last executing test programs: 4m14.125053158s ago: executing program 1 (id=781): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0xd, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000080000000080000001"], 0x50) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000080000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x44}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x44}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002100000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x6c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="222900e741", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3}, &(0x7f00000004c0), &(0x7f0000000540)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(0x3) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r9, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_subtree(r8, &(0x7f00000007c0)=ANY=[], 0x6) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000001000000000000008e870018110000896c53a3572b0d8839f37511f629e1632e461d97f1a3b4329508a03c5e075f146919306d789fc44031854c8598cdfc7ad5ef78c1d9e30e8b86954bd023f7692ea04064c2e16bdeac8731a6aea209fd300664f671251905bc2ed1314385c0b072fb7d60254757af5300e863f4b410c4a066156583effb89e0807fc2ad4a09d3ea65a8dfe5cef4b868df", @ANYRES16=r5, @ANYBLOB="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"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(r1, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) (async) r10 = openat$cgroup_ro(r1, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) openat$cgroup_pressure(r1, &(0x7f0000000340)='io.pressure\x00', 0x2, 0x0) 4m14.116993318s ago: executing program 1 (id=783): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711816000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x12, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000040000004020000005"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000040000004020000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r2, &(0x7f0000000380), &(0x7f00000003c0)=""/247}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="25bb627c5494ebb7d016e50e02df15c94817e8852e89bfb75aef55e1c42c72dc659f35f6a4097e3c082b3d02dacdb5b945a52f9570b8207d6badaafdbfd3da73d0044f44584b3090ba1dd506dc26afc5d8aac50d98efd8c1c9d668971785832431d88f95b51d6c831d1ebc816c24b5ce19d1aec74c94e61043ffee23841ebdf0", @ANYRES64=0x0], 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="25bb627c5494ebb7d016e50e02df15c94817e8852e89bfb75aef55e1c42c72dc659f35f6a4097e3c082b3d02dacdb5b945a52f9570b8207d6badaafdbfd3da73d0044f44584b3090ba1dd506dc26afc5d8aac50d98efd8c1c9d668971785832431d88f95b51d6c831d1ebc816c24b5ce19d1aec74c94e61043ffee23841ebdf0", @ANYRES64=0x0], 0x10) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) 4m13.841688722s ago: executing program 1 (id=786): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0xb}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1900000004000000040000000280000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000db9268e98d6fc86d5500"/29, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000008500000029000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000800)={'ip6gretap0\x00', 0xe3991bdbbfed0d53}) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360"], 0xffdd) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104f00000000009500000000964d00"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000040)="7ca40de1f503100dd461eac0b6010a679924f8bf7713fe4a4e08a70acf40a962c827a3fb4c7c8a40526b7c", &(0x7f00000006c0)=""/4096}, 0x20) 4m13.607547753s ago: executing program 1 (id=789): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x34120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x2}, 0x8386, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x800000000001, 0xffffffffffffffff, 0x3) (async) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x34120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x3) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) recvmsg(0xffffffffffffffff, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r6) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') 4m13.597245304s ago: executing program 1 (id=790): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711817000000000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(r1, &(0x7f0000000180), 0x12) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000300)=r3) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r6 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x6, 0x3, 0x4, 0x1, 0x0, 0x6, 0x40, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x49, 0x2, @perf_config_ext={0x10, 0x8}, 0x100000, 0x80, 0x758, 0x2, 0x9, 0x2, 0x5, 0x0, 0x6800, 0x0, 0x40}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={r6, r7, 0x0, 0x5, &(0x7f0000001200)='$+#{\x00'}, 0x30) 4m13.072969661s ago: executing program 1 (id=796): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0xffffff7f}, 0xc) r3 = getpid() r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x56, 0xd, 0x9f, 0x3e, 0x0, 0x1, 0x40001, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x6}, 0x100400, 0xffffffffffffff00, 0x8000, 0x4, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xc, 0x9, 0x69, 0x0, 0xc, 0x304c, 0x1e, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0x40}, 0x80, 0x9, 0xffff, 0x2, 0xcb6, 0x9c35, 0xb76f, 0x0, 0x7ff, 0x0, 0x9}, r3, 0x9, r4, 0x6c21cb2a5c17825a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x2000000, &(0x7f00000002c0)="321ad8b2dab0b59f27850aa34b9d5689c3fa930f81380593935f4b3f328fc2064bf4fc5c2251568850832c620692076684ca3798d5730b9d96", 0x39, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="747dee010b53f2db759344a089a91faee6b83c1aa2c315675a2ce436e28b9b412efd394c1815994104ddcc96bcbbfdceba157bba24b2ddbda96ec616e0c1ba79792f6c4c5c1f58347edc41f4822ca48501d94b0a8f6ad2a7ff5673cc75aa6b1f973362e9ac6e09f1475315d4f94c73960b397c26428554335974ae1040b8") r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000440)={'veth1_to_batadv\x00', @random="139d894274cd"}) r9 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000004c0)=r7, 0x12) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x200000, 0x0) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000540)=r1) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f0000000580)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000600)={'gretap0\x00', @broadcast}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000680)={0x2, 0x80, 0x7f, 0x1, 0x8, 0x2, 0x0, 0x64d, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x24, 0xa, 0xb7, 0x1, 0x7, 0x99, 0x7d5, 0x0, 0xb, 0x0, 0x8}) r12 = perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x7, 0x9, 0x8, 0x1, 0x0, 0x80, 0x40, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffeff, 0x0, @perf_bp={&(0x7f0000000700), 0x4}, 0x16284, 0x8, 0x8, 0x9, 0x2, 0x6, 0xd, 0x0, 0x23, 0x0, 0xa}, r7, 0xc, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0xa, &(0x7f00000007c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x3, 0x7, 0xf, 0x6, 0x400}, @ldst={0x2, 0x1, 0x3, 0xa, 0x8, 0x50, 0x10}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @func, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x14}], &(0x7f0000000840)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x48, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000018c0)={0x1, 0x10, 0x2, 0x9}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001900)=[0x1, r2, r2, r2, r2, r2, r2, r2, r2, r2], &(0x7f0000001940)=[{0x5, 0x2, 0x1, 0x2}, {0x2, 0x4, 0x3, 0x3}, {0x1, 0x4, 0xe, 0x5}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0xa}, {0x3, 0x5, 0x9, 0x3}, {0x2, 0x4, 0x8, 0x5}, {0x4, 0x2, 0xa, 0x8}], 0x10, 0xf}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d40)={r13, 0xe0, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0], 0x0, 0xb6, &(0x7f0000001b40)=[{}, {}], 0x10, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r12, 0xc008240a, &(0x7f0000001d80)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001dc0), 0x608482, 0x0) ioctl$TUNSETIFINDEX(r14, 0x400454da, &(0x7f0000001e00)=r6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000020c0)={{r2, 0xffffffffffffffff}, &(0x7f0000002040), &(0x7f0000002080)=r13}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002100)={&(0x7f0000001e40)="5126de9ef3309555c83ca449ad308b46acacd6f54776e54427bd72b2d38a32d90d96bc4d3dc0ee86a403abe8fd33dd4e36ad27c9a1288032417b748f388eb28799ab69dc0c5b970c4b914d7a7ebf", &(0x7f0000001ec0)=""/130, &(0x7f0000001f80), &(0x7f0000001fc0)="4942a0ffed67a47f26ebba933aa92bb27a11912a4ced7c1a840cb407f28fdc4883c81f61b6628094134cb5df3f6fdefb3c1a91460282b3ef81f1623e1cc36698fddb7c5d12e24bf769b8703d43aad01d0931155ab8087d2a2f18027b327be5c11a53f38784a13b88e22bc00c7aa5797bc3d1c0742d5dfed31b109ab36b747c", 0x4, r15}, 0x38) recvmsg$unix(r11, &(0x7f00000022c0)={&(0x7f0000002140), 0x6e, &(0x7f0000002240)=[{&(0x7f00000021c0)=""/110, 0x6e}], 0x1, &(0x7f0000002280)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x22) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002300)={r0, 0x4, 0x4}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002380)=@generic={&(0x7f0000002340)='./file0\x00', 0x0, 0x18}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r16, &(0x7f0000003780)={&(0x7f0000002400), 0x6e, &(0x7f0000003600)=[{&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/22, 0x16}, {&(0x7f00000034c0)=""/240, 0xf0}, {&(0x7f00000035c0)=""/47, 0x2f}], 0x4, &(0x7f0000003640)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}, 0x2002) 3m58.074799834s ago: executing program 32 (id=796): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0xffffff7f}, 0xc) r3 = getpid() r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x56, 0xd, 0x9f, 0x3e, 0x0, 0x1, 0x40001, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x6}, 0x100400, 0xffffffffffffff00, 0x8000, 0x4, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xc, 0x9, 0x69, 0x0, 0xc, 0x304c, 0x1e, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0x40}, 0x80, 0x9, 0xffff, 0x2, 0xcb6, 0x9c35, 0xb76f, 0x0, 0x7ff, 0x0, 0x9}, r3, 0x9, r4, 0x6c21cb2a5c17825a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x2000000, &(0x7f00000002c0)="321ad8b2dab0b59f27850aa34b9d5689c3fa930f81380593935f4b3f328fc2064bf4fc5c2251568850832c620692076684ca3798d5730b9d96", 0x39, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="747dee010b53f2db759344a089a91faee6b83c1aa2c315675a2ce436e28b9b412efd394c1815994104ddcc96bcbbfdceba157bba24b2ddbda96ec616e0c1ba79792f6c4c5c1f58347edc41f4822ca48501d94b0a8f6ad2a7ff5673cc75aa6b1f973362e9ac6e09f1475315d4f94c73960b397c26428554335974ae1040b8") r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000440)={'veth1_to_batadv\x00', @random="139d894274cd"}) r9 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000004c0)=r7, 0x12) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x200000, 0x0) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000540)=r1) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f0000000580)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000600)={'gretap0\x00', @broadcast}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000680)={0x2, 0x80, 0x7f, 0x1, 0x8, 0x2, 0x0, 0x64d, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x24, 0xa, 0xb7, 0x1, 0x7, 0x99, 0x7d5, 0x0, 0xb, 0x0, 0x8}) r12 = perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x7, 0x9, 0x8, 0x1, 0x0, 0x80, 0x40, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffeff, 0x0, @perf_bp={&(0x7f0000000700), 0x4}, 0x16284, 0x8, 0x8, 0x9, 0x2, 0x6, 0xd, 0x0, 0x23, 0x0, 0xa}, r7, 0xc, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0xa, &(0x7f00000007c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x3, 0x7, 0xf, 0x6, 0x400}, @ldst={0x2, 0x1, 0x3, 0xa, 0x8, 0x50, 0x10}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @func, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x14}], &(0x7f0000000840)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x48, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000018c0)={0x1, 0x10, 0x2, 0x9}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001900)=[0x1, r2, r2, r2, r2, r2, r2, r2, r2, r2], &(0x7f0000001940)=[{0x5, 0x2, 0x1, 0x2}, {0x2, 0x4, 0x3, 0x3}, {0x1, 0x4, 0xe, 0x5}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0xa}, {0x3, 0x5, 0x9, 0x3}, {0x2, 0x4, 0x8, 0x5}, {0x4, 0x2, 0xa, 0x8}], 0x10, 0xf}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d40)={r13, 0xe0, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0], 0x0, 0xb6, &(0x7f0000001b40)=[{}, {}], 0x10, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r12, 0xc008240a, &(0x7f0000001d80)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001dc0), 0x608482, 0x0) ioctl$TUNSETIFINDEX(r14, 0x400454da, &(0x7f0000001e00)=r6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000020c0)={{r2, 0xffffffffffffffff}, &(0x7f0000002040), &(0x7f0000002080)=r13}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002100)={&(0x7f0000001e40)="5126de9ef3309555c83ca449ad308b46acacd6f54776e54427bd72b2d38a32d90d96bc4d3dc0ee86a403abe8fd33dd4e36ad27c9a1288032417b748f388eb28799ab69dc0c5b970c4b914d7a7ebf", &(0x7f0000001ec0)=""/130, &(0x7f0000001f80), &(0x7f0000001fc0)="4942a0ffed67a47f26ebba933aa92bb27a11912a4ced7c1a840cb407f28fdc4883c81f61b6628094134cb5df3f6fdefb3c1a91460282b3ef81f1623e1cc36698fddb7c5d12e24bf769b8703d43aad01d0931155ab8087d2a2f18027b327be5c11a53f38784a13b88e22bc00c7aa5797bc3d1c0742d5dfed31b109ab36b747c", 0x4, r15}, 0x38) recvmsg$unix(r11, &(0x7f00000022c0)={&(0x7f0000002140), 0x6e, &(0x7f0000002240)=[{&(0x7f00000021c0)=""/110, 0x6e}], 0x1, &(0x7f0000002280)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x22) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002300)={r0, 0x4, 0x4}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002380)=@generic={&(0x7f0000002340)='./file0\x00', 0x0, 0x18}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r16, &(0x7f0000003780)={&(0x7f0000002400), 0x6e, &(0x7f0000003600)=[{&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/22, 0x16}, {&(0x7f00000034c0)=""/240, 0xf0}, {&(0x7f00000035c0)=""/47, 0x2f}], 0x4, &(0x7f0000003640)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}, 0x2002) 2.993320349s ago: executing program 0 (id=4564): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000900"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f00000002c0)=""/254, 0x4a, 0xfe, 0x1}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r8) close(r8) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r10, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r11}, 0xc) close(r12) ioctl$TUNSETQUEUE(r9, 0x400454d9, 0x0) 2.279903475s ago: executing program 3 (id=4575): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0xb, &(0x7f00000000c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1d, &(0x7f0000000180)=""/29, 0x41100, 0x49, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x3, 0x2, 0x4, 0xa}, {0x9, 0x3, 0x3, 0x2}, {0x2, 0x5, 0x1, 0x9}, {0x1, 0x1, 0x9, 0x6}, {0x3, 0x5, 0xc, 0x4}, {0x0, 0x3, 0x3, 0xa}, {0x4, 0x5, 0x9, 0x1}, {0x2, 0x3, 0x6, 0x6}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xdb, 0x1000, &(0x7f00000005c0)="c4acce5e28ea066d548449531de41c0146a1397a5b92e198ecf74316a459ecf03e3cbac9477280af390266434163efff0deca8bd73a3e09698eb201c8ab55023f9a6528fd90a97e42bd499a42c06e08656b8a3804c66d5b5d077945b8ed110c51676c26d6e5b7b5fbcdecb7b1985d585d01681f071a55aa467995e2720e290e81554ae330734663ce455d5f77aeb7302cb2ce45e865cd20f77acf2ed6fa257487e6ecee6dcfc2b565665f7f58f69de703b379e48e6266336dfcb2e0a5eb600abfefdda5b6c540bba29dcb1a8bc96fa88e7aaad92a4901f0601ce05", &(0x7f0000000780)=""/4096, 0x1000, 0x0, 0x91, 0xac, &(0x7f0000001780)="d280ccfddbdb32923744c683c231e6b27a1f0afa548cf843607f359d97576f73e161489303679d9761eeaea29ffcff7ffc56f9b1a61d198729aee2f808ba264b51a0df551484b223ee755973af2cd9a204c15773facc7d71c49505797aff8112b3a241af5e4fc29eb93e3bbc13445a90118fb5d7d53c82c679130ef47b9ce2ba879c2f1d8c7942ca21c0bf2abd846dc190", &(0x7f0000001840)="5302aea66c8faebff17279b328ce9644e77b0275dfa77833bb53919583ea7bf7c34a99cd12fbc1142b23ce5c9f12df8fa9837bac4677f9164a9875383b9e82318323ddcc034f5b3d70055f060da0b546c087dade9b57c8dc4ffd0bc7ad77087c31d1257103333835e30997ea8a4990d3c8eb0c5603d6701a82c8b646203353fb027b8cea32b7828710554b840e3c681113b3cd864a0dd494264771caeb47302aea234c77a9eb6288eea17f05", 0x4, 0x0, 0x2785}, 0x50) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9f, &(0x7f00000005c0), 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="97b3c7ae3d52", @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="000000000100"/28], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r3, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000600), 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21ca0000cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c98cda2948ef0f440d7cad29567e15a7d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf225571f2487fc86acc2bff7d5664abebd6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552d703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8498856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa086d2a39f13f60b51136a945f780687aad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f91b52fc0b241c2db99a187c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b152d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a66"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0xffffffff00000000, 0x10001}, 0x2110, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 2.134483442s ago: executing program 3 (id=4576): bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x20, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x3, 0x5, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r0}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xfff9}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) 2.057335296s ago: executing program 3 (id=4577): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0xa8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x49, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x10001, '\x00', r1, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYRESHEX=0x0], &(0x7f0000000040)='GPL\x00', 0x9, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', r1}, 0x94) 2.056355656s ago: executing program 0 (id=4578): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={0x1, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x35, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0], 0x0, 0x93, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1e, 0x3d, &(0x7f0000000900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@ringbuf_query, @jmp={0x5, 0x1, 0x7, 0x4, 0x0, 0x50, 0xfffffffffffffff0}, @ldst={0x1, 0x1, 0x3, 0x5, 0x5, 0xffffffffffffffe0, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @printk={@i}, @map_fd={0x18, 0xa}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b00)='syzkaller\x00', 0x4, 0x66, &(0x7f0000000b40)=""/102, 0x41100, 0x45, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x10, 0x9, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x7}, 0x94) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={0x0, 0x8}, 0xc) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4883, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x50) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000f00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000e80), &(0x7f0000000ec0)='%pK \x00'}, 0x20) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f40)={0xffffffffffffffff, 0x6, 0x8}, 0xc) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x1e, 0x44db, 0xa23, 0x10000000, 0x20040, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xf, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001080)={{0x1, 0xffffffffffffffff}, &(0x7f0000001000), &(0x7f0000001040)}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x8, 0x2c, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @alu={0x7, 0x1, 0x9, 0x1, 0x2, 0x20, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0xcb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x1, '\x00', r3, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, r6, 0x2, &(0x7f00000010c0)=[r7, r8, r9, r10, r11, 0x1, 0x1, r12, r13, 0x1], &(0x7f0000001100)=[{0x4, 0x2, 0x1, 0xa}, {0x3, 0x5, 0x0, 0xa}], 0x10, 0xcf}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x18, 0x27, &(0x7f0000001400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x8, 0x1, 0x0, r12}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x80000000}, @map_fd={0x18, 0x2, 0x1, 0x0, r13}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x78}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @alu={0x4, 0x1, 0x3, 0x8, 0xb}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001540)='syzkaller\x00', 0xfffffff9, 0xf1, &(0x7f0000001580)=""/241, 0x41000, 0x5, '\x00', r4, 0x0, r0, 0x8, &(0x7f0000001680)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[r8, r8, r13], 0x0, 0x10, 0x5}, 0x94) r17 = perf_event_open$cgroup(&(0x7f0000001800)={0x0, 0x80, 0x8, 0x1, 0x5, 0x39, 0x0, 0x200, 0x882, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xae9, 0x4, @perf_bp={&(0x7f00000017c0), 0x5}, 0x100100, 0x401, 0x8, 0x1, 0x9877, 0x5, 0x8, 0x0, 0xffffffff, 0x0, 0xb4}, r0, 0xc, r0, 0x12) r18 = syz_clone(0x10200000, &(0x7f0000001880)="fed6795f04f31ac65fd715ce8faf465189327ece54413eb3e44f3d31ee41dcb127ec28886ec0186f8bed", 0x2a, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="adbefad01752db47374e12fa4eca0c1a4290131c64d91ee722ce778e089800e5e8446aa34f99c0a4fefd5a48e0ce2e9033b5da5547ad84442c78d18a2f694036fc8be8043d23b0622c76f424626f698ae95a36a0c823bbb917133181052ce0a8f152be07eb942af0c583c14965fa9aae9b0261ed14979dd146619ffa1ea4450a344962080ecbc0fdfc7aee03e8110e364a2606cf63d6d0649d02a0fb97a16a556788f85fd9cbce2e57a4123d389d4cd5cc218e0336474e91a4e154d584e3343240e834e634593ddb7a36865085e3f2b0c7879b12ce970b36efe463ba43efe1966e78d775a1fd7521bbfcea0b4497bed533c8a3ddc4bd") sendmsg$unix(r15, &(0x7f0000001ac0)={&(0x7f0000001240)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000013c0)=[{&(0x7f00000012c0)="4604985b051d60e39436256cb1bcc8861baed4d27eb87264885306124e7644b7bf16761bd1d742dd04939aaa51fa66f3e6435d1bc14f7a4e8b4229cd7744b51a5a5e4ec6e6c391c62e5be8ff21f8bb142517e1a50e31cc8a6a6150dc1f511e07f4b55e279fd56ccc02ff26964d2788c67a8e99e8a42862717ef54f849e3d6b0d13479c323c959f72a5c977ca3b19e5772706ed4f", 0x94}, {&(0x7f0000001380)="19cc7da8fd27954c94dd2f99b72597c7fed0a54f8dd46325b37c86ec531b5606564e093c3438d911", 0x28}], 0x2, &(0x7f0000001a40)=[@rights={{0x18, 0x1, 0x1, [r16, r1]}}, @rights={{0x18, 0x1, 0x1, [r17, r2]}}, @rights={{0x20, 0x1, 0x1, [r7, r6, r7, r1]}}, @cred={{0x1c, 0x1, 0x2, {r18}}}], 0x70, 0x10}, 0x4000040) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r0, 0xffffffffffffffff}, &(0x7f0000001b00), &(0x7f0000001b40)=r16}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c40)={{r9, 0xffffffffffffffff}, &(0x7f0000001bc0), &(0x7f0000001c00)=r0}, 0x20) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r17, 0x40042408, r6) (async) perf_event_open$cgroup(&(0x7f0000001c80)={0x0, 0x80, 0x7f, 0x8, 0x5, 0x33, 0x0, 0x0, 0x28000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0x7, 0x8000000000000000}, 0x80, 0xc77d, 0x27, 0x7, 0x6, 0x4, 0x7, 0x0, 0x6, 0x0, 0x7}, r0, 0x1, 0xffffffffffffffff, 0x0) (async) r21 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001f80)=@bpf_lsm={0x1d, 0x12, &(0x7f0000001d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffff9}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff}, @exit, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000001dc0)='GPL\x00', 0x8001, 0xf, &(0x7f0000001e00)=""/15, 0x40f00, 0x0, '\x00', r3, 0x1b, r10, 0x8, &(0x7f0000001e40)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001e80)={0x4, 0xf, 0x80, 0x1}, 0x10, r5, 0x0, 0x7, &(0x7f0000001ec0)=[r11, r7], &(0x7f0000001f00)=[{0x2, 0x4, 0x2, 0x2}, {0x0, 0x1, 0x10, 0x2}, {0x3, 0x1, 0x7, 0x5}, {0x4, 0x4, 0x0, 0x5}, {0x1, 0x3, 0x9, 0x6}, {0x1, 0x3, 0x7, 0xc}, {0x5, 0x2, 0x1, 0xe}], 0x10, 0x47}, 0x94) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002140)={@fallback=r16, 0x26, 0x1, 0x1, &(0x7f0000002040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000002080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000020c0)=[0x0, 0x0, 0x0], &(0x7f0000002100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002180)={@map=r20, r21, 0x1d, 0x10, r14, @void, @value=r6, @void, @void, r23}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000021c0)={r7, 0xffffffffffffffff}, 0x4) (async) r25 = bpf$MAP_CREATE(0x0, &(0x7f0000002400)=@base={0x10, 0x400, 0x8, 0x9, 0x44, r9, 0x9, '\x00', r4, 0xffffffffffffffff, 0x1, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002500)={0x11, 0x26, &(0x7f0000002200)=@raw=[@jmp={0x5, 0x0, 0x9, 0x0, 0x4, 0xffffffffffffffff}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r19}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r24}}], &(0x7f0000002340)='syzkaller\x00', 0xfffffff5, 0x59, &(0x7f0000002380)=""/89, 0x41000, 0xde, '\x00', r4, 0x0, r22, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000002480)=[r0, r10, r1, r1, r1, r10, r12, r25], &(0x7f00000024c0)=[{0x4, 0x2, 0x4, 0x5}, {0x4, 0x1, 0x9, 0x5}, {0x5, 0x5, 0xc, 0x8}], 0x10, 0x9}, 0x94) 2.050568816s ago: executing program 3 (id=4580): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c230040) close(r2) r4 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) (async) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0xf101}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0xd, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES32], &(0x7f0000000300)='GPL\x00', 0x2, 0x100d, &(0x7f0000003540)=""/4109, 0x0, 0x5}, 0x5c) 1.99152036s ago: executing program 0 (id=4581): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000ae000000b703000007000000850000000e0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='..\x00') perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x8, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee15}, 0x0, 0x6, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x80b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x2405, &(0x7f0000000540)='cpu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="48c7180000000a0000000000000004000000731106000000000a950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000637d5d565532c846e711f641c073a3754baf146cc0aa33120fbc6af3b0998092e6b42051ed0260cee1e395fd07635a768824f5c92ccf9825a4a30c431f59a00504a2ef6a7c14599b7fcd10a1ebdf9c9af4bab53b207b9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000014", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000008807b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400", @ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r4, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000040)="76ea0900000000", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1802006a05ce0ff0f8ce7f000000000085000000190000009500000000000000dac7d9e183664f744bfe0ac53c307b409a297deb37c4fb2e0b0f7e4155454f07be2dee8e33fe87eb90a4ade7cb306d49ac7b8641"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000ffff4bbafc4020fdce2f36b627", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 1.646731496s ago: executing program 4 (id=4586): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'macvlan1\x00', 0x84aebfbd6349b7f2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000300)=""/4096, 0x2a, 0x1000, 0x3}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000200)={'syzkaller0\x00', @link_local}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2b"], 0x66) 1.557258221s ago: executing program 0 (id=4587): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000003000000000000000000000903000000000000000000000105000000080000000100000000000008000000000000000000000003000000000100000002000000000000000061"], 0x0, 0x5b}, 0x28) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xdd, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe02c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x100009, 0x0, 0xa, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x20000800) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2162) recvmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.533441903s ago: executing program 4 (id=4588): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x6, 0x3, 0x53, 0x3, 0x0, 0xd, 0x0, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0xfffffffffffffffa, 0x8001}, 0x10000, 0x8000, 0x5, 0x4, 0x8, 0x9d, 0xfff8, 0x0, 0x3, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x11, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc9}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x3, 0x0, 0x6, 0x4, 0x9, 0xfffffffffffffff8, 0x8}, @generic={0x5, 0xa, 0x9, 0xfffd, 0x3ff}, @call={0x85, 0x0, 0x0, 0xaf}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x6, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000240)=[{0x5, 0x3, 0x4, 0xa}, {0x2, 0x4, 0xf, 0x1}, {0x4, 0x3, 0x6, 0xb}, {0x4, 0x1, 0x9, 0xb}, {0x2, 0x4, 0xe, 0xc}, {0x1, 0x4, 0xc, 0x4}, {0x0, 0x2, 0x1, 0xa}, {0x2, 0x1, 0xd, 0x2}], 0x10, 0xfffffff7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x53, 0xc1, &(0x7f0000000380)="ab951c5feb33b5c0861a2ff39d9b94cb3711f18bc55b4d978d4c4fde2b0635458aba1565d454fb3d7baa17026976ca401455b80320079d00cfc7f1be697fe4c3fc515bc0d1a68bda988ef0766d635743172f85", &(0x7f0000000400)=""/193, 0xffff982f, 0x0, 0xac, 0x2f, &(0x7f0000000500)="faaa678a9c5c7d72b03304a361081e6c7bf748ad78b934eada4b9e4bf28d3f0c5c252d5843978a0e60f3974c4ae0f53711084d869c721d346e0a2b97ff0208511879adbd5105f549270019c51dd81b9274253dcceb6f07227568e53e06162843f163ca3c37590a00cb036b385868d769d42e4c8fe628ebb6cdb3a879c36ea1a1518db7cdbf98bbdff10dbe66c99e0c5353dc87a16cca44d8cdaca275c5835b09292e286408d68fc5ad75a627", &(0x7f00000005c0)="f1a02e028ed691607dbb837db19159de19fa4615793dbc53b0f722b1c8440a396f0265b6acba7b847aa8a07983b208", 0x4, 0x0, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r1, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0], 0x0, 0xcf, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0xee, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x55}, [@alu={0x4, 0x1, 0x2, 0x4, 0x8, 0x2, 0xfffffffffffffff0}]}, &(0x7f00000006c0)='GPL\x00', 0x3, 0xd, &(0x7f0000000700)=""/13, 0x41000, 0x4, '\x00', r2, 0x1b, r4, 0x8, &(0x7f0000000a80)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0xe, 0xe, 0x8001}, 0x10, 0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f0000000b00)=[{0x5, 0x2, 0x6, 0x3}, {0x4, 0x5, 0xd, 0x8}, {0x0, 0x2, 0xd, 0xa}, {0x2, 0x1, 0x9, 0x9}, {0x4, 0x4, 0xa}], 0x10, 0x44}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c40)={0x1, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0xba, 0x81, 0x0, 0x40104, r1, 0x7, '\x00', r2, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000f00)={{r1, 0xffffffffffffffff}, &(0x7f0000000e80), &(0x7f0000000ec0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000fc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000f40), &(0x7f0000000f80)=r1}, 0x20) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2, r4, 0x1, 0x4, 0x1}, 0x50) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001100)=@bpf_ext={0x1c, 0xf, &(0x7f0000000c80)=@raw=[@map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], &(0x7f0000000d00)='syzkaller\x00', 0x3, 0x1e, &(0x7f0000000d40)=""/30, 0x40f00, 0x48, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000d80)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x3, 0x4, 0x20000000, 0x401}, 0x10, 0x15276, 0xffffffffffffffff, 0x4, &(0x7f0000001080)=[r6, r7, r8, r9, r0], &(0x7f00000010c0)=[{0x1, 0x5, 0x9, 0x7}, {0x4, 0x4, 0xa, 0x5}, {0x4, 0x4, 0x8, 0x1}, {0x1, 0x5, 0x8, 0x1}], 0x10, 0xe}, 0x94) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r9, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000012c0)={{r9, 0xffffffffffffffff}, &(0x7f0000001240), &(0x7f0000001280)=r1}, 0x20) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x18, 0x19, &(0x7f0000001300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x21}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6f1d}, @jmp={0x5, 0x1, 0x6, 0x4, 0x2, 0xffffffffffffffe0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001400)='GPL\x00', 0x5, 0x49, &(0x7f0000001440)=""/73, 0x41100, 0x10, '\x00', r2, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000014c0)={0x4, 0x0, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001500)=[r5], 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001700)={@cgroup=r13, 0x2e, 0x0, 0x2f0, &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000001640)=[0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0], &(0x7f00000016c0)=[0x0, 0x0], 0x0}, 0x40) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x12, 0x16, &(0x7f0000001740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0xba}, @map_val={0x18, 0xc, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x3bcaf60}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @generic={0x0, 0x1, 0x0, 0x9, 0x9}]}, &(0x7f0000001800)='syzkaller\x00', 0x7, 0x24, &(0x7f0000001840)=""/36, 0x40f00, 0x20, '\x00', 0x0, @cgroup_sock_addr=0x39, r11, 0x8, &(0x7f0000001880)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0x8000, 0xc353}, 0x10, r3, r10, 0x1, &(0x7f0000001900), &(0x7f0000001940)=[{0x0, 0x5, 0xf, 0x3}], 0x10, 0x37}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000001b00)={r15, 0x0, 0x4a, 0x0, &(0x7f0000001a40)="a4507ae2674f762bd7da3354403d1dae4759187d9165c9579d18476fbc9cc40f1797eae3726d36b72b7f2c293935c98a5c3539f7999705fc6b0da8105c43217489e165a81c47d429a570", 0x0, 0x80000001, 0x0, 0x0, 0x0, &(0x7f0000001ac0), 0x0, 0x2, 0x0, 0x9}, 0x50) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000001b80)={'macsec0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001bc0)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)=r15}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000001c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6acacc6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x1, 0x0, 0x1, 0x0, 0x8, 0x30}, @generic={0x5, 0xc, 0x3, 0x5, 0x800}]}, &(0x7f0000001c40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x26, '\x00', r2, 0x0, r4, 0x8, &(0x7f0000001c80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001cc0)={0x2, 0x1, 0x3, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001dc0)=[r5, r8, r17, r9], &(0x7f0000001e00)=[{0x0, 0x5, 0x4, 0x2}], 0x10, 0xffffff81}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002000)={r8, &(0x7f0000001f00)="a70899ec7057e0104886e9bcd549794d84f9c3a2dc82207a6ae49b850401c33a05be871ea15632a93225ca402a2b2ffe68591ecf37ba8a7af8", &(0x7f0000001f40)=""/191}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002180)={r12, 0x58, &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002300)={0x11, 0xb, &(0x7f0000002040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x8, 0x3, 0x5, 0x18, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x8, 0x4, 0x9, 0x18, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}]}, &(0x7f00000020c0)='syzkaller\x00', 0x800, 0x0, 0x0, 0x41000, 0x1, '\x00', r18, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000021c0)={0x1, 0x7, 0x200, 0x800}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000002200)=[r17, r6, r17], &(0x7f0000002240)=[{0x1, 0x4, 0x2, 0x2}, {0x2, 0x3, 0x6, 0x9}, {0x2, 0x2, 0x6, 0x3}, {0x3, 0x1, 0x5}, {0x0, 0x1, 0x6, 0x7}, {0x0, 0x5, 0xa, 0xa}, {0x1, 0x5, 0xd, 0x8}, {0x2, 0x2, 0xe, 0x7}, {0x1, 0x3, 0xd, 0x2}, {0x5, 0x1, 0xd}], 0x10, 0x1000}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000023c0)={@ifindex=r2, r1, 0x31, 0x200f, r15, @value, @void, @void, @void, r14}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003640)={&(0x7f0000002400)="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", &(0x7f0000002500)=""/75, &(0x7f0000002580)="6ceced453977b00956393f83ff6d28fdd9b92d99fed60ad1a26e30cc53795adc52fedb8ad4e80da09994dfc4708505d8b0f3ee77d812ea05bb80d6effacb7125eda46cd137dc90b2829463104989b485c00ff53ff6b4d93395a84b0353ddcbc22d55467bf129885d1a4e4301e1b0995cdfc6b5549bf7cce0844e937e5075edfc7627544c316a91cca53d6ba21f47899747827fe91da86f9569bc87ae31427f960255e98a3963371c46671a5ed0af8ad02229", &(0x7f0000002640)="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", 0x5, r8}, 0x38) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003680)=r6, 0x4) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003a80)={0x6, 0x7, &(0x7f00000037c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x0, 0x9, 0x2, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @alu={0x4, 0x1, 0x0, 0x6, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000003800)='GPL\x00', 0x1, 0xd5, &(0x7f0000003840)=""/213, 0x41100, 0x23, '\x00', r18, 0x25, r4, 0x8, &(0x7f0000003940)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000003980)={0x4, 0xd, 0x0, 0x1000}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000039c0)=[r5, r16, r16, r12, r12], &(0x7f0000003a00)=[{0x4, 0x3, 0xc, 0x8}, {0x1, 0x3, 0xb, 0x9}, {0x0, 0x3, 0x0, 0x8}, {0x5, 0x2, 0xe, 0xa}, {0x4, 0x5, 0xe, 0x6}], 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000003cc0)={0x12, 0x5, &(0x7f00000036c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000003700)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x5, '\x00', r18, @cgroup_sock_addr=0xa, r15, 0x8, &(0x7f0000003740)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000003780)={0x0, 0xc, 0x5, 0x6}, 0x10, r3, r19, 0x9, &(0x7f0000003bc0)=[0xffffffffffffffff], &(0x7f0000003c00)=[{0x2, 0x4, 0x8, 0x7}, {0x4, 0x1, 0xf}, {0x5, 0x5, 0x6}, {0x4, 0x4, 0x9}, {0x4, 0x5, 0xd, 0xa}, {0x4, 0x4, 0xd, 0x4}, {0x5, 0x4, 0x80000001, 0xc}, {0x2, 0x4, 0xe, 0x7}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x2}, 0x94) 1.410768269s ago: executing program 4 (id=4590): ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, 0x0) syz_clone(0x65140000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000202000000000000000000000a030000000000000000000002"], &(0x7f00000000c0)=""/196, 0x3e, 0xc4, 0x1}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 1.323440353s ago: executing program 0 (id=4591): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="10000000040000000800000007000000000000002bee8b6dc3fc7e55879d5a17f6e5e0e5a3286346e2ca2f18240b301402e346f41b3ce76dd0b403de14ea87b27a07103149ba6392270516cadb0fb5e075028cfe45cc6682ed7a285d504d19501ca8eb39a1ca698de94ea6a67e0af41b2d926520808842aab691aae044c98b4198ed1fce769360d5", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x10000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000af982ad98312022d9700ecaf256448fbc58361fff461085b158e0b00"/67], 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/61}, 0x33) r5 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r3, r0}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.283973175s ago: executing program 4 (id=4592): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) r2 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xb, r2, 0x0) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x102d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x5}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000009fde0553e750621e37f25b4b84d698a85194075f58b646a06bfdb77294f47a0c1f6d5236f92b5cf585963b9faa0a576f06597824be13c13448752e80090b5295803d2b12b115e46fa2d05a0b4d4d747c8a093436cfcc2c3222235e2c6f49cf4bdcc98c66e603888addeb219a72d6fda484c501ade3d1bb0042610f5d47a5ccc693d01cdbf5554a965912a8a5b3c0cb4bea12c32dbdf20a1a3990c089cea74c261e176b987614c3e5029ad5de4afab280d0fc797b92183448b6804d7d7df5", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x13c2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x103e40, 0x1, 0x0, 0x0, 0x0, 0x40, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000001000000000000000000000085000000050000009500190000000000"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x541b, 0x200000000000) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 944.841362ms ago: executing program 2 (id=4595): socketpair(0x10, 0x4, 0x8, &(0x7f00000005c0)) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040}, 0x4008000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f00000001c0)={&(0x7f0000000240)=""/238, 0xee, 0x0, &(0x7f0000000600)=""/166, 0xa6}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1f2f, 0x14, 0x0, &(0x7f0000000440)="9f449470fe919559684010a408002d7a5d4153f0", 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2b696f202b637057736574202b696f202d70696473202b6e6574202b68757f6765746c62f7ffd733705c762a321d18edab726f3758ee5b471d8992f41dff2508f97f29fb2ca97fb4bc632afff7c80fb3b66197ab56df7c5b8356ac67fd2e020c05cb8696736fce2596c240753e72af0107ffae4e25c3ee32234c976d32b9bec79553a5aeaaa162e71b6a"], 0x24) 913.050674ms ago: executing program 5 (id=4596): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="620ac4ff000000007110b2000000000095000000000000006ff1afae727d790c9100c30e2121af0c21114393d06b"], &(0x7f0000000480)='GPL\x00'}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="620ac4ff000000007110b2000000000095000000000000006ff1afae727d790c9100c30e2121af0c21114393d06b"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x35, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xed, 0x9, 0xfb, 0x3, 0x0, 0x62, 0x5b5d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x671115d, 0x5}, 0x2, 0x0, 0x5, 0x0, 0x800200000000081, 0x8002, 0x7fff, 0x0, 0x2cb, 0x0, 0xae}, 0x0, 0x8, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xed, 0x9, 0xfb, 0x3, 0x0, 0x62, 0x5b5d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x671115d, 0x5}, 0x2, 0x0, 0x5, 0x0, 0x800200000000081, 0x8002, 0x7fff, 0x0, 0x2cb, 0x0, 0xae}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x28, 0x25, 0x44, 0xfffff010}, {0x6, 0x6, 0x7, 0x400000e5}]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x41, 0x64b}, 0x104200, 0x0, 0x7, 0x0, 0xffff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0xe2, 0x1, 0x18, 0x20, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r6, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x15, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fc9, 0x0, 0x0, 0x0, 0xc72}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x3, 0xcd, &(0x7f0000000380)=""/205, 0x41100, 0x0, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[{0x2, 0x5, 0x8, 0x9}, {0x0, 0x5, 0xe, 0x2}, {0x4, 0x5, 0xf, 0x6}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xa, 0x1}], 0x10, 0x5}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x15, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fc9, 0x0, 0x0, 0x0, 0xc72}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x3, 0xcd, &(0x7f0000000380)=""/205, 0x41100, 0x0, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[{0x2, 0x5, 0x8, 0x9}, {0x0, 0x5, 0xe, 0x2}, {0x4, 0x5, 0xf, 0x6}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xa, 0x1}], 0x10, 0x5}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x7fff, '\x00', r9, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x7fff, '\x00', r9, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x50) 863.296116ms ago: executing program 3 (id=4597): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="b400000000000000dd0a0000000000006301a4000000000095000000000000006681fabfa7afdea451352385fd277a26b1928972a90713774dee000000008abeded0f241d9e16380276de7f845fb77f3942b1b2f835d2704d284651cec42865a01e610e1d8ebed3bca771dd8dfc94bf8454e0ba5feb0a8fb9c709340a7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r1, 0x58, &(0x7f00000000c0)}, 0x10) 774.73773ms ago: executing program 2 (id=4598): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000680)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x7ffffffffffffff, 0x5}, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x80}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x6, 0x80, 0x0, 0x0, 0x40, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(r7, &(0x7f0000000600)=0xd, 0x18) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec850000000200000085000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r9}, 0x94) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1886e5ad6ab3e97, 0x0, 0x0, 0x3, 0x0, 0x40004, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000ffffffd4123300000000009500000000000000554b8b955e7a1748b529a72befafa3a996f854539ebc1e97df1d6a912a2c7bd03fb87b1a8613493ca111f9d7ab1e54dd7802a1c5cd187516f81a40f6a065f4a9c112426ce8e56170e37543bf9450fc8315ef180556c07170c2a7ce1745d85c74db850deb31b6c863"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) 771.632141ms ago: executing program 0 (id=4599): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000040)={0x1, 0x5, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, @random="3e4f7c1bc8e6", @local]}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x98629, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x0, @perf_config_ext={0x9, 0x80000000000}, 0x8004, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 703.549984ms ago: executing program 5 (id=4600): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x20000000000002c1, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000800000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 584.80555ms ago: executing program 5 (id=4601): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1b, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4d3b}}, @generic={0xe8, 0x2, 0x3, 0xb000, 0x200}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x3bfcb43f}, @jmp={0x5, 0x1, 0x5, 0xa, 0xb, 0x8, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000180)=""/229, 0x40f00, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8, 0x9, 0x7e0}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000300)=[{0x4, 0x5, 0x1, 0x9}, {0x0, 0x5, 0xf, 0x8}, {0x4, 0x1, 0x0, 0x4}], 0x10, 0x400}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r0}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x15, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711814000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f, 0x0, 0x0, 0x0, 0xf00}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) socketpair(0xb, 0x0, 0x1, &(0x7f0000000000)) 567.155431ms ago: executing program 2 (id=4602): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400e6000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x4, 0x4, 0x8}, 0x50) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 431.498878ms ago: executing program 5 (id=4603): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 358.506501ms ago: executing program 4 (id=4604): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), &(0x7f0000000200)=r0}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r0, 0x1}, 0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) 342.374312ms ago: executing program 2 (id=4605): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x38, r0}, 0x18) 252.263737ms ago: executing program 2 (id=4606): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf870eb4a257baafa}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) mkdirat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x1ff) unlink(0x0) r3 = gettid() perf_event_open(&(0x7f0000000040)={0x84f0ac347fcc8aa5, 0x80, 0x7, 0x8, 0x9, 0x0, 0x0, 0x8a43, 0x40, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13c4, 0x2, @perf_config_ext={0x9, 0xffffffffffff5ed9}, 0x11009e, 0x100000000, 0x733, 0x9, 0x8, 0x2, 0x4, 0x0, 0xff, 0x0, 0x843a}, r3, 0xb, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 251.080437ms ago: executing program 4 (id=4607): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x2, 0x3}, 0x5001, 0xc8, 0x0, 0x9, 0x5}, 0x0, 0x6, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0)=r5, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r6 = openat$cgroup_freezer_state(r3, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r6, &(0x7f00000000c0)='THAWED\x00', 0x7) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 227.601748ms ago: executing program 5 (id=4608): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x8, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x13}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000005c0)='cp\xcf<\v\xa9\x1b\xdb\xdbWHqC\xdcL\x92\x8c\xecP\xb0\xa9\x9e5dOEG\xe2\n\x1d\xa7\xaa\xfa\xaa\x99\'\x97\x02\xcd\x03+\x9a\xc8l\xa0\xe0,\xbe\x16\xbe\xe5\xe8\xbc\x19\'\xb1\xbe\xb5a\xfb\x80]r\xab\xbcv\xc8\x01\x98\xa2\x93\x9fs\a\x9b\x8dI\xd6\x00\xf3\x10\xaf$\x82T\xdc\xef\x11\x9bC\xe8\xf0\x8c\xf7V\xf1.\x85\x13\xc4A@\xdb4|\x16\x90_\x1e\x8c\xdc\xa1\tML \x12\xccz\xd7N\xa1e\t5`U\x1f\xd0\xc9.\xec\x11\xb2K\\\x04\xa4E\xa5\xec5\xfb\xb2g\x8d\x7f\xf2&\xd2u\xa5\x19\xa8\xbb9\xf1_Co\xabS\xe8\x89\xe1\xdeBw\x7fZ\x96^\xc4\xcc\x8c\x95V\xf3\xc1ub\xe8\x88\xad\xd3\xc2\xb4t\xa9Q\xa6P\xd7z\xb6\x8a\xdfe\xeb\xff[\x94\xf9\xca-0\xf11\xf9\xf9\xdfA\xb4*\xe1\x9f2|(\f\xf9`\xbb#\x80\xec\"\xa3\x1e\xdb\xe20Y\xe9\xb3\x92\x9a\x98\xb2\x1c-\xa5\xa8\x1b\"\xb6?\x82\xc4FO\x03~\xf1\xa2\x85>%T\x89SC\xa04\x0f}p1\xbb\x1fNk\x98\xc8\x99\x0e\x93D\xb0lg\x87F\x15\xa2') perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x40, 0x7, 0x0, 0x0, 0x8000, 0x46a10, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf, 0x2, @perf_config_ext={0x6, 0x1fa6}, 0x200564, 0x1ff, 0x9, 0x4, 0x5, 0xddf, 0x8, 0x0, 0x1d8, 0x0, 0x1}, r6, 0x1, r7, 0x5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000340)="b9ff03316844268cb8ed08fa3add", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.35874ms ago: executing program 2 (id=4609): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x28) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x20, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0}}, 0x10) (async) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 382.049µs ago: executing program 5 (id=4610): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff319}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 3 (id=4611): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x1, 0x20040, 0x5, 0x41, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000071104b00000000009500000000000000cb5a43e78393"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000500)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb9, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f00000006c0), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', r5, 0x0}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r1}, &(0x7f0000000700), &(0x7f0000000740)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) (async) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x17, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000007a0000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000095000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0xd4, &(0x7f0000000040)=""/212, 0x0, 0x8}, 0x21) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.30' (ED25519) to the list of known hosts. [ 22.379744][ T24] audit: type=1400 audit(1774577526.000:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.383532][ T267] cgroup: Unknown subsys name 'net' [ 22.402628][ T24] audit: type=1400 audit(1774577526.000:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.431580][ T24] audit: type=1400 audit(1774577526.030:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.432380][ T267] cgroup: Unknown subsys name 'devices' [ 22.639887][ T267] cgroup: Unknown subsys name 'hugetlb' [ 22.645516][ T267] cgroup: Unknown subsys name 'rlimit' [ 22.816362][ T24] audit: type=1400 audit(1774577526.430:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.839849][ T24] audit: type=1400 audit(1774577526.430:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.865218][ T24] audit: type=1400 audit(1774577526.430:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.882346][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.897837][ T24] audit: type=1400 audit(1774577526.510:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.923418][ T24] audit: type=1400 audit(1774577526.510:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.923703][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.949488][ T24] audit: type=1400 audit(1774577526.540:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.985550][ T24] audit: type=1400 audit(1774577526.540:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.675895][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.683025][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.690915][ T275] device bridge_slave_0 entered promiscuous mode [ 23.702651][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.710019][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.717470][ T275] device bridge_slave_1 entered promiscuous mode [ 23.769791][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.776872][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.784441][ T276] device bridge_slave_0 entered promiscuous mode [ 23.792588][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.799863][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.807228][ T276] device bridge_slave_1 entered promiscuous mode [ 23.848815][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.856088][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.863709][ T278] device bridge_slave_0 entered promiscuous mode [ 23.871762][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.879126][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.886838][ T278] device bridge_slave_1 entered promiscuous mode [ 23.915559][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.922751][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.930597][ T277] device bridge_slave_0 entered promiscuous mode [ 23.939768][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.947023][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.954603][ T277] device bridge_slave_1 entered promiscuous mode [ 24.050953][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.058158][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.065867][ T279] device bridge_slave_0 entered promiscuous mode [ 24.073210][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.080375][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.088224][ T279] device bridge_slave_1 entered promiscuous mode [ 24.147388][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.154750][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.162212][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.169328][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.192925][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.200019][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.207489][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.214584][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.228434][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.235904][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.243570][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.253242][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.295676][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.302963][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.310317][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.317383][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.337037][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.344600][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.352032][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.359295][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.378791][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.386913][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.394761][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.402662][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.410261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.418358][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.425746][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.433196][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.440573][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.448650][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.456196][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.474139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.482644][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.489949][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.497678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.506521][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.514257][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.532307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.540398][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.548655][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.555795][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.564052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.572225][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.579313][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.586764][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.599843][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.607363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.614899][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.634447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.646086][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.655174][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.664673][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.672315][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.680420][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.688803][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.696808][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.705359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.713854][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.721128][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.740940][ T278] device veth0_vlan entered promiscuous mode [ 24.748220][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.756715][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.765094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.773653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.782393][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.791419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.799824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.808494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.817123][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.824451][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.832778][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.840463][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.862034][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.870630][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.879195][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.886231][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.894395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.903254][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.911747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.920029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.928313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.936389][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.944578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.952108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.959969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.968201][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.976199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.983900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.992049][ T276] device veth0_vlan entered promiscuous mode [ 25.006269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.014828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.030625][ T278] device veth1_macvtap entered promiscuous mode [ 25.039393][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.047136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.055749][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.064453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.072844][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.081287][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.089883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.098668][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.105885][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.125476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.133971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.143048][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.152270][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.160969][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.168325][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.175855][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.184954][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.202332][ T275] device veth0_vlan entered promiscuous mode [ 25.213512][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.222552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.230763][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.238944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.247075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.256019][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.264514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.272739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.281014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.289580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.297648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.305938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.313863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.331478][ T275] device veth1_macvtap entered promiscuous mode [ 25.339309][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.347491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.355631][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.364176][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.373021][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.381791][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.390060][ T276] device veth1_macvtap entered promiscuous mode [ 25.399183][ T277] device veth0_vlan entered promiscuous mode [ 25.415231][ T279] device veth0_vlan entered promiscuous mode [ 25.423918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.433901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.442467][ T278] request_module fs-gadgetfs succeeded, but still no fs? [ 25.442554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.457461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.465455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.473608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.482033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.490476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.498748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.507261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.515615][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.531128][ T278] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.539694][ T277] device veth1_macvtap entered promiscuous mode [ 25.549243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.558356][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.566961][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.602600][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.613015][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.625395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.636003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.644900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.654654][ T279] device veth1_macvtap entered promiscuous mode [ 25.687707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.706699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.715630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.724603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.791338][ T301] device syzkaller0 entered promiscuous mode [ 25.793631][ C0] hrtimer: interrupt took 86820 ns [ 25.896795][ T314] Ñ26±ÿ: renamed from team_slave_1 [ 27.231450][ T370] device syzkaller0 entered promiscuous mode [ 27.429940][ T370] syz.4.20 uses obsolete (PF_INET,SOCK_PACKET) [ 27.468480][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 27.468491][ T24] audit: type=1400 audit(1774577531.090:117): avc: denied { create } for pid=369 comm="syz.4.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.665647][ T396] device syzkaller0 entered promiscuous mode [ 27.674136][ T24] audit: type=1400 audit(1774577531.280:118): avc: denied { read } for pid=397 comm="syz.2.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.806301][ T24] audit: type=1400 audit(1774577531.420:119): avc: denied { create } for pid=399 comm="syz.3.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 28.175839][ T428] device wg2 entered promiscuous mode [ 28.845495][ T24] audit: type=1400 audit(1774577532.460:120): avc: denied { ioctl } for pid=463 comm="syz.4.43" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.009300][ T24] audit: type=1400 audit(1774577532.630:121): avc: denied { create } for pid=482 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.321319][ T24] audit: type=1400 audit(1774577532.940:122): avc: denied { ioctl } for pid=498 comm="syz.1.52" path="net:[4026532287]" dev="nsfs" ino=4026532287 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.782291][ T24] audit: type=1400 audit(1774577533.400:123): avc: denied { create } for pid=528 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 29.820168][ T540] cgroup: syz.3.65 (540) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 29.881914][ T540] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 30.205886][ T24] audit: type=1400 audit(1774577533.820:124): avc: denied { ioctl } for pid=568 comm="syz.1.72" path="socket:[16547]" dev="sockfs" ino=16547 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.237370][ T570] device syzkaller0 entered promiscuous mode [ 30.271316][ T576] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 30.539207][ T24] audit: type=1400 audit(1774577534.160:125): avc: denied { tracepoint } for pid=581 comm="syz.3.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.901291][ T605] device syzkaller0 entered promiscuous mode [ 31.029579][ T605] syzkaller0: create flow: hash 59155011 index 2 [ 31.089206][ T605] syzkaller0: delete flow: hash 59155011 index 2 [ 31.186383][ T24] audit: type=1400 audit(1774577534.800:126): avc: denied { create } for pid=616 comm="syz.3.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.662193][ T636] device syzkaller0 entered promiscuous mode [ 32.284532][ T646] device sit0 entered promiscuous mode [ 33.138893][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 33.138906][ T24] audit: type=1400 audit(1774577536.760:129): avc: denied { create } for pid=725 comm="syz.4.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 33.923101][ T772] tap0: tun_chr_ioctl cmd 1074025680 [ 34.626463][ T24] audit: type=1400 audit(1774577538.240:130): avc: denied { create } for pid=805 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 34.708342][ T818] device wg2 entered promiscuous mode [ 35.671687][ T871] device syzkaller0 entered promiscuous mode [ 36.034138][ T881] device veth0_vlan left promiscuous mode [ 36.106765][ T881] device veth0_vlan entered promiscuous mode [ 36.450253][ T24] audit: type=1400 audit(1774577540.070:131): avc: denied { create } for pid=898 comm="syz.3.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 36.510980][ T24] audit: type=1400 audit(1774577540.120:132): avc: denied { create } for pid=900 comm="syz.3.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.783213][ T902] ªªªªªª™™: renamed from vlan0 [ 37.780865][ T933] device syzkaller0 entered promiscuous mode [ 38.120837][ T930] device syzkaller0 entered promiscuous mode [ 38.403486][ T953] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 39.907078][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.340928][ T1043] bridge0: port 3(gretap0) entered blocking state [ 40.374662][ T1043] bridge0: port 3(gretap0) entered disabled state [ 40.387329][ T1043] device gretap0 entered promiscuous mode [ 40.394616][ T1043] bridge0: port 3(gretap0) entered blocking state [ 40.401133][ T1043] bridge0: port 3(gretap0) entered forwarding state [ 40.583119][ T1059] device veth0_vlan left promiscuous mode [ 40.590196][ T1059] device veth0_vlan entered promiscuous mode [ 41.191857][ T24] audit: type=1400 audit(1774577544.810:133): avc: denied { create } for pid=1099 comm="syz.2.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 41.824034][ T24] audit: type=1400 audit(1774577545.440:134): avc: denied { create } for pid=1127 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 43.020504][ T24] audit: type=1400 audit(1774577546.640:135): avc: denied { create } for pid=1168 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 43.230151][ T1221] IPv6: pim6reg1: Disabled Multicast RS [ 43.672793][ T1236] device syzkaller0 entered promiscuous mode [ 43.766471][ T1242] device syzkaller0 entered promiscuous mode [ 45.098548][ T1314] syzkaller1: tun_chr_ioctl cmd 21731 [ 45.119259][ T1313] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 45.250245][ T1317] device syzkaller0 entered promiscuous mode [ 45.363969][ T24] audit: type=1400 audit(1774577548.980:136): avc: denied { append } for pid=1331 comm="syz.4.281" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.448405][ T1332] device syzkaller0 entered promiscuous mode [ 45.480466][ T24] audit: type=1400 audit(1774577549.010:137): avc: denied { create } for pid=1331 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 45.614495][ T24] audit: type=1400 audit(1774577549.230:138): avc: denied { create } for pid=1346 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 45.642379][ T1345] device syzkaller0 entered promiscuous mode [ 45.860188][ T1372] device wg2 left promiscuous mode [ 45.869616][ T1372] device wg2 entered promiscuous mode [ 46.725605][ T1423] cgroup: fork rejected by pids controller in /syz4 [ 47.082050][ T1464] device syzkaller0 entered promiscuous mode [ 47.949373][ T560] device bridge_slave_1 left promiscuous mode [ 47.956067][ T560] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.018435][ T560] device bridge_slave_0 left promiscuous mode [ 48.024637][ T560] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.033733][ T560] device veth1_macvtap left promiscuous mode [ 48.039845][ T560] device veth0_vlan left promiscuous mode [ 48.171661][ T1485] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.254104][ T1485] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.263400][ T1485] device bridge_slave_0 entered promiscuous mode [ 48.301934][ T1485] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.312735][ T1485] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.321557][ T1485] device bridge_slave_1 entered promiscuous mode [ 48.863791][ T24] audit: type=1400 audit(1774577552.480:139): avc: denied { create } for pid=1485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.887317][ T24] audit: type=1400 audit(1774577552.480:140): avc: denied { write } for pid=1485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.918625][ T24] audit: type=1400 audit(1774577552.480:141): avc: denied { read } for pid=1485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.947605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.955928][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.979025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.988822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.998737][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.005803][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.024799][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.033478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.042232][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.049315][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.057652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.094140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.106436][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.155791][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.183099][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.198062][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.205804][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.216500][ T1485] device veth0_vlan entered promiscuous mode [ 49.246715][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.276603][ T1544] device syzkaller0 entered promiscuous mode [ 49.286130][ T1485] device veth1_macvtap entered promiscuous mode [ 49.335786][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.344568][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.397983][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.421389][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.489717][ T1557] batadv0: tun_chr_ioctl cmd 2148553947 [ 49.549080][ T1563] device syzkaller0 entered promiscuous mode [ 49.787387][ T1598] device veth0_to_bridge entered promiscuous mode [ 50.721790][ T24] audit: type=1400 audit(1774577554.340:142): avc: denied { create } for pid=1672 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 51.158695][ T24] audit: type=1400 audit(1774577554.780:143): avc: denied { create } for pid=1659 comm="syz.2.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 52.118679][ T24] audit: type=1400 audit(1774577555.740:144): avc: denied { create } for pid=1723 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 52.197525][ T1727] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.430526][ T1722] device syzkaller0 entered promiscuous mode [ 53.272796][ T1806] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 53.307137][ T1806] device syzkaller0 entered promiscuous mode [ 53.443986][ T1818] device syzkaller0 entered promiscuous mode [ 54.998927][ T1926] @ÿ: renamed from bond_slave_0 [ 55.115113][ T24] audit: type=1400 audit(1774577558.730:145): avc: denied { create } for pid=1923 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 55.186136][ T1933] device syzkaller0 entered promiscuous mode [ 55.246567][ T1945] device syzkaller0 entered promiscuous mode [ 55.256047][ T1944] device vlan0 entered promiscuous mode [ 55.281755][ T1947] device syzkaller0 entered promiscuous mode [ 55.641943][ T24] audit: type=1400 audit(1774577559.260:146): avc: denied { create } for pid=1983 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 56.938406][ T2042] @ÿ: renamed from bond_slave_0 [ 57.027805][ T24] audit: type=1400 audit(1774577560.640:147): avc: denied { create } for pid=2057 comm="syz.4.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 57.750214][ T2125] device wg2 left promiscuous mode [ 57.966201][ T2137] device syzkaller0 entered promiscuous mode [ 58.889598][ T24] audit: type=1400 audit(1774577562.510:148): avc: denied { create } for pid=2198 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 59.303738][ T2216] device syzkaller0 entered promiscuous mode [ 61.408462][ T2305] device syzkaller0 entered promiscuous mode [ 61.840044][ T2333] device syzkaller0 entered promiscuous mode [ 62.110081][ T2346] device syzkaller0 entered promiscuous mode [ 63.985289][ T2421] cgroup: fork rejected by pids controller in /syz0 [ 64.792642][ T2455] device syzkaller0 entered promiscuous mode [ 65.334299][ T2482] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.342401][ T2482] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.351306][ T2482] device bridge_slave_0 entered promiscuous mode [ 65.411605][ T2482] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.428859][ T2482] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.445258][ T2482] device bridge_slave_1 entered promiscuous mode [ 65.850771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.900621][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.917772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.942963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.952034][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.959338][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.967549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.977229][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.985820][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.993051][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.005504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.033577][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.043965][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.074606][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.090971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.110360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.120234][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.141079][ T2482] device veth0_vlan entered promiscuous mode [ 66.157185][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.166765][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.177179][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.184982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.236688][ T2482] device veth1_macvtap entered promiscuous mode [ 66.248347][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.280411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.293668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.326768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.336939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.830430][ T2559] device syzkaller0 entered promiscuous mode [ 66.903459][ T2563] device syzkaller0 entered promiscuous mode [ 67.363636][ T2596] device syzkaller0 entered promiscuous mode [ 68.070781][ T2629] @0Ù: renamed from bond_slave_1 [ 68.190720][ T2639] 7B’ç÷ï: renamed from syzkaller0 [ 68.244131][ T24] audit: type=1400 audit(1774577571.860:149): avc: denied { write } for pid=2648 comm="syz.3.672" name="cgroup.subtree_control" dev="cgroup2" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 68.468043][ T24] audit: type=1400 audit(1774577571.860:150): avc: denied { open } for pid=2648 comm="syz.3.672" path="" dev="cgroup2" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 68.569702][ T24] audit: type=1400 audit(1774577571.860:151): avc: denied { ioctl } for pid=2648 comm="syz.3.672" path="" dev="cgroup2" ino=372 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 68.680689][ T2655] device syzkaller0 entered promiscuous mode [ 68.780515][ T24] audit: type=1400 audit(1774577572.400:152): avc: denied { create } for pid=2673 comm="syz.3.681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 69.481857][ T2709] device syzkaller0 entered promiscuous mode [ 70.275538][ T2774] device syzkaller0 left promiscuous mode [ 70.391810][ T24] audit: type=1400 audit(1774577574.010:153): avc: denied { create } for pid=2773 comm="syz.4.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 70.438185][ T24] audit: type=1400 audit(1774577574.060:154): avc: denied { create } for pid=2777 comm="syz.0.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 71.302078][ T2817] device syzkaller0 entered promiscuous mode [ 72.368111][ T2875] bridge0: port 4(veth0_vlan) entered blocking state [ 72.384388][ T2875] bridge0: port 4(veth0_vlan) entered disabled state [ 72.403848][ T2875] bridge0: port 4(veth0_vlan) entered blocking state [ 72.410788][ T2875] bridge0: port 4(veth0_vlan) entered forwarding state [ 72.527833][ T24] audit: type=1400 audit(1774577576.140:155): avc: denied { attach_queue } for pid=2884 comm="syz.1.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 73.161392][ T2938] device syzkaller0 entered promiscuous mode [ 73.342189][ T2953] device syzkaller0 entered promiscuous mode [ 74.651229][ T3000] device syzkaller0 entered promiscuous mode [ 75.000528][ T3041] tun0: tun_chr_ioctl cmd 1074025677 [ 75.010915][ T3041] tun0: linktype set to 820 [ 75.325071][ T3060] device syzkaller0 entered promiscuous mode [ 75.628535][ T3073] cgroup: fork rejected by pids controller in /syz1 [ 76.416409][ T24] audit: type=1400 audit(1774577580.030:156): avc: denied { associate } for pid=3205 comm="syz.0.803" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 76.478235][ T24] audit: type=1400 audit(1774577580.070:157): avc: denied { create } for pid=3205 comm="syz.0.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 76.564084][ T3218] device syzkaller0 entered promiscuous mode [ 76.643008][ T3221] device syzkaller0 entered promiscuous mode [ 77.045627][ T3273] device syzkaller0 entered promiscuous mode [ 77.125556][ T3282] device syzkaller0 entered promiscuous mode [ 77.161754][ T3284] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.201619][ T3288] device sit0 entered promiscuous mode [ 77.555243][ T3301] device syzkaller0 entered promiscuous mode [ 78.611756][ T3362] device syzkaller0 entered promiscuous mode [ 78.777299][ T3376] device sit0 entered promiscuous mode [ 78.833719][ T3377] device sit0 left promiscuous mode [ 79.059766][ T24] audit: type=1400 audit(1774577582.680:158): avc: denied { read } for pid=3395 comm="syz.2.862" dev="nsfs" ino=4026532464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.148273][ T24] audit: type=1400 audit(1774577582.680:159): avc: denied { open } for pid=3395 comm="syz.2.862" path="net:[4026532464]" dev="nsfs" ino=4026532464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.150088][ T3398] device sit0 entered promiscuous mode [ 79.723809][ T3412] device wg2 entered promiscuous mode [ 80.445479][ T3418] device syzkaller0 entered promiscuous mode [ 80.509976][ T3417] device syzkaller0 left promiscuous mode [ 83.758549][ T3486] device syzkaller0 entered promiscuous mode [ 84.049310][ T3486] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 84.079744][ T3486] syzkaller0: tun_net_xmit 1280 [ 84.085290][ T3486] syzkaller0: create flow: hash 94100879 index 3 [ 84.172707][ T3485] syzkaller0: delete flow: hash 94100879 index 3 [ 85.194973][ T3553] device syzkaller0 entered promiscuous mode [ 85.356837][ T24] audit: type=1400 audit(1774577588.970:160): avc: denied { create } for pid=3567 comm="syz.4.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 85.379381][ T3566] device syzkaller0 entered promiscuous mode [ 85.474679][ T3568] device syzkaller0 entered promiscuous mode [ 87.901003][ T3673] nr0: port 1(macsec0) entered blocking state [ 87.907764][ T3673] nr0: port 1(macsec0) entered disabled state [ 87.929291][ T3673] device macsec0 entered promiscuous mode [ 88.391774][ T3681] device syzkaller0 entered promiscuous mode [ 88.417666][ T3691] device syzkaller0 entered promiscuous mode [ 88.451223][ T24] audit: type=1400 audit(1774577592.070:161): avc: denied { ioctl } for pid=3687 comm="syz.3.950" path="net:[4026532366]" dev="nsfs" ino=4026532366 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.599527][ T3686] device wg2 entered promiscuous mode [ 89.182386][ T3736] device syzkaller0 entered promiscuous mode [ 90.850919][ T3794] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 90.879062][ T3794] device syzkaller0 entered promiscuous mode [ 90.989185][ T3805] device syzkaller0 entered promiscuous mode [ 91.266127][ T3821] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.288435][ T3821] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.303325][ T3821] device bridge_slave_0 entered promiscuous mode [ 91.313693][ T3821] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.321001][ T3821] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.328643][ T3821] device bridge_slave_1 entered promiscuous mode [ 91.371671][ T3843] ³þ: renamed from bond_slave_0 [ 91.705249][ T3821] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.712714][ T3821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.720070][ T3821] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.727139][ T3821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.848867][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.859103][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.891564][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.901809][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.930091][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.943786][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.956373][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.964922][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.993533][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.011308][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.024855][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.032077][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.076344][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.087368][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.111701][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.125421][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.158190][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.182189][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.218482][ T3821] device veth0_vlan entered promiscuous mode [ 92.242657][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.256027][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.303803][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.325708][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.360717][ T3821] device veth1_macvtap entered promiscuous mode [ 92.372957][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.403734][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.428752][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.499851][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.512814][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.526271][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.541362][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.196502][ T3925] device syzkaller0 entered promiscuous mode [ 93.369411][ T3942] syz.3.1027 (3942) used obsolete PPPIOCDETACH ioctl [ 94.057664][ T3968] device syzkaller0 entered promiscuous mode [ 94.276027][ T3980] device syzkaller0 entered promiscuous mode [ 95.361371][ T4054] tap0: tun_chr_ioctl cmd 1074025680 [ 95.369941][ T4056] tap0: tun_chr_ioctl cmd 1074025680 [ 95.394869][ T4054] tap0: tun_chr_ioctl cmd 21731 [ 95.403033][ T4056] tap0: tun_chr_ioctl cmd 21731 [ 95.591117][ T4069] device veth1_macvtap left promiscuous mode [ 96.029164][ T4095] device syzkaller0 entered promiscuous mode [ 97.086630][ T4151] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.098051][ T4151] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.226886][ T4156] device bridge_slave_1 left promiscuous mode [ 97.271943][ T4156] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.358463][ T4156] device bridge_slave_0 left promiscuous mode [ 97.438627][ T4156] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.743011][ T4155] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.807927][ T4155] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.815633][ T4155] device bridge_slave_0 entered promiscuous mode [ 97.936055][ T4155] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.948090][ T4155] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.955687][ T4155] device bridge_slave_1 entered promiscuous mode [ 98.354491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.374200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.416944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.425554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.438597][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.446010][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.454671][ T24] audit: type=1400 audit(1774577602.080:162): avc: denied { create } for pid=4208 comm="syz.3.1108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 98.484970][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.493493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.502022][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.509201][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.544197][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.552645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.562825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.577409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.589126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.635019][ T4215] device syzkaller0 entered promiscuous mode [ 98.712594][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.721416][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.756135][ T4155] device veth0_vlan entered promiscuous mode [ 98.763592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.772226][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.780952][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.788587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.820559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.836412][ T4155] device veth1_macvtap entered promiscuous mode [ 98.882977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.907151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.927242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.947401][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.016519][ T4246] device syzkaller0 entered promiscuous mode [ 99.063235][ T560] device bridge_slave_1 left promiscuous mode [ 99.070124][ T560] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.078406][ T560] device bridge_slave_0 left promiscuous mode [ 99.084740][ T560] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.096085][ T560] device veth1_macvtap left promiscuous mode [ 99.104504][ T560] device veth0_vlan left promiscuous mode [ 100.992286][ T4337] device syzkaller0 entered promiscuous mode [ 102.892160][ T24] audit: type=1400 audit(1774577606.510:163): avc: denied { create } for pid=4420 comm="syz.0.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 103.196800][ T4451] device syzkaller0 entered promiscuous mode [ 103.415493][ T4459] device wg2 entered promiscuous mode [ 103.615248][ T4478] device syzkaller0 entered promiscuous mode [ 103.731584][ T4490] device syzkaller0 entered promiscuous mode [ 103.885692][ T4501] device wg2 entered promiscuous mode [ 104.516084][ T4521] device syzkaller0 entered promiscuous mode [ 105.542997][ T4618] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 105.606883][ T4618] device syzkaller0 entered promiscuous mode [ 105.654840][ T4617] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 106.055040][ T4630] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 106.072975][ T4630] device syzkaller0 entered promiscuous mode [ 106.110460][ T4647] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 106.116444][ T4647] pim6reg0: linktype set to 768 [ 106.605726][ T4665] ±ÿ: renamed from team_slave_1 [ 107.480274][ T4701] device syzkaller0 entered promiscuous mode [ 107.849534][ T4722] device syzkaller0 entered promiscuous mode [ 107.863996][ T4726] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 109.283513][ T4797] @ÿ: renamed from bond_slave_0 [ 109.556330][ T4802] device syzkaller0 entered promiscuous mode [ 110.284891][ T4838] device syzkaller0 entered promiscuous mode [ 110.526720][ T4850] device syzkaller0 entered promiscuous mode [ 110.840851][ T4858] device veth0_vlan left promiscuous mode [ 110.854503][ T4858] device veth0_vlan entered promiscuous mode [ 112.335080][ T4944] device syzkaller0 entered promiscuous mode [ 112.458228][ T4947] device syzkaller0 entered promiscuous mode [ 112.593300][ T4960] device syzkaller0 entered promiscuous mode [ 114.106064][ T5035] device wg2 left promiscuous mode [ 115.455879][ T5085] device syzkaller0 entered promiscuous mode [ 115.948604][ T5099] device syzkaller0 entered promiscuous mode [ 116.271755][ T5111] tun0: tun_chr_ioctl cmd 1074812118 [ 116.406657][ T5111] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.499548][ T5115] device bridge_slave_1 left promiscuous mode [ 116.505789][ T5115] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.514097][ T5115] device bridge_slave_0 left promiscuous mode [ 116.520411][ T5115] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.791655][ T5131] device syzkaller0 entered promiscuous mode [ 116.986474][ T24] audit: type=1400 audit(1774577620.600:164): avc: denied { create } for pid=5137 comm="syz.4.1385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 117.066543][ T5145] ------------[ cut here ]------------ [ 117.148399][ T5145] trace type BPF program uses run-time allocation [ 117.178953][ T5145] WARNING: CPU: 0 PID: 5145 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 117.272662][ T5145] Modules linked in: [ 117.306588][ T5145] CPU: 0 PID: 5145 Comm: syz.4.1387 Not tainted syzkaller #0 [ 117.363217][ T5145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 117.458082][ T5145] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 117.464820][ T5145] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 117.557480][ T5145] RSP: 0018:ffffc90002187448 EFLAGS: 00010246 [ 117.564276][ T5145] RAX: 3c65e62ac0a44b00 RBX: 0000000000000001 RCX: 0000000000080000 [ 117.578113][ T5145] RDX: ffffc90007f01000 RSI: 0000000000001c36 RDI: 0000000000001c37 [ 117.671808][ T5145] RBP: ffffc90002187490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 117.699529][ T5145] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff88811f664000 [ 117.729466][ T5145] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888127f2c800 [ 117.758142][ T5145] FS: 00007f5f3432f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 117.811586][ T5145] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 117.843559][ T5145] CR2: 00007f033ee738b0 CR3: 000000011c21f000 CR4: 00000000003506a0 [ 117.872873][ T5145] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 117.886241][ T5145] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 117.895569][ T5145] Call Trace: [ 117.901853][ T5145] ? __fdget+0x1a1/0x230 [ 117.906151][ T5145] resolve_pseudo_ldimm64+0x55e/0x1060 [ 117.912211][ T5145] ? bpf_check+0xdb10/0xdb10 [ 117.918319][ T5145] ? kvmalloc_node+0x88/0x130 [ 117.944436][ T5145] bpf_check+0x9058/0xdb10 [ 117.996321][ T5145] ? bpf_get_btf_vmlinux+0x60/0x60 [ 118.063512][ T5145] ? 0xffffffffa0026330 [ 118.077933][ T5145] ? is_bpf_text_address+0x177/0x190 [ 118.083524][ T5145] ? selinux_bpf_prog_alloc+0x51/0x140 [ 118.147918][ T5145] ? __kernel_text_address+0xa0/0x100 [ 118.153609][ T5145] ? unwind_get_return_address+0x4d/0x90 [ 118.167963][ T5145] ? stack_trace_save+0xf0/0xf0 [ 118.201359][ T5145] ? arch_stack_walk+0xee/0x140 [ 118.206287][ T5145] ? stack_trace_save+0xa6/0xf0 [ 118.258719][ T5145] ? stack_trace_snprint+0xf0/0xf0 [ 118.264010][ T5145] ? __kasan_slab_alloc+0x69/0xf0 [ 118.297975][ T5145] ? selinux_bpf_prog_alloc+0x51/0x140 [ 118.304054][ T5145] ? selinux_bpf_prog_alloc+0x51/0x140 [ 118.314263][ T5184] device syzkaller0 entered promiscuous mode [ 118.357940][ T5145] ? __kasan_kmalloc+0xec/0x110 [ 118.362856][ T5145] ? __kasan_kmalloc+0xda/0x110 [ 118.367834][ T5145] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 118.374268][ T5145] ? selinux_bpf_prog_alloc+0x51/0x140 [ 118.380110][ T5145] ? security_bpf_prog_alloc+0x62/0x90 [ 118.385824][ T5145] ? bpf_prog_load+0x9d8/0x14a0 [ 118.391112][ T5145] ? __se_sys_bpf+0x49a/0x740 [ 118.395945][ T5145] ? __x64_sys_bpf+0x7b/0x90 [ 118.400835][ T5145] ? do_syscall_64+0x31/0x40 [ 118.405564][ T5145] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.412044][ T5145] ? memset+0x35/0x40 [ 118.416160][ T5145] ? bpf_obj_name_cpy+0x193/0x1e0 [ 118.421310][ T5145] bpf_prog_load+0xfca/0x14a0 [ 118.426161][ T5145] ? map_freeze+0x320/0x320 [ 118.431077][ T5145] ? selinux_bpf+0xc7/0xf0 [ 118.436250][ T5145] ? security_bpf+0x82/0xa0 [ 118.440914][ T5145] __se_sys_bpf+0x49a/0x740 [ 118.445509][ T5145] ? __x64_sys_bpf+0x90/0x90 [ 118.450274][ T5145] ? __kasan_check_read+0x11/0x20 [ 118.456315][ T5145] __x64_sys_bpf+0x7b/0x90 [ 118.461400][ T5145] do_syscall_64+0x31/0x40 [ 118.465936][ T5145] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.472182][ T5145] RIP: 0033:0x7f5f358d4799 [ 118.476732][ T5145] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.496921][ T5145] RSP: 002b:00007f5f3432f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.505645][ T5145] RAX: ffffffffffffffda RBX: 00007f5f35b4dfa0 RCX: 00007f5f358d4799 [ 118.513926][ T5145] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 118.522219][ T5145] RBP: 00007f5f3596ac99 R08: 0000000000000000 R09: 0000000000000000 [ 118.530481][ T5145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 118.538636][ T5145] R13: 00007f5f35b4e038 R14: 00007f5f35b4dfa0 R15: 00007ffd4c2db128 [ 118.546673][ T5145] ---[ end trace 8a306fd9f10cc581 ]--- [ 119.083584][ T5202] device wg2 entered promiscuous mode [ 119.774643][ T5231] device syzkaller0 entered promiscuous mode [ 120.872122][ T5301] device syzkaller0 entered promiscuous mode [ 121.908548][ T5366] device syzkaller0 entered promiscuous mode [ 122.922063][ T5390] device syzkaller0 entered promiscuous mode [ 123.102422][ T5394] syzkaller0: mtu greater than device maximum [ 123.277125][ T5409] device veth0_vlan left promiscuous mode [ 123.323497][ T5410] cgroup: fork rejected by pids controller in /syz2 [ 123.354300][ T5409] device veth0_vlan entered promiscuous mode [ 123.409562][ T5413] device veth1_macvtap left promiscuous mode [ 123.429382][ T5413] device macsec0 entered promiscuous mode [ 124.717534][ T5562] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.728265][ T5562] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.735957][ T5562] device bridge_slave_0 entered promiscuous mode [ 124.756381][ T5573] device syzkaller0 entered promiscuous mode [ 124.783411][ T5562] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.793304][ T5562] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.807944][ T5562] device bridge_slave_1 entered promiscuous mode [ 124.819015][ T5583] : renamed from bond_slave_0 [ 124.897697][ T5591] device wg2 left promiscuous mode [ 124.968947][ T5591] device wg2 entered promiscuous mode [ 125.166287][ T5562] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.173420][ T5562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.180830][ T5562] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.187896][ T5562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.253151][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.263013][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.382088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.397822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.425437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.436210][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.444830][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.452070][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.460016][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.487157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.496555][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.503670][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.568841][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.577891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.586063][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.594839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.630776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.645458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.671225][ T5562] device veth0_vlan entered promiscuous mode [ 125.701421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.713337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.734289][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.742263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.758354][ T560] bridge0: port 3(gretap0) entered disabled state [ 125.815436][ T560] device gretap0 left promiscuous mode [ 125.821229][ T560] bridge0: port 3(gretap0) entered disabled state [ 125.834061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.842590][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.926766][ T5562] device veth1_macvtap entered promiscuous mode [ 125.962770][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.970877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.979610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.992208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.000983][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.045293][ T560] bridge0: port 4(veth0_vlan) entered disabled state [ 126.052605][ T560] device bridge_slave_1 left promiscuous mode [ 126.059945][ T560] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.069063][ T560] device bridge_slave_0 left promiscuous mode [ 126.075337][ T560] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.102151][ T560] device veth0_vlan left promiscuous mode [ 126.348785][ T5669] device syzkaller0 entered promiscuous mode [ 127.725682][ T5780] tap0: tun_chr_ioctl cmd 1074025677 [ 127.731257][ T5780] tap0: linktype set to 778 [ 129.011940][ T5844] syz.4.1565[5844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.011996][ T5844] syz.4.1565[5844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.552701][ T5868] device wg2 left promiscuous mode [ 129.625055][ T5868] device wg2 entered promiscuous mode [ 129.761070][ T5881] device syzkaller0 entered promiscuous mode [ 130.869864][ T5951] device syzkaller0 entered promiscuous mode [ 131.676249][ T24] audit: type=1400 audit(1774577635.290:165): avc: denied { setattr } for pid=6005 comm="syz.4.1612" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 132.068220][ T6025] device wg2 entered promiscuous mode [ 132.075071][ T6036] gretap0: mtu less than device minimum [ 132.353806][ T6052] device syzkaller0 entered promiscuous mode [ 132.523232][ T6064] device syzkaller0 entered promiscuous mode [ 133.743287][ T6142] device wg2 left promiscuous mode [ 133.822653][ T6142] device wg2 entered promiscuous mode [ 134.024064][ T6160] device syzkaller0 entered promiscuous mode [ 134.565367][ T6187] device syzkaller0 entered promiscuous mode [ 134.915055][ T6202] device syzkaller0 entered promiscuous mode [ 136.241981][ T6306] device syzkaller0 entered promiscuous mode [ 136.316715][ T6315] device syzkaller0 entered promiscuous mode [ 136.410086][ T6322] device syzkaller0 entered promiscuous mode [ 137.264294][ T6378] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 137.689047][ T6384] tap0: tun_chr_ioctl cmd 1074812118 [ 137.727642][ T6386] device sit0 left promiscuous mode [ 137.895310][ T6390] device sit0 entered promiscuous mode [ 138.394479][ T6396] device syzkaller0 entered promiscuous mode [ 141.391097][ T6513] device syzkaller0 entered promiscuous mode [ 142.467969][ T6584] device syzkaller0 entered promiscuous mode [ 144.184682][ T6650] device pim6reg1 entered promiscuous mode [ 145.809059][ T6729] device syzkaller0 entered promiscuous mode [ 145.835736][ T6734] device syzkaller0 entered promiscuous mode [ 147.009464][ T6782] ÿÿÿÿÿÿ: renamed from vlan1 [ 147.975761][ T6807] device sit0 left promiscuous mode [ 148.195975][ T6825] device syzkaller0 entered promiscuous mode [ 149.965454][ T6960] ±ÿ: renamed from team_slave_1 [ 150.682119][ T7031] device aaaaaaaaaaaaaaa entered promiscuous mode [ 151.538397][ T7047] cgroup: fork rejected by pids controller in /syz3 [ 152.646418][ T7172] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.822054][ T7172] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.888684][ T7172] device bridge_slave_0 entered promiscuous mode [ 152.989580][ T7172] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.996698][ T7172] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.006753][ T7172] device bridge_slave_1 entered promiscuous mode [ 153.330165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.338887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.374024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.389018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.417524][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.424829][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.447529][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.456195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.465097][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.472193][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.496122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.537001][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.563873][ T7228] device syzkaller0 entered promiscuous mode [ 153.570769][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.616186][ T7238] device syzkaller0 entered promiscuous mode [ 153.705384][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.725812][ T7172] device veth0_vlan entered promiscuous mode [ 153.732983][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.742286][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.750368][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.775371][ T7172] device veth1_macvtap entered promiscuous mode [ 153.813478][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.842401][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.891528][ T7249] nr0: port 1(macsec0) entered blocking state [ 153.897649][ T7249] nr0: port 1(macsec0) entered disabled state [ 153.948413][ T7249] device macsec0 entered promiscuous mode [ 153.959071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.089293][ T305] nr0: port 1(macsec0) entered disabled state [ 154.990876][ T7292] device syzkaller0 entered promiscuous mode [ 155.109981][ T7314] device xfrm0 entered promiscuous mode [ 155.200801][ T7326] device syzkaller0 entered promiscuous mode [ 155.354339][ T7345] device wg2 left promiscuous mode [ 155.890347][ T7420] device macsec0 entered promiscuous mode [ 155.915032][ T7420] device veth1_macvtap left promiscuous mode [ 157.606316][ T7494] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.615850][ T7494] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.684633][ T7505] device syzkaller0 entered promiscuous mode [ 157.704672][ T7494] device bridge_slave_1 left promiscuous mode [ 157.739364][ T7494] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.769974][ T7494] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.435649][ T7555] device syzkaller0 entered promiscuous mode [ 158.513546][ T7569] device syzkaller0 entered promiscuous mode [ 159.340414][ T7618] device syzkaller0 entered promiscuous mode [ 159.419594][ T7625] device syzkaller0 entered promiscuous mode [ 160.296837][ T7686] device syzkaller0 entered promiscuous mode [ 161.121547][ T7726] device syzkaller0 entered promiscuous mode [ 162.979054][ T7840] device syzkaller0 entered promiscuous mode [ 163.842442][ T7867] device syzkaller0 entered promiscuous mode [ 163.918143][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 164.669397][ T24] audit: type=1400 audit(1774577668.280:166): avc: denied { create } for pid=7921 comm="syz.4.2148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 165.485521][ T7953] device syzkaller0 left promiscuous mode [ 166.976474][ T8001] device wg2 entered promiscuous mode [ 167.196212][ T8003] device syzkaller0 entered promiscuous mode [ 167.250954][ T8026] device wg2 left promiscuous mode [ 167.279014][ T8044] device wg2 entered promiscuous mode [ 167.365991][ T8054] device pim6reg1 entered promiscuous mode [ 167.407162][ T8056] device wg2 left promiscuous mode [ 167.430291][ T8056] device wg2 entered promiscuous mode [ 168.009088][ T8095] device pim6reg1 entered promiscuous mode [ 168.909278][ T8151] device syzkaller0 entered promiscuous mode [ 169.231439][ T8168] device syzkaller0 entered promiscuous mode [ 170.299994][ T8247] nr0: port 1(macsec0) entered blocking state [ 170.344831][ T8247] nr0: port 1(macsec0) entered disabled state [ 170.402180][ T8247] device macsec0 entered promiscuous mode [ 171.869255][ T8332] device vlan0 entered promiscuous mode [ 172.161202][ T8349] bridge0: port 3(gretap0) entered blocking state [ 172.170608][ T8349] bridge0: port 3(gretap0) entered disabled state [ 172.178083][ T8349] device gretap0 entered promiscuous mode [ 172.184072][ T8349] bridge0: port 3(gretap0) entered blocking state [ 172.190559][ T8349] bridge0: port 3(gretap0) entered forwarding state [ 174.023338][ T8515] device syzkaller0 entered promiscuous mode [ 174.548319][ T8528] sit0: mtu less than device minimum [ 175.594853][ T8562] device syzkaller0 entered promiscuous mode [ 176.636152][ T8634] device syzkaller0 entered promiscuous mode [ 177.367446][ T8702] tap0: tun_chr_ioctl cmd 2148553947 [ 177.378031][ T8702] tap0: tun_chr_ioctl cmd 35108 [ 177.488757][ T8704] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 178.125543][ T8745] device syzkaller0 entered promiscuous mode [ 178.313605][ T24] audit: type=1400 audit(1774577681.930:167): avc: denied { create } for pid=8759 comm="syz.5.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 178.403705][ T8754] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.443867][ T8754] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.454591][ T8754] device bridge_slave_0 entered promiscuous mode [ 178.465312][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.478264][ T8754] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.496845][ T8754] device bridge_slave_1 entered promiscuous mode [ 178.636938][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.644158][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.742245][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.774743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.818260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.888119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.908473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.927647][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.934767][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.959631][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.978292][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.985388][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.008319][ T8773] device vlan0 left promiscuous mode [ 179.062674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.091675][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.101291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.124784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.140639][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.148871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.169206][ T8754] device veth0_vlan entered promiscuous mode [ 179.200847][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.266452][ T8810] device syzkaller0 entered promiscuous mode [ 179.342490][ T8754] device veth1_macvtap entered promiscuous mode [ 179.373034][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.417086][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.466305][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.490997][ T24] audit: type=1400 audit(1774577683.110:168): avc: denied { unmount } for pid=8754 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 180.705339][ T8892] device syzkaller0 entered promiscuous mode [ 180.716014][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 181.117130][ T8929] device macsec0 left promiscuous mode [ 181.127124][ T8929] device veth1_macvtap entered promiscuous mode [ 181.133769][ T8929] device macsec0 entered promiscuous mode [ 181.140294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.388045][ T8937] device syzkaller0 entered promiscuous mode [ 183.233867][ T9049] device vlan0 entered promiscuous mode [ 183.625799][ T9069] device syzkaller0 entered promiscuous mode [ 184.346477][ T9103] device wg2 left promiscuous mode [ 184.415105][ T9101] device wg2 entered promiscuous mode [ 184.638046][ T9105] device macsec0 left promiscuous mode [ 184.753680][ T9105] device veth1_macvtap entered promiscuous mode [ 184.760462][ T9105] device macsec0 entered promiscuous mode [ 184.766766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.142123][ T9159] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 188.195452][ T9192] device syzkaller0 entered promiscuous mode [ 188.712001][ T9217] device syzkaller0 entered promiscuous mode [ 189.459210][ T9248] device xfrm0 entered promiscuous mode [ 193.042518][ T9458] device syzkaller0 entered promiscuous mode [ 193.137228][ T9464] device syzkaller0 entered promiscuous mode [ 193.197338][ T9464] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 193.239700][ T9461] syzkaller0: tun_net_xmit 1280 [ 193.244682][ T9461] syzkaller0: create flow: hash 3523164917 index 1 [ 193.246186][ T9464] syzkaller0: tun_net_xmit 1280 [ 193.294665][ T9464] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 193.307899][ T9464] syzkaller0: Linktype set failed because interface is up [ 193.751546][ T9472] device syzkaller0 entered promiscuous mode [ 193.782306][ T9456] syzkaller0: delete flow: hash 3523164917 index 1 [ 194.184737][ T9519] device wg2 left promiscuous mode [ 194.653193][ T9566] : port 1(ip6gretap0) entered blocking state [ 194.711662][ T9566] : port 1(ip6gretap0) entered disabled state [ 194.730216][ T9566] device ip6gretap0 entered promiscuous mode [ 194.762941][ T9549] device ip6gretap0 left promiscuous mode [ 194.772133][ T9549] : port 1(ip6gretap0) entered disabled state [ 195.655823][ T9632] device syzkaller0 entered promiscuous mode [ 197.786945][ T9723] device syzkaller0 entered promiscuous mode [ 199.705874][ T9811] tap0: tun_chr_ioctl cmd 1074025677 [ 199.711502][ T9811] tap0: linktype set to 778 [ 200.001139][ T24] audit: type=1400 audit(1774577703.620:169): avc: denied { create } for pid=9845 comm="syz.4.2705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 200.551797][ T9875] bridge0: port 3(veth1) entered blocking state [ 200.558506][ T9875] bridge0: port 3(veth1) entered disabled state [ 200.565927][ T9875] device veth1 entered promiscuous mode [ 200.575291][ T9875] bridge0: port 3(veth1) entered blocking state [ 200.581637][ T9875] bridge0: port 3(veth1) entered forwarding state [ 201.214023][ T9923] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.221277][ T9923] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.232207][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.239338][ T9923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.246743][ T9923] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.253942][ T9923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.290417][ T9923] device bridge0 entered promiscuous mode [ 204.061055][T10075] device syzkaller0 entered promiscuous mode [ 204.067249][T10075] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 204.355916][T10101] device syzkaller0 left promiscuous mode [ 205.243726][T10136] device syzkaller0 entered promiscuous mode [ 205.932578][T10166] nr0: port 1(macsec0) entered blocking state [ 205.941168][T10166] nr0: port 1(macsec0) entered disabled state [ 206.176011][T10203] device syzkaller0 entered promiscuous mode [ 206.823746][T10252] bridge0: port 3(veth1) entered disabled state [ 206.831015][T10252] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.840328][T10252] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.034738][T10252] device veth1 left promiscuous mode [ 207.052983][T10252] bridge0: port 3(veth1) entered disabled state [ 207.082750][T10252] device bridge_slave_1 left promiscuous mode [ 207.100316][T10252] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.131878][T10252] device bridge_slave_0 left promiscuous mode [ 207.149268][T10252] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.560066][T10285] lo: mtu less than device minimum [ 208.478376][T10329] device syzkaller0 entered promiscuous mode [ 208.706299][T10339] device syzkaller0 entered promiscuous mode [ 208.863206][T10352] device wg2 entered promiscuous mode [ 210.777967][T10454] device syzkaller0 entered promiscuous mode [ 211.352456][T10464] device syzkaller0 entered promiscuous mode [ 211.590223][T10475] Ÿë: port 1(vlan1) entered blocking state [ 211.598688][T10475] Ÿë: port 1(vlan1) entered disabled state [ 211.632225][T10475] device vlan1 entered promiscuous mode [ 212.393575][T10521] device syzkaller0 entered promiscuous mode [ 214.345482][T10623] tap0: tun_chr_ioctl cmd 1074025677 [ 214.357527][T10623] tap0: linktype set to 270 [ 214.723610][T10636] device syzkaller0 entered promiscuous mode [ 215.234140][T10658] device veth1_macvtap left promiscuous mode [ 215.259902][T10658] device veth1_macvtap entered promiscuous mode [ 215.324801][T10658] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.398527][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.838292][T10731] tap1: tun_chr_ioctl cmd 1074025675 [ 216.851468][T10731] tap1: persist enabled [ 216.864107][T10731] tap1: tun_chr_ioctl cmd 1074025675 [ 216.875043][T10731] tap1: persist enabled [ 217.012836][T10731] device syzkaller0 entered promiscuous mode [ 218.227452][T10814] cgroup: fork rejected by pids controller in /syz5 [ 218.768553][ T24] audit: type=1400 audit(1774577722.390:170): avc: denied { mounton } for pid=10838 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 219.226788][T10838] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.238051][T10838] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.261144][T10838] device bridge_slave_0 entered promiscuous mode [ 219.291063][T10838] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.318532][T10838] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.342647][T10838] device bridge_slave_1 entered promiscuous mode [ 219.664682][T10863] device syzkaller0 entered promiscuous mode [ 219.825035][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.838684][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.852456][T10868] device wg2 entered promiscuous mode [ 219.869493][ T305] bridge0: port 3(gretap0) entered disabled state [ 219.880280][ T305] device gretap0 left promiscuous mode [ 219.885786][ T305] bridge0: port 3(gretap0) entered disabled state [ 219.912612][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.925225][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.941056][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.948163][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.967672][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.983798][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.000030][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.007125][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.039587][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.080360][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.098377][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.124414][T10838] device veth0_vlan entered promiscuous mode [ 220.136236][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.146863][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.157411][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.167550][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.208448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.235934][T10838] device veth1_macvtap entered promiscuous mode [ 220.351451][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.381321][ T305] device vlan1 left promiscuous mode [ 220.386802][ T305] Ÿë: port 1(vlan1) entered disabled state [ 220.417625][ T305] nr0: port 1(macsec0) entered disabled state [ 220.426200][ T305] device bridge_slave_1 left promiscuous mode [ 220.432479][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.440117][ T305] device bridge_slave_0 left promiscuous mode [ 220.451045][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.461073][ T305] device veth1_macvtap left promiscuous mode [ 220.775060][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.033037][T10953] device syzkaller0 entered promiscuous mode [ 223.387091][T11017] device syzkaller0 entered promiscuous mode [ 223.501235][T11022] device syzkaller0 entered promiscuous mode [ 225.947085][T11151] device syzkaller0 entered promiscuous mode [ 228.537670][T11243] device syzkaller0 entered promiscuous mode [ 229.337303][T11263] device wg2 left promiscuous mode [ 230.042122][T11287] device syzkaller0 entered promiscuous mode [ 230.882232][T11316] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.908896][T11316] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.935857][T11316] device bridge_slave_0 entered promiscuous mode [ 230.943174][T11316] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.950294][T11316] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.958143][T11316] device bridge_slave_1 entered promiscuous mode [ 231.187145][T11316] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.194275][T11316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.201646][T11316] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.208705][T11316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.297431][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.316567][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.334320][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.373090][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.388378][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.410227][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.417323][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.444817][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.453469][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.478216][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.485580][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.544756][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.569193][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.597557][T11353] device syzkaller0 entered promiscuous mode [ 231.672743][T11316] device veth0_vlan entered promiscuous mode [ 231.683871][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.692644][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.708280][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.716759][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.737415][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.745853][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.759393][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.767067][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.803374][T11316] device veth1_macvtap entered promiscuous mode [ 231.815694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.828546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.849595][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.878710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.900750][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.944394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.961638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.479216][ T305] nr0: port 1(macsec0) entered disabled state [ 232.489542][ T305] device veth1_macvtap left promiscuous mode [ 232.679717][T11401] bridge0: port 3(gretap0) entered blocking state [ 232.686362][T11401] bridge0: port 3(gretap0) entered disabled state [ 232.718232][T11401] device gretap0 entered promiscuous mode [ 232.729260][T11401] bridge0: port 3(gretap0) entered blocking state [ 232.735748][T11401] bridge0: port 3(gretap0) entered forwarding state [ 234.127638][T11474] device syzkaller0 entered promiscuous mode [ 234.677543][T11492] Â: renamed from pim6reg1 [ 235.104321][T11508] device wg2 entered promiscuous mode [ 236.429878][T11580] sock: sock_set_timeout: `syz.5.3217' (pid 11580) tries to set negative timeout [ 236.518886][ T24] audit: type=1400 audit(1774577740.140:171): avc: denied { create } for pid=11584 comm="syz.2.3218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 236.876838][T11606] device syzkaller0 entered promiscuous mode [ 237.432868][T11637] : port 1(ip6gretap0) entered blocking state [ 237.511525][T11637] : port 1(ip6gretap0) entered disabled state [ 237.679605][T11637] device ip6gretap0 entered promiscuous mode [ 238.893184][T11716] device syzkaller0 entered promiscuous mode [ 240.370538][ T24] audit: type=1400 audit(1774577743.990:172): avc: denied { setattr } for pid=11809 comm="syz.0.3285" path="pipe:[45057]" dev="pipefs" ino=45057 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 241.405602][T11882] device syzkaller0 entered promiscuous mode [ 242.462772][T11952] device syzkaller0 entered promiscuous mode [ 242.573612][T11962] device syzkaller0 entered promiscuous mode [ 242.671750][T11977] device syzkaller0 entered promiscuous mode [ 242.775844][T11983] device syzkaller0 entered promiscuous mode [ 243.051074][T12026] Â: renamed from pim6reg1 [ 243.173863][T12011] syzkaller0: delete flow: hash 4267689882 index 1 [ 243.243757][T12044] device syzkaller0 entered promiscuous mode [ 243.385946][T12068] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.394946][T12068] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.656769][T12068] device bridge_slave_1 left promiscuous mode [ 243.680004][T12068] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.736494][T12068] device bridge_slave_0 left promiscuous mode [ 243.754031][T12068] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.571467][T12133] device syzkaller0 entered promiscuous mode [ 244.693913][T12142] device syzkaller0 entered promiscuous mode [ 244.711884][T12142] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 244.982308][T12163] Ñ26±ÿ: renamed from team_slave_1 [ 247.150446][T12236] device sit0 entered promiscuous mode [ 248.499941][T12269] device syzkaller0 entered promiscuous mode [ 248.787591][T12295] syz.3.3427[12295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.787647][T12295] syz.3.3427[12295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.914683][T12290] -: renamed from syzkaller0 [ 253.570222][T12464] device syzkaller0 entered promiscuous mode [ 254.897004][T12527] device syzkaller0 entered promiscuous mode [ 255.532507][T12564] €Â0: renamed from pim6reg1 [ 255.992498][T12574] device syzkaller0 entered promiscuous mode [ 256.342139][T12580] device syzkaller0 entered promiscuous mode [ 256.825282][T12625] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 258.088596][T12732] device syzkaller0 entered promiscuous mode [ 258.230060][T12738] device wg2 left promiscuous mode [ 258.743995][T12779] device bridge0 entered promiscuous mode [ 259.368441][T12816] device syzkaller0 entered promiscuous mode [ 259.716726][T12831] device syzkaller0 entered promiscuous mode [ 260.186436][T12835] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 260.309962][T12835] device syzkaller0 entered promiscuous mode [ 260.943046][T12856] ÿÿÿÿÿÿ: renamed from vlan1 [ 261.231398][T12858] device syzkaller0 entered promiscuous mode [ 261.286678][T12862] device lo entered promiscuous mode [ 261.292170][T12862] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 261.903951][T12885] device veth0_vlan left promiscuous mode [ 261.966202][T12885] device veth0_vlan entered promiscuous mode [ 262.018879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.031696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.048128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 265.313521][T13039] device syzkaller0 entered promiscuous mode [ 265.341373][T13041] syzkaller0: create flow: hash 4267689882 index 0 [ 265.379372][ T1187] syzkaller0: tun_net_xmit 48 [ 265.478142][T13039] syzkaller0 (unregistered): delete flow: hash 4267689882 index 0 [ 265.671816][T13049] : renamed from bond_slave_0 [ 266.093294][T13071] device syzkaller0 entered promiscuous mode [ 266.827658][T13124] Ÿë: port 1(veth0_to_team) entered blocking state [ 266.850762][T13124] Ÿë: port 1(veth0_to_team) entered disabled state [ 266.867207][T13124] device veth0_to_team entered promiscuous mode [ 267.886899][T13192] device syzkaller0 entered promiscuous mode [ 269.502883][T13264] device syzkaller0 entered promiscuous mode [ 269.765939][T13290] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 269.899054][T13290] device syzkaller0 entered promiscuous mode [ 270.707088][T13302] Â: renamed from pim6reg1 [ 270.780023][T13311] device sit0 left promiscuous mode [ 271.310994][ T24] audit: type=1400 audit(1774577774.920:173): avc: denied { create } for pid=13344 comm="syz.5.3746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 273.387147][T13469] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.395849][T13469] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.430246][T13469] device bridge0 left promiscuous mode [ 273.589714][T13470] device bridge_slave_1 left promiscuous mode [ 273.608067][T13470] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.640071][T13470] device bridge_slave_0 left promiscuous mode [ 273.666647][T13470] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.314739][T13687] device syzkaller0 entered promiscuous mode [ 276.429888][ T305] device ip6gretap0 left promiscuous mode [ 276.435691][ T305] : port 1(ip6gretap0) entered disabled state [ 276.514059][T13691] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.522336][T13691] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.530220][T13691] device bridge_slave_0 entered promiscuous mode [ 276.548782][T13691] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.557153][T13691] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.565641][T13691] device bridge_slave_1 entered promiscuous mode [ 276.890820][T13691] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.897935][T13691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.905239][T13691] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.912321][T13691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.943617][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.951504][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.965358][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.978455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.987243][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.994336][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.002235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.010740][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.017823][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.034394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.074957][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.085643][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.146448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.158245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.212781][T13691] device veth0_vlan entered promiscuous mode [ 277.278880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.290297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.385823][T13691] device veth1_macvtap entered promiscuous mode [ 277.426945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.444020][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.492185][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.545638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.597456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.749770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.775277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.834518][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.892022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.998598][T13766] device syzkaller0 entered promiscuous mode [ 278.168278][ T305] device veth1_macvtap left promiscuous mode [ 278.174380][ T305] device veth0_vlan left promiscuous mode [ 278.796815][T13797] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 279.331729][T13852] IPv6: ADDRCONF(NETDEV_CHANGE): ip6tnl0: link becomes ready [ 280.284591][T13908] device syzkaller0 entered promiscuous mode [ 280.584424][T13925] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 280.700494][T13927] device syzkaller0 entered promiscuous mode [ 281.427928][T13973] @ÿ: renamed from bond_slave_0 [ 282.734044][T14020] device macsec0 entered promiscuous mode [ 284.467643][T14126] device syzkaller0 entered promiscuous mode [ 285.092192][T14163] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 285.194988][T14171] device syzkaller0 entered promiscuous mode [ 287.293608][T14299] device syzkaller0 entered promiscuous mode [ 288.070627][T14353] device dummy0 entered promiscuous mode [ 288.105125][T14353] device syzkaller0 entered promiscuous mode [ 288.229851][T14370] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.237253][T14370] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.268122][T14362] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.275202][T14362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.282546][T14362] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.289629][T14362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.308590][T14362] device bridge0 entered promiscuous mode [ 288.550936][T14387] device wg2 entered promiscuous mode [ 289.330238][T14429] IPv6: pim6reg1: Disabled Multicast RS [ 290.725957][T14501] device syzkaller0 entered promiscuous mode [ 290.777445][T14504] tap0: tun_chr_ioctl cmd 1074025677 [ 290.808090][T14504] tap0: linktype set to 805 [ 290.812824][ T283] syzkaller0: tun_net_xmit 48 [ 293.330215][T14628] tap0: tun_chr_ioctl cmd 1074025680 [ 293.538070][T14641] device syzkaller0 entered promiscuous mode [ 295.720494][T14772] device wg2 left promiscuous mode [ 295.841733][T14772] device wg2 entered promiscuous mode [ 296.652377][T14811] device wg2 left promiscuous mode [ 297.236917][T14826] device syzkaller0 entered promiscuous mode [ 298.652840][T14849] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.662123][T14849] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.669926][T14849] device bridge_slave_0 entered promiscuous mode [ 298.699620][T14849] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.707197][T14849] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.722049][T14849] device bridge_slave_1 entered promiscuous mode [ 298.792840][T11316] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 298.962517][T14849] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.969706][T14849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.976982][T14849] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.984047][T14849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.041242][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.052001][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.136156][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.145647][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.169755][ T305] bridge0: port 3(gretap0) entered disabled state [ 299.178785][ T305] device gretap0 left promiscuous mode [ 299.184290][ T305] bridge0: port 3(gretap0) entered disabled state [ 299.219592][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.229949][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.238291][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.245507][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.264864][T14968] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.272195][T14968] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.338579][T14968] device bridge_slave_0 entered promiscuous mode [ 299.418024][T14968] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.425098][T14968] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.432688][T14968] device bridge_slave_1 entered promiscuous mode [ 299.439902][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.448448][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.456671][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.463735][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.503270][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 299.512366][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.558103][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 299.566660][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.581764][T14849] device veth0_vlan entered promiscuous mode [ 299.656317][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 299.664888][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.673374][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 299.681408][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.689842][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.697421][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.709093][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.717368][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.726081][ T305] device veth0_to_team left promiscuous mode [ 299.732402][ T305] Ÿë: port 1(veth0_to_team) entered disabled state [ 299.740079][ T305] device bridge_slave_1 left promiscuous mode [ 299.746262][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.754284][ T305] device bridge_slave_0 left promiscuous mode [ 299.760473][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.768606][ T305] device veth1_macvtap left promiscuous mode [ 299.774652][ T305] device veth0_vlan left promiscuous mode [ 299.917368][T14849] device veth1_macvtap entered promiscuous mode [ 299.937435][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.945450][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.954025][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.974354][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.984176][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.026162][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.037427][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.060262][ T560] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.067355][ T560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.080564][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.093460][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.117664][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.146532][ T560] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.153748][ T560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.202472][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.211430][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.219830][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 300.244614][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.274342][T14968] device veth0_vlan entered promiscuous mode [ 300.286837][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.295718][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.304432][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.312801][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.321461][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.329095][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.343774][T14968] device veth1_macvtap entered promiscuous mode [ 300.353823][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.368940][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.378119][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.392161][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.403321][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.432266][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.470435][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.159741][ T305] device veth0_vlan left promiscuous mode [ 302.075539][T15053] device syzkaller0 entered promiscuous mode [ 305.537498][T15186] device syzkaller0 entered promiscuous mode [ 305.874552][T15195] ÿÿÿÿÿÿ: renamed from vlan1 [ 305.924572][T15205] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.931759][T15205] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.942574][T15205] device bridge0 left promiscuous mode [ 306.917975][T15285] ªªªªªª™™: renamed from vlan0 [ 306.949023][T15287] tap0: tun_chr_ioctl cmd 1074812118 [ 307.034953][T15294] device syzkaller0 entered promiscuous mode [ 308.947422][T15405] tap0: tun_chr_ioctl cmd 1074025677 [ 308.991967][T15405] tap0: linktype set to 6 [ 310.187134][T15432] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.194434][T15432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.201845][T15432] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.208952][T15432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.238213][T15432] device bridge0 entered promiscuous mode [ 310.738802][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.418419][T15485] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 311.478110][T15485] syzkaller0: linktype set to 0 [ 312.108100][T15541] device syzkaller0 entered promiscuous mode [ 312.395781][T15561] device syzkaller0 entered promiscuous mode [ 313.164147][T15586] device syzkaller0 entered promiscuous mode [ 313.636812][T15627] €Â0: renamed from pim6reg1 [ 314.456947][T15674] tap1: tun_chr_ioctl cmd 35108 [ 316.301450][T15754] device syzkaller0 entered promiscuous mode [ 316.889084][T15772] syz.0.4401[15772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.891171][T15772] syz.0.4401[15772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.238710][T15806] device syzkaller0 entered promiscuous mode [ 318.052548][T15859] erspan0: refused to change device tx_queue_len [ 320.161388][T15963] device veth0_vlan left promiscuous mode [ 320.187673][T15963] device veth0_vlan entered promiscuous mode [ 320.335159][T15062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.353936][T15062] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.405233][T15062] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.889615][T15990] device wg2 entered promiscuous mode [ 320.995672][T15996] device syzkaller0 entered promiscuous mode [ 321.011712][T15996] syzkaller0: tun_net_xmit 1280 [ 322.232169][T16052] tap1: tun_chr_ioctl cmd 2147767520 [ 322.724312][T16092] device syzkaller0 entered promiscuous mode [ 323.010274][T16119] device syzkaller0 entered promiscuous mode [ 323.039773][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 323.176893][T16127] device syzkaller0 entered promiscuous mode [ 328.177584][ T24] audit: type=1400 audit(1774577831.790:174): avc: denied { create } for pid=16424 comm="syz.2.4595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 329.128804][ T8400] ------------[ cut here ]------------ [ 329.134335][ T8400] kernel BUG at kernel/bpf/arraymap.c:993! [ 329.152417][ T8400] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 329.158538][ T8400] CPU: 0 PID: 8400 Comm: kworker/0:42 Tainted: G W syzkaller #0 [ 329.167502][ T8400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 329.177688][ T8400] Workqueue: events prog_array_map_clear_deferred [ 329.184242][ T8400] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 329.190501][ T8400] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 329.210130][ T8400] RSP: 0018:ffffc90002ee7c18 EFLAGS: 00010293 [ 329.216229][ T8400] RAX: ffffffff817b4f8b RBX: ffff88810b95f1d0 RCX: ffff888134ebe2c0 [ 329.224218][ T8400] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 329.232207][ T8400] RBP: ffffc90002ee7c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 329.240204][ T8400] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 329.248268][ T8400] R13: ffff8881273eb380 R14: 0000000000000001 R15: ffff8881273eb300 [ 329.256247][ T8400] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 329.265184][ T8400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 329.271793][ T8400] CR2: 0000000000000040 CR3: 000000010d68e000 CR4: 00000000003506b0 [ 329.279772][ T8400] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 329.287863][ T8400] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 329.295851][ T8400] Call Trace: [ 329.299266][ T8400] ? bpf_prog_a37818a34c75cf37+0xb/0x30c [ 329.304912][ T8400] fd_array_map_delete_elem+0x14c/0x250 [ 329.310490][ T8400] prog_array_map_clear_deferred+0x9e/0x140 [ 329.316438][ T8400] process_one_work+0x6e1/0xba0 [ 329.321307][ T8400] worker_thread+0xa6a/0x13c0 [ 329.326002][ T8400] kthread+0x346/0x3d0 [ 329.330072][ T8400] ? worker_clr_flags+0x190/0x190 [ 329.335104][ T8400] ? kthread_blkcg+0xd0/0xd0 [ 329.339697][ T8400] ret_from_fork+0x1f/0x30 [ 329.344111][ T8400] Modules linked in: [ 329.388367][ T8400] ---[ end trace 8a306fd9f10cc582 ]--- [ 329.393938][ T8400] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 329.400429][ T8400] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 329.420374][ T8400] RSP: 0018:ffffc90002ee7c18 EFLAGS: 00010293 [ 329.426449][ T8400] RAX: ffffffff817b4f8b RBX: ffff88810b95f1d0 RCX: ffff888134ebe2c0 [ 329.434468][ T8400] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 329.442617][ T8400] RBP: ffffc90002ee7c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 329.450733][ T8400] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 329.458774][ T8400] R13: ffff8881273eb380 R14: 0000000000000001 R15: ffff8881273eb300 [ 329.466778][ T8400] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 329.475887][ T8400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 329.482525][ T8400] CR2: 0000200000002000 CR3: 00000001519c5000 CR4: 00000000003506b0 [ 329.490550][ T8400] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 329.501110][ T8400] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 329.509173][ T8400] Kernel panic - not syncing: Fatal exception [ 329.512912][ T24] audit: type=1400 audit(1774577833.130:175): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 329.515466][ T8400] Kernel Offset: disabled [ 329.541481][ T8400] Rebooting in 86400 seconds..