816][T20856] device wg2 entered promiscuous mode [ 3301.486315][T20882] -1: renamed from syzkaller0 [ 3302.856736][T20904] device veth0_vlan left promiscuous mode [ 3302.873811][T20904] device veth0_vlan entered promiscuous mode [ 3302.958006][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3302.967097][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3302.974841][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3303.797124][T20970] device bridge_slave_1 left promiscuous mode [ 3303.812448][T20970] bridge0: port 2(bridge_slave_1) entered disabled state [ 3303.820672][T20970] device bridge_slave_0 left promiscuous mode [ 3303.879793][T20970] bridge0: port 1(bridge_slave_0) entered disabled state [ 3303.963346][T20980] device syzkaller0 entered promiscuous mode [ 3305.024049][T21066] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3305.034846][T21066] device syzkaller0 entered promiscuous mode [ 3306.554376][T21158] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3306.562485][T21158] device syzkaller0 entered promiscuous mode [ 3307.727523][T21241] Ÿë: port 1(vlan1) entered blocking state [ 3307.786265][T21241] Ÿë: port 1(vlan1) entered disabled state [ 3307.833296][T21241] device vlan1 entered promiscuous mode [ 3308.979169][T21279] device wg2 entered promiscuous mode [ 3311.009258][T21344] device syzkaller0 entered promiscuous mode [ 3311.115534][T21347] device syzkaller0 entered promiscuous mode [ 3312.058646][T21356] device wg2 left promiscuous mode [ 3312.105281][T21356] device wg2 entered promiscuous mode [ 3313.624884][T21386] device syzkaller0 entered promiscuous mode [ 3315.212496][T21395] device syzkaller0 entered promiscuous mode [ 3315.558435][T21416] device syzkaller0 entered promiscuous mode [ 3316.116333][T21466] device syzkaller0 entered promiscuous mode [ 3316.274589][T21476] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3316.283275][T21476] device syzkaller0 entered promiscuous mode [ 3316.635184][T21497] device syzkaller0 entered promiscuous mode [ 3316.820895][T21504] device syzkaller0 entered promiscuous mode [ 3316.936426][T21506] syz.8.46408[21506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3316.936490][T21506] syz.8.46408[21506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3317.326078][T21535] device syzkaller0 entered promiscuous mode [ 3317.588817][T21547] device syzkaller0 entered promiscuous mode [ 3317.935497][T21561] device dummy0 left promiscuous mode [ 3318.199315][T21574] device syzkaller0 entered promiscuous mode [ 3318.606583][T21603] device syzkaller0 entered promiscuous mode [ 3319.924946][T21665] device sit0 left promiscuous mode [ 3320.937093][T21687] device macsec0 entered promiscuous mode [ 3321.344196][T21726] ÿ: renamed from bond_slave_0 [ 3321.932404][T21736] device syzkaller0 entered promiscuous mode [ 3323.038908][T21766] device syzkaller0 entered promiscuous mode [ 3323.516625][T21784] device syzkaller0 entered promiscuous mode [ 3324.013387][T21790] device macsec0 left promiscuous mode [ 3324.363917][T21814] device syzkaller0 entered promiscuous mode [ 3324.736275][T21816] device syzkaller0 entered promiscuous mode [ 3325.121809][T21822] ref_ctr_offset mismatch. inode: 0x969 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 3325.875671][T21830] device syzkaller0 entered promiscuous mode [ 3326.044535][T21840] bridge0: port 3(gretap0) entered blocking state [ 3326.051305][T21840] bridge0: port 3(gretap0) entered disabled state [ 3326.059056][T21840] device gretap0 entered promiscuous mode [ 3326.065359][T21840] bridge0: port 3(gretap0) entered blocking state [ 3326.071819][T21840] bridge0: port 3(gretap0) entered forwarding state [ 3326.180111][T21845] device syzkaller0 entered promiscuous mode [ 3326.555364][T21847] device syzkaller0 entered promiscuous mode [ 3326.735459][T21863] device syzkaller0 entered promiscuous mode [ 3327.675530][T21923] tun0: tun_chr_ioctl cmd 2147767506 [ 3327.717286][T21930] device syzkaller0 entered promiscuous mode [ 3328.432738][T21980] device syzkaller0 entered promiscuous mode [ 3328.850691][T22005] device syzkaller0 entered promiscuous mode [ 3329.629879][T22031] device syzkaller0 entered promiscuous mode [ 3329.642107][T22033] ±ÿ: renamed from team_slave_1 [ 3329.909643][T22049] ÿÿÿÿÿÿ: renamed from vlan1 [ 3330.422780][T22069] device syzkaller0 entered promiscuous mode [ 3331.448880][T22103] device syzkaller0 entered promiscuous mode [ 3331.634997][T22117] device syzkaller0 entered promiscuous mode [ 3332.045576][T22141] tun0: tun_chr_ioctl cmd 1074025677 [ 3332.051073][T22141] tun0: linktype set to 820 [ 3332.073467][T22148] device syzkaller0 entered promiscuous mode [ 3332.090135][T22141] tun0: tun_chr_ioctl cmd 1074025673 [ 3332.477849][T22196] device syzkaller0 entered promiscuous mode [ 3332.641857][T22210] device syzkaller0 entered promiscuous mode [ 3332.687219][T22220] device syzkaller0 entered promiscuous mode [ 3332.694158][T22220] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3332.791189][T22227] device syzkaller0 entered promiscuous mode [ 3333.001511][T22253] device syzkaller0 entered promiscuous mode [ 3333.117530][T22267] device syzkaller0 entered promiscuous mode [ 3333.386306][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3333.398419][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3333.406368][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3334.189617][T22344] device syzkaller0 entered promiscuous mode [ 3334.905483][T22380] device wg2 left promiscuous mode [ 3335.063747][T22389] device syzkaller0 entered promiscuous mode [ 3335.304260][T22400] device syzkaller0 entered promiscuous mode [ 3336.405615][T22456] bridge0: port 1(bridge_slave_0) entered blocking state [ 3336.447691][T22456] bridge0: port 1(bridge_slave_0) entered disabled state [ 3336.455543][T22456] device bridge_slave_0 entered promiscuous mode [ 3336.511934][T22456] bridge0: port 2(bridge_slave_1) entered blocking state [ 3336.537436][T22456] bridge0: port 2(bridge_slave_1) entered disabled state [ 3336.544978][T22456] device bridge_slave_1 entered promiscuous mode [ 3336.979452][T22468] device syzkaller0 entered promiscuous mode [ 3337.065321][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3337.085747][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3337.102121][ T300] device gretap0 left promiscuous mode [ 3337.124313][ T300] bridge0: port 3(gretap0) entered disabled state [ 3337.136690][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3337.148525][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3337.217728][T30023] bridge0: port 1(bridge_slave_0) entered blocking state [ 3337.224798][T30023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3337.277522][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3337.368814][T22456] device veth0_vlan entered promiscuous mode [ 3337.403693][T22456] device veth1_macvtap entered promiscuous mode [ 3337.439646][T22473] geneve1: tun_chr_ioctl cmd 1074025675 [ 3337.445237][T22473] geneve1: persist disabled [ 3337.480995][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3337.497897][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3337.508094][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3337.526257][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3337.544689][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3337.563451][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3337.582268][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3337.597644][T30023] bridge0: port 2(bridge_slave_1) entered blocking state [ 3337.604989][T30023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3337.622816][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3337.641170][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3337.748963][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3337.767914][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3337.820895][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3337.861742][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3337.934410][T22491] device syzkaller0 entered promiscuous mode [ 3337.969640][ T300] device bridge_slave_1 left promiscuous mode [ 3337.977844][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3338.022939][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3338.834709][T22542] syz.3.46733[22542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3339.088320][T22552] device syzkaller0 entered promiscuous mode [ 3339.155843][T22569] device syzkaller0 entered promiscuous mode [ 3339.790608][T22592] device veth0_vlan left promiscuous mode [ 3339.816082][T22592] device veth0_vlan entered promiscuous mode [ 3339.853754][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3339.868059][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3339.891304][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3342.321624][T22703] device sit0 entered promiscuous mode [ 3342.994882][T22750] device syzkaller0 entered promiscuous mode [ 3343.420810][T22769] device wg2 left promiscuous mode [ 3347.645955][T22948] tap0: tun_chr_ioctl cmd 1074025677 [ 3347.665400][T22948] tap0: linktype set to 778 [ 3348.036053][T22963] device syzkaller0 entered promiscuous mode [ 3348.799578][T23018] device syzkaller0 entered promiscuous mode [ 3349.249084][T23050] bridge0: port 3(gretap0) entered disabled state [ 3349.255639][T23050] bridge0: port 2(bridge_slave_1) entered disabled state [ 3349.262913][T23050] bridge0: port 1(bridge_slave_0) entered disabled state [ 3349.319593][T23050] device gretap0 left promiscuous mode [ 3349.343936][T23050] bridge0: port 3(gretap0) entered disabled state [ 3349.361733][T23050] device bridge_slave_1 left promiscuous mode [ 3349.377568][T23050] bridge0: port 2(bridge_slave_1) entered disabled state [ 3349.398752][T23050] device bridge_slave_0 left promiscuous mode [ 3349.413889][T23050] bridge0: port 1(bridge_slave_0) entered disabled state [ 3349.670314][T23070] device syzkaller0 entered promiscuous mode [ 3350.371820][T23127] tap0: tun_chr_ioctl cmd 1074025677 [ 3350.377155][T23127] tap0: linktype set to 769 [ 3350.425693][T23136] device syzkaller0 entered promiscuous mode [ 3351.232263][T23169] device syzkaller0 entered promiscuous mode [ 3352.927004][T23210] bridge0: port 1(bridge_slave_0) entered blocking state [ 3352.934195][T23210] bridge0: port 1(bridge_slave_0) entered disabled state [ 3352.941714][T23210] device bridge_slave_0 entered promiscuous mode [ 3353.020442][T23214] device syzkaller0 entered promiscuous mode [ 3353.027126][T23210] bridge0: port 2(bridge_slave_1) entered blocking state [ 3353.034461][T23210] bridge0: port 2(bridge_slave_1) entered disabled state [ 3353.042101][T23210] device bridge_slave_1 entered promiscuous mode [ 3353.371078][T23210] bridge0: port 2(bridge_slave_1) entered blocking state [ 3353.378213][T23210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3353.385616][T23210] bridge0: port 1(bridge_slave_0) entered blocking state [ 3353.392921][T23210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3353.402691][T28267] device vlan1 left promiscuous mode [ 3353.408284][T28267] Ÿë: port 1(vlan1) entered disabled state [ 3353.417111][T28267] device veth0_vlan left promiscuous mode [ 3353.663642][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 3353.671137][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 3353.860584][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3353.868897][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3353.888017][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3353.897128][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3353.905748][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 3353.913058][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3353.921450][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3353.930718][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3353.939166][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 3353.946223][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3353.954233][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3353.962809][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3353.971422][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3353.979894][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3354.010976][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3354.023779][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3354.039787][T23210] device veth0_vlan entered promiscuous mode [ 3354.046418][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3354.055007][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3354.083120][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3354.091590][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3354.100145][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3354.108634][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3354.118200][T23210] device veth1_macvtap entered promiscuous mode [ 3354.132351][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3354.140867][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3354.149899][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3354.169267][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3354.185472][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3355.028181][T28267] device bridge_slave_1 left promiscuous mode [ 3355.034413][T28267] bridge0: port 2(bridge_slave_1) entered disabled state [ 3355.042304][T28267] device bridge_slave_0 left promiscuous mode [ 3355.048603][T28267] bridge0: port 1(bridge_slave_0) entered disabled state [ 3355.056414][T28267] device veth1_macvtap left promiscuous mode [ 3355.062617][T28267] device veth0_vlan left promiscuous mode [ 3355.986822][T23254] bridge0: port 1(bridge_slave_0) entered blocking state [ 3356.020480][T23254] bridge0: port 1(bridge_slave_0) entered disabled state [ 3356.050500][T23254] device bridge_slave_0 entered promiscuous mode [ 3356.115040][T23254] bridge0: port 2(bridge_slave_1) entered blocking state [ 3356.136865][T23254] bridge0: port 2(bridge_slave_1) entered disabled state [ 3356.163601][T23254] device bridge_slave_1 entered promiscuous mode [ 3356.500776][T23254] bridge0: port 2(bridge_slave_1) entered blocking state [ 3356.507883][T23254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3356.515169][T23254] bridge0: port 1(bridge_slave_0) entered blocking state [ 3356.522328][T23254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3356.664468][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3356.712507][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3356.732894][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3356.779368][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3356.821375][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3356.887823][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 3356.894904][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3356.969362][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3357.007779][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3357.056919][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 3357.064028][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3357.130654][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3357.171924][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3357.199246][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3357.239980][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3357.276757][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3357.305816][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3357.344649][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3357.383293][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3357.417826][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3357.425516][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3357.463337][T23254] device veth0_vlan entered promiscuous mode [ 3357.505843][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3357.517714][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3357.544049][T23254] device veth1_macvtap entered promiscuous mode [ 3357.582519][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3357.610780][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3357.619605][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3357.677712][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3357.712972][T30023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3357.725378][T23295] tap0: tun_chr_ioctl cmd 1074025677 [ 3357.750577][T23295] tap0: linktype set to 769 [ 3359.615437][T23384] device veth0_vlan left promiscuous mode [ 3359.688280][T23384] device veth0_vlan entered promiscuous mode [ 3360.516030][T23436] device syzkaller0 entered promiscuous mode [ 3360.673214][T23445] device veth1_macvtap left promiscuous mode [ 3360.700201][T23445] device macsec0 entered promiscuous mode [ 3361.666310][T23494] device syzkaller0 entered promiscuous mode [ 3362.194895][T23539] bridge0: port 1(bridge_slave_0) entered disabled state [ 3362.350534][T23545] device syzkaller0 entered promiscuous mode [ 3364.251106][T23628] -1: renamed from syzkaller0 [ 3364.980779][T23647] device syzkaller0 entered promiscuous mode [ 3364.991502][T23651] €Â0: renamed from pim6reg1 [ 3365.284071][T23673] device wg2 entered promiscuous mode [ 3365.486738][T23679] device veth0_vlan left promiscuous mode [ 3365.516692][T23679] device veth0_vlan entered promiscuous mode [ 3365.717622][T23693] device veth1_macvtap left promiscuous mode [ 3367.147181][T23766] device wg2 left promiscuous mode [ 3367.188545][T23765] device wg2 entered promiscuous mode [ 3367.731056][T23793] 8021q: VLANs not supported on  [ 3368.774446][T23834] device syzkaller0 entered promiscuous mode [ 3369.264625][T23847] device syzkaller0 entered promiscuous mode [ 3369.867852][T23866] device @ entered promiscuous mode [ 3370.973039][T23921] tap0: tun_chr_ioctl cmd 1074025677 [ 3370.997795][T23921] tap0: linktype set to 778 [ 3372.668382][T23977] device syzkaller0 entered promiscuous mode [ 3372.874170][T23984] device syzkaller0 entered promiscuous mode [ 3376.778410][T24121] erspan0: refused to change device tx_queue_len [ 3377.040414][T24138] device syzkaller0 entered promiscuous mode [ 3377.218806][T24147] device syzkaller0 entered promiscuous mode [ 3377.734895][T24177] device syzkaller0 entered promiscuous mode [ 3379.605404][T24262] device syzkaller0 entered promiscuous mode [ 3384.466574][T24330] device syzkaller0 entered promiscuous mode [ 3385.349730][T24363] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 3386.300523][T24396] device syzkaller0 entered promiscuous mode [ 3386.772678][T24436] device syzkaller0 entered promiscuous mode [ 3389.673482][T24525] device syzkaller0 entered promiscuous mode [ 3391.192639][T24613] FAULT_INJECTION: forcing a failure. [ 3391.192639][T24613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3391.237382][T24613] CPU: 1 PID: 24613 Comm: syz.5.47350 Tainted: G W syzkaller #0 [ 3391.246475][T24613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3391.256820][T24613] Call Trace: [ 3391.260137][T24613] __dump_stack+0x21/0x24 [ 3391.264597][T24613] dump_stack_lvl+0x1a7/0x208 [ 3391.269293][T24613] ? show_regs_print_info+0x18/0x18 [ 3391.274581][T24613] ? vfs_write+0xb27/0xdc0 [ 3391.279008][T24613] dump_stack+0x15/0x1c [ 3391.283249][T24613] should_fail+0x3c1/0x510 [ 3391.287906][T24613] should_fail_usercopy+0x1a/0x20 [ 3391.292953][T24613] _copy_from_user+0x20/0xd0 [ 3391.297559][T24613] __se_sys_bpf+0x1bb/0x740 [ 3391.302260][T24613] ? __x64_sys_bpf+0x90/0x90 [ 3391.306922][T24613] ? debug_smp_processor_id+0x17/0x20 [ 3391.312299][T24613] __x64_sys_bpf+0x7b/0x90 [ 3391.316711][T24613] do_syscall_64+0x31/0x40 [ 3391.321226][T24613] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3391.327306][T24613] RIP: 0033:0x7f29f52a9dd9 [ 3391.331728][T24613] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3391.351599][T24613] RSP: 002b:00007f29f3d04028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3391.360047][T24613] RAX: ffffffffffffffda RBX: 00007f29f5522fa0 RCX: 00007f29f52a9dd9 [ 3391.368101][T24613] RDX: 000000000000000c RSI: 0000200000000680 RDI: 000000000000000a [ 3391.376508][T24613] RBP: 00007f29f3d04090 R08: 0000000000000000 R09: 0000000000000000 [ 3391.384476][T24613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3391.392451][T24613] R13: 00007f29f5523038 R14: 00007f29f5522fa0 R15: 00007ffc8bb16948 [ 3392.406151][T24664] FAULT_INJECTION: forcing a failure. [ 3392.406151][T24664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3392.419401][T24664] CPU: 0 PID: 24664 Comm: syz.2.47362 Tainted: G W syzkaller #0 [ 3392.428344][T24664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3392.438538][T24664] Call Trace: [ 3392.441942][T24664] __dump_stack+0x21/0x24 [ 3392.446292][T24664] dump_stack_lvl+0x1a7/0x208 [ 3392.450985][T24664] ? show_regs_print_info+0x18/0x18 [ 3392.456283][T24664] ? __fsnotify_parent+0x6d2/0x7c0 [ 3392.461503][T24664] dump_stack+0x15/0x1c [ 3392.465685][T24664] should_fail+0x3c1/0x510 [ 3392.470126][T24664] should_fail_usercopy+0x1a/0x20 [ 3392.475348][T24664] _copy_to_user+0x20/0x90 [ 3392.480224][T24664] bpf_prog_test_run_raw_tp+0x500/0x680 [ 3392.485805][T24664] ? bpf_prog_test_run_tracing+0x500/0x500 [ 3392.491818][T24664] ? fput_many+0x15a/0x1a0 [ 3392.496343][T24664] ? bpf_prog_test_run_tracing+0x500/0x500 [ 3392.502313][T24664] bpf_prog_test_run+0x350/0x3c0 [ 3392.508135][T24664] __se_sys_bpf+0x501/0x740 [ 3392.512638][T24664] ? __x64_sys_bpf+0x90/0x90 [ 3392.517238][T24664] ? debug_smp_processor_id+0x17/0x20 [ 3392.522690][T24664] __x64_sys_bpf+0x7b/0x90 [ 3392.527206][T24664] do_syscall_64+0x31/0x40 [ 3392.532020][T24664] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3392.538039][T24664] RIP: 0033:0x7f42c4cbadd9 [ 3392.542450][T24664] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3392.562646][T24664] RSP: 002b:00007f42c3715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3392.571972][T24664] RAX: ffffffffffffffda RBX: 00007f42c4f33fa0 RCX: 00007f42c4cbadd9 [ 3392.580158][T24664] RDX: 000000000000000c RSI: 0000200000000680 RDI: 000000000000000a [ 3392.588346][T24664] RBP: 00007f42c3715090 R08: 0000000000000000 R09: 0000000000000000 [ 3392.596473][T24664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3392.604744][T24664] R13: 00007f42c4f34038 R14: 00007f42c4f33fa0 R15: 00007ffd8615f6f8 [ 3393.607606][T24695] FAULT_INJECTION: forcing a failure. [ 3393.607606][T24695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3393.725858][T24695] CPU: 1 PID: 24695 Comm: syz.2.47373 Tainted: G W syzkaller #0 [ 3393.735214][T24695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 3393.745483][T24695] Call Trace: [ 3393.748921][T24695] __dump_stack+0x21/0x24 [ 3393.753264][T24695] dump_stack_lvl+0x1a7/0x208 [ 3393.758384][T24695] ? thaw_kernel_threads+0x220/0x220 [ 3393.763683][T24695] ? vsnprintf+0x189c/0x1990 [ 3393.768390][T24695] ? show_regs_print_info+0x18/0x18 [ 3393.773689][T24695] dump_stack+0x15/0x1c [ 3393.777896][T24695] should_fail+0x3c1/0x510 [ 3393.782425][T24695] should_fail_usercopy+0x1a/0x20 [ 3393.787441][T24695] _copy_to_user+0x20/0x90 [ 3393.791853][T24695] simple_read_from_buffer+0xe9/0x160 [ 3393.797217][T24695] proc_fail_nth_read+0x1a6/0x220 [ 3393.802323][T24695] ? proc_fault_inject_write+0x310/0x310 [ 3393.808054][T24695] ? rw_verify_area+0x1c0/0x360 [ 3393.812899][T24695] ? proc_fault_inject_write+0x310/0x310 [ 3393.818526][T24695] vfs_read+0x209/0xa60 [ 3393.822679][T24695] ? kernel_read+0x70/0x70 [ 3393.827086][T24695] ? __kasan_check_write+0x14/0x20 [ 3393.832188][T24695] ? mutex_lock+0x92/0xf0 [ 3393.836606][T24695] ? mutex_trylock+0xa0/0xa0 [ 3393.841200][T24695] ? __fget_files+0x2c4/0x320 [ 3393.846133][T24695] ? __fdget_pos+0x2d2/0x380 [ 3393.850891][T24695] ? ksys_read+0x71/0x250 [ 3393.855218][T24695] ksys_read+0x149/0x250 [ 3393.859454][T24695] ? vfs_write+0xdc0/0xdc0 [ 3393.863866][T24695] ? debug_smp_processor_id+0x17/0x20 [ 3393.869241][T24695] __x64_sys_read+0x7b/0x90 [ 3393.873736][T24695] do_syscall_64+0x31/0x40 [ 3393.878351][T24695] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3393.884350][T24695] RIP: 0033:0x7f42c4c7b60e [ 3393.888887][T24695] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3393.908764][T24695] RSP: 002b:00007f42c3714fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3393.917279][T24695] RAX: ffffffffffffffda RBX: 00007f42c37156c0 RCX: 00007f42c4c7b60e [ 3393.925246][T24695] RDX: 000000000000000f RSI: 00007f42c37150a0 RDI: 0000000000000006 [ 3393.933299][T24695] RBP: 00007f42c3715090 R08: 0000000000000000 R09: 0000000000000000 [ 3393.941357][T24695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3393.949412][T24695] R13: 00007f42c4f34038 R14: 00007f42c4f33fa0 R15: 00007ffd8615f6f8 [ 3394.139950][T24707] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 3394.431782][T24733] tap0: tun_chr_ioctl cmd 1074025677 [ 3394.459048][T24733] tap0: linktype set to 778 [ 3394.792193][T24748] device syzkaller0 entered promiscuous mode [ 3395.811184][T24800] device macsec0 entered promiscuous mode [ 3395.817143][T24800] device veth1_macvtap entered promiscuous mode [ 3396.221370][T24836] IPv6: …: Disabled Multicast RS [ 3396.308251][T24836] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 3396.350388][T24848] 8021q: VLANs not supported on  [ 3396.356793][T24851] device sit0 left promiscuous mode [ 3396.451053][T24851] device sit0 entered promiscuous mode [ 3396.756552][T24862] device syzkaller0 entered promiscuous mode [ 3396.966822][T24880] device syzkaller0 entered promiscuous mode [ 3397.851969][T24937] ÿÿÿÿÿÿ: renamed from vlan1 [ 3399.069817][T24994] device wg2 entered promiscuous mode [ 3400.306862][T25110] device syzkaller0 entered promiscuous mode [ 3400.431843][T25116] device syzkaller0 entered promiscuous mode [ 3401.597392][T25141] device syzkaller0 entered promiscuous mode [ 3401.975481][T25154] device syzkaller0 entered promiscuous mode [ 3406.802390][T25342] syz.8.47576[25342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3406.803847][T25342] syz.8.47576[25342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3406.921190][T25356] device syzkaller0 entered promiscuous mode [ 3410.638956][T25518] device syzkaller0 entered promiscuous mode [ 3412.564534][T25618] device syzkaller0 entered promiscuous mode [ 3412.644370][T25620] device syzkaller0 entered promiscuous mode [ 3413.623791][T25666] syz.2.47671[25666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3413.623862][T25666] syz.2.47671[25666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3413.705476][T25671] ³þ: renamed from bond_slave_0 [ 3417.437943][ T314] device bridge_slave_1 left promiscuous mode [ 3417.444082][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 3417.451568][ T314] device bridge_slave_0 left promiscuous mode [ 3417.457799][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 3417.465564][ T314] device veth1_macvtap left promiscuous mode [ 3417.471650][ T314] device veth0_vlan left promiscuous mode [ 3417.701486][T25754] bridge0: port 1(bridge_slave_0) entered blocking state [ 3417.708835][T25754] bridge0: port 1(bridge_slave_0) entered disabled state [ 3417.716431][T25754] device bridge_slave_0 entered promiscuous mode [ 3417.724567][T25754] bridge0: port 2(bridge_slave_1) entered blocking state [ 3417.732237][T25754] bridge0: port 2(bridge_slave_1) entered disabled state [ 3417.740011][T25754] device bridge_slave_1 entered promiscuous mode [ 3417.755016][T25761] device wg2 left promiscuous mode [ 3417.837256][T25754] bridge0: port 2(bridge_slave_1) entered blocking state [ 3417.844385][T25754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3417.851786][T25754] bridge0: port 1(bridge_slave_0) entered blocking state [ 3417.859031][T25754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3417.939693][T25761] device wg2 entered promiscuous mode [ 3417.973348][T25770] lo: mtu less than device minimum [ 3417.992503][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3418.015918][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3418.053129][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3418.098068][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3418.109108][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3418.148051][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3418.190865][T25754] device veth0_vlan entered promiscuous mode [ 3418.215100][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3418.235645][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3418.269092][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3418.304988][T25754] device veth1_macvtap entered promiscuous mode [ 3418.353524][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3418.411432][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3418.453667][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3418.521623][T25789] device veth1_macvtap left promiscuous mode [ 3418.771420][T25812] device syzkaller0 entered promiscuous mode [ 3419.298278][T25865] device syzkaller0 entered promiscuous mode [ 3419.553754][T25875] device syzkaller0 entered promiscuous mode [ 3419.856091][T25899] device syzkaller0 entered promiscuous mode [ 3420.923575][T25952] device syzkaller0 entered promiscuous mode [ 3420.941049][T25957] device veth0_vlan left promiscuous mode [ 3420.947442][T25957] device veth0_vlan entered promiscuous mode [ 3420.958119][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3420.966829][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3420.974547][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 3421.002949][T25963] bridge0: port 2(bridge_slave_1) entered disabled state [ 3421.010190][T25963] bridge0: port 1(bridge_slave_0) entered disabled state [ 3421.159553][T25963] bridge0: port 2(bridge_slave_1) entered blocking state [ 3421.166696][T25963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3421.174521][T25963] bridge0: port 1(bridge_slave_0) entered blocking state [ 3421.182018][T25963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3421.190824][T25963] device bridge0 entered promiscuous mode [ 3422.396913][T26002] device syzkaller0 entered promiscuous mode [ 3423.362232][T26049] device syzkaller0 entered promiscuous mode [ 3423.612915][T26068] tap0: tun_chr_ioctl cmd 1074025677 [ 3423.627426][T26068] tap0: linktype set to 778 [ 3423.711576][T26072] device syzkaller0 entered promiscuous mode [ 3424.501623][T26106] device syzkaller0 entered promiscuous mode [ 3425.635018][T26148] device syzkaller0 entered promiscuous mode [ 3432.849107][T26409] device syzkaller0 entered promiscuous mode [ 3433.517212][ T8398] device syz_tun left promiscuous mode [ 3433.522894][ T8398] : port 2(syz_tun) entered disabled state [ 3433.715436][T26460] bridge0: port 1(bridge_slave_0) entered blocking state [ 3433.723037][T26460] bridge0: port 1(bridge_slave_0) entered disabled state [ 3433.730962][T26460] device bridge_slave_0 entered promiscuous mode [ 3433.738253][T26460] bridge0: port 2(bridge_slave_1) entered blocking state [ 3433.745645][T26460] bridge0: port 2(bridge_slave_1) entered disabled state [ 3433.753343][T26460] device bridge_slave_1 entered promiscuous mode [ 3433.817913][T26460] bridge0: port 2(bridge_slave_1) entered blocking state [ 3433.825001][T26460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3433.832550][T26460] bridge0: port 1(bridge_slave_0) entered blocking state [ 3433.839604][T26460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3433.875151][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3433.884372][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 3433.892030][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 3433.916383][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3433.925316][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 3433.932411][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3433.940594][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3433.949344][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 3433.956578][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3433.989296][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3434.022200][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3434.065355][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3434.090460][T26460] device veth0_vlan entered promiscuous mode [ 3434.096921][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3434.112491][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3434.120595][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3434.131889][T26460] device veth1_macvtap entered promiscuous mode [ 3434.143671][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3434.156088][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3434.164891][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3434.187668][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3434.196500][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3434.214739][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3434.226999][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3434.471337][T26478] device syzkaller0 entered promiscuous mode [ 3435.130062][ T300] device veth0_vlan left promiscuous mode [ 3437.732185][T26625] device syzkaller0 entered promiscuous mode [ 3438.190822][T26652] device syzkaller0 entered promiscuous mode [ 3438.225985][T26655] bridge0: port 1(bridge_slave_0) entered blocking state [ 3438.244894][T26655] bridge0: port 1(bridge_slave_0) entered disabled state [ 3438.255438][T26655] device bridge_slave_0 entered promiscuous mode [ 3438.269198][T26655] bridge0: port 2(bridge_slave_1) entered blocking state [ 3438.286572][T26655] bridge0: port 2(bridge_slave_1) entered disabled state [ 3438.318278][T26655] device bridge_slave_1 entered promiscuous mode [ 3438.531556][T26655] bridge0: port 2(bridge_slave_1) entered blocking state [ 3438.538776][T26655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3438.546089][T26655] bridge0: port 1(bridge_slave_0) entered blocking state [ 3438.553177][T26655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3438.585849][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3438.598337][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 3438.617428][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 3438.628797][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3438.647546][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 3438.654694][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3438.675014][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3438.692599][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3438.711137][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 3438.718351][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3438.746735][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3438.755703][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3438.772785][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3438.782072][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3438.811491][T26655] device veth0_vlan entered promiscuous mode [ 3438.818292][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3438.827203][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3438.838441][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3438.847158][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3438.863821][T26655] device veth1_macvtap entered promiscuous mode [ 3438.871113][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3438.879435][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3438.886876][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3438.895177][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3438.903565][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3438.920423][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3438.928904][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3438.939214][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3438.947806][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3439.899097][ T300] device veth1_macvtap left promiscuous mode [ 3440.253916][T26701] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3440.316046][T26701] device syzkaller0 entered promiscuous mode [ 3440.739122][T26727] bridge0: port 1(bridge_slave_0) entered blocking state [ 3440.747341][T26727] bridge0: port 1(bridge_slave_0) entered disabled state [ 3440.755167][T26727] device bridge_slave_0 entered promiscuous mode [ 3440.764333][T26727] bridge0: port 2(bridge_slave_1) entered blocking state [ 3440.771636][T26727] bridge0: port 2(bridge_slave_1) entered disabled state [ 3440.779375][T26727] device bridge_slave_1 entered promiscuous mode [ 3440.838187][T26727] bridge0: port 2(bridge_slave_1) entered blocking state [ 3440.845295][T26727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3440.852632][T26727] bridge0: port 1(bridge_slave_0) entered blocking state [ 3440.859759][T26727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3440.913371][T26727] device veth0_vlan entered promiscuous mode [ 3440.928648][T26727] device veth1_macvtap entered promiscuous mode [ 3440.997648][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3441.012363][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3441.052550][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3441.723761][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3441.734151][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3441.743999][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3441.752442][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3441.761318][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3441.771784][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3441.780090][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3441.788197][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3441.795837][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3443.174732][T26825] bridge0: port 1(bridge_slave_0) entered blocking state [ 3443.197112][T26836] ref_ctr_offset mismatch. inode: 0x5e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 3443.211921][T26825] bridge0: port 1(bridge_slave_0) entered disabled state [ 3443.219749][T26825] device bridge_slave_0 entered promiscuous mode [ 3443.238736][T26825] bridge0: port 2(bridge_slave_1) entered blocking state [ 3443.245811][T26825] bridge0: port 2(bridge_slave_1) entered disabled state [ 3443.273191][T26825] device bridge_slave_1 entered promiscuous mode [ 3443.351065][T26825] bridge0: port 2(bridge_slave_1) entered blocking state [ 3443.358390][T26825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3443.365671][T26825] bridge0: port 1(bridge_slave_0) entered blocking state [ 3443.372733][T26825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3443.441874][T26845] geneve0: tun_chr_ioctl cmd 1074025677 [ 3443.448414][T26845] geneve0: linktype set to 1 [ 3443.476712][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3443.484770][T28267] bridge0: port 1(bridge_slave_0) entered disabled state [ 3443.492513][T28267] bridge0: port 2(bridge_slave_1) entered disabled state [ 3443.758478][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3443.767699][T28267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3443.774850][T28267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3443.782838][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3443.791237][T28267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3443.798423][T28267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3443.848482][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3443.858139][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3443.917017][T26825] device veth0_vlan entered promiscuous mode [ 3443.926530][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3443.935748][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3443.944079][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3443.952477][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3443.974233][T26825] device veth1_macvtap entered promiscuous mode [ 3443.991469][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3444.005484][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3444.014188][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3444.082602][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3444.091657][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3444.101449][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3444.110561][T28267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3444.123600][T26865] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3446.203237][ T300] device bridge_slave_1 left promiscuous mode [ 3446.219788][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3446.248754][ T300] device bridge_slave_0 left promiscuous mode [ 3446.260407][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3446.274317][ T300] device bridge_slave_1 left promiscuous mode [ 3446.286212][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3446.301268][ T300] device bridge_slave_0 left promiscuous mode [ 3446.311957][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3446.328079][ T300] device veth0_vlan left promiscuous mode [ 3446.338527][ T300] device veth0_vlan left promiscuous mode [ 3450.330804][T26970] bridge0: port 1(bridge_slave_0) entered disabled state [ 3451.934571][T27069] device veth1_macvtap left promiscuous mode [ 3452.010467][T27069] device macsec0 entered promiscuous mode [ 3453.247183][T27113] device veth1_macvtap left promiscuous mode [ 3453.323863][T27113] device macsec0 entered promiscuous mode [ 3453.493767][T27128] device syzkaller0 entered promiscuous mode [ 3453.566195][T23061] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3453.579727][T27132] ref_ctr_offset mismatch. inode: 0x13c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 3457.524753][T27262] device syzkaller0 entered promiscuous mode [ 3458.967790][T27334] device syzkaller0 entered promiscuous mode [ 3461.313720][T27348] device wg2 entered promiscuous mode [ 3461.433721][T27380] device syzkaller0 entered promiscuous mode [ 3461.567954][T27377] device syzkaller0 entered promiscuous mode [ 3462.173718][T27415] device wg2 entered promiscuous mode [ 3462.285258][T27421] device syzkaller0 entered promiscuous mode [ 3462.797362][T27435] geneve1: tun_chr_ioctl cmd 1074025673 [ 3462.917444][T27442] device syzkaller0 entered promiscuous mode [ 3463.249917][T27451] device wg2 entered promiscuous mode [ 3464.431221][T27526] device wg2 left promiscuous mode [ 3464.468360][T27523] device wg2 left promiscuous mode [ 3464.526898][T27523] device wg2 entered promiscuous mode [ 3464.914338][T27538] device syzkaller0 entered promiscuous mode [ 3465.808098][T27575] bridge0: port 3(veth1_macvtap) entered blocking state [ 3465.815407][T27575] bridge0: port 3(veth1_macvtap) entered disabled state [ 3466.221270][T27589] device wg2 left promiscuous mode [ 3467.134036][T27612] device syzkaller0 entered promiscuous mode [ 3470.404972][T27815] syz.5.48296[27815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3470.405030][T27815] syz.5.48296[27815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3471.043952][T27842] device syzkaller0 entered promiscuous mode [ 3471.731192][T27918] device sit0 entered promiscuous mode [ 3473.814959][T28007] device wg2 left promiscuous mode [ 3474.102034][T28016] device wg2 entered promiscuous mode [ 3474.252001][T28032] device veth1_macvtap entered promiscuous mode [ 3474.642289][T28048] device wg2 left promiscuous mode [ 3475.940939][T28154] device syzkaller0 entered promiscuous mode [ 3477.695977][T28203] device syzkaller0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=1 req=31742 state=1 status=9 (errno 11: Resource temporarily unavailable) [ 3477.869303][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 3477.869317][ T24] audit: type=1400 audit(1777555610.650:195): avc: denied { write } for pid=271 comm="syz-executor" path="pipe:[13568]" dev="pipefs" ino=13568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3479.188733][ T300] device bridge_slave_1 left promiscuous mode [ 3479.195034][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3479.202796][ T300] device bridge_slave_0 left promiscuous mode [ 3479.208947][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3479.216548][ T300] device bridge_slave_1 left promiscuous mode [ 3479.222934][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3479.230943][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3479.238806][ T300] device bridge_slave_1 left promiscuous mode [ 3479.244897][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3479.252560][ T300] device bridge_slave_0 left promiscuous mode [ 3479.258864][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3479.266961][ T300] device bridge_slave_1 left promiscuous mode [ 3479.273267][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3479.281048][ T300] device bridge_slave_0 left promiscuous mode [ 3479.287477][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3479.296859][ T300] device veth0_vlan left promiscuous mode [ 3479.303071][ T300] device veth0_vlan left promiscuous mode [ 3479.308943][ T300] device veth1_macvtap left promiscuous mode [ 3479.314966][ T300] device veth0_vlan left promiscuous mode [ 3479.320887][ T300] device veth1_macvtap left promiscuous mode [ 3479.326906][ T300] device veth0_vlan left promiscuous mode [ 3481.718650][ T300] device bridge_slave_1 left promiscuous mode [ 3481.725104][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 3481.733043][ T300] device bridge_slave_0 left promiscuous mode [ 3481.739527][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 3481.747660][ T300] device veth1_macvtap left promiscuous mode [ 3481.753685][ T300] device veth0_vlan left promiscuous mode