last executing test programs: 5.413964159s ago: executing program 3 (id=1158): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000001340)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86\xae\xa5\xea?\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc8\x8615') r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x3) write$cgroup_devices(r0, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) recvmsg$unix(r1, &(0x7f0000002880)={&(0x7f0000001240)=@abs, 0x6e, &(0x7f0000002800)=[{&(0x7f00000025c0)=""/171, 0xab}, {&(0x7f0000002680)=""/190, 0xbe}, {&(0x7f0000002740)=""/157, 0x9d}], 0x3, &(0x7f0000002840)=[@rights={{0x10}}], 0x10}, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) 4.167629538s ago: executing program 3 (id=1166): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}, {0x85, 0x0, 0x0, 0x2d}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000040000000c0000000b"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) 3.966196154s ago: executing program 3 (id=1170): mkdir(&(0x7f0000000000)='./file\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x92f5e}, 0x6d) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file/file0/..//file0/file0\x00', 0x0) 3.889040467s ago: executing program 3 (id=1174): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000003000000040000000800000088000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x50) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x79, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="05830000000000007111ae00000000008510000002000000850000000500000095000000000000009500a505000000001f812466563b479fdec8b7ae0aa9e83444007e82f88f92f84295ad6a8344f7f78be5ca66da6e444313979a19deabb9bf09ba60"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x6}, 0x94) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b00000000000000000000000e00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00v\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000020000000300"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffb}, 0x94) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES16=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r8, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000bc0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x59, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) sendmsg(r11, &(0x7f0000000080)={0x0, 0x3b, 0x0}, 0x0) (async, rerun: 64) close(r11) (async, rerun: 64) close(r10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0x32, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000005000000000000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000ffffffffffffffff00060000008600000097b700000000000000020000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018000000ad00000000000000800000008520000004000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x9dd, 0xf3, &(0x7f0000000440)=""/243, 0x40f00, 0x20, '\x00', r8, @cgroup_sysctl, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x8, 0xfffffff6, 0x2b09}, 0x10, r9, 0xffffffffffffffff, 0xa, 0x0, &(0x7f00000008c0)=[{0x0, 0x5, 0xd, 0x5}, {0x5, 0x4, 0xc}, {0xffffffff, 0x3, 0x7, 0x1}, {0x4, 0x3, 0xf, 0x4}, {0x2, 0x4, 0xa, 0xd}, {0x0, 0x4, 0x2, 0x6}, {0x4, 0x1, 0xa, 0xb}, {0x4, 0x3, 0x1, 0xa}, {0x3, 0x2, 0xf, 0x9}, {0x1, 0x1, 0x3, 0x4}], 0x10, 0x5}, 0x94) (async, rerun: 32) bpf$ITER_CREATE(0x21, &(0x7f0000000b80), 0x8) (async, rerun: 32) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40305839, &(0x7f0000000040)) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x38, 0x15, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb0ea, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xfffffffffffffffe, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0xb, 0x0, 0x4, 0x976e0cd8bef90328, 0x11}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x76, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0xb8}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x54, &(0x7f0000000100)=""/84, 0x40f00, 0x20, '\x00', r3, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x5, 0x6, 0x9}, 0x10, r9, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, r12], 0x0, 0x10, 0x7}, 0x94) (rerun: 32) 3.773602301s ago: executing program 3 (id=1177): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa10000000000000701"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x4, &(0x7f0000001040)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYRES16=r3], 0x0, 0xa7, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x10, 0x10}, 0x94) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff0000000071103000000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) socketpair(0x9, 0x1, 0x8, &(0x7f0000000040)) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000000000000000000071180a000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.77322683s ago: executing program 1 (id=1178): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.608892736s ago: executing program 1 (id=1179): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x200040d0}, 0x4004) sendmsg$tipc(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x8000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.168757971s ago: executing program 1 (id=1182): r0 = syz_clone(0x820000, &(0x7f0000000000)="ce3add9e6c8bf2aaeb5e345eb5f77bb76693bea388629e6978cc4bc2de5dc5d2fd55cc75396df17d3592a44b9dd7e4cad72a822dfad3546cfc79960780899ed3e4d57d3acb69282936515e86ccb4d1f2cb9bd62b37b93e160de2fd4ea435e46f11fdb606f189d9d1c55a65458820ca5d25cbd71453e8b2e1d457433a3290fd77b68e3b56e7ee9bf60aad5737fea5f1c5", 0x90, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="2a9151a72e6227e39419bbfdaaf0ccf9d3258086991b5434d88e2761db680613037d7dfa1a755492b4e62afc56c889c5ae3b56ca13105fa2c1272a5504a1dd9abb69fea4a9f435c9dd4fe8f4b70892248a2a1adbd0d0b1ea34a4ea93bec18808bcecb6b3c442181e6ba72cd2144abce6c636232d7fddbc4910d49b5d5a97f3f660d3b55b29f018ccdf35315392c2f0e26bc1d5b654fd8cf85027c660bfea6cf73a8182d0a160054fda949b812cde73e4") r1 = getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x7f, 0x0, r3, 0x561b, '\x00', r4, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x2c, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0x5, 0x0, 0xa, 0xfffffffffffffff0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, @tail_call, @map_val={0x18, 0x9, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xf}, @generic={0x7f, 0x4, 0x9, 0x7343, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x660}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_val={0x18, 0x2, 0x2, 0x0, r5}, @jmp={0x5, 0x0, 0x8, 0xb, 0xc, 0x8, 0xfffffffffffffffc}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='syzkaller\x00', 0x8000, 0x23, &(0x7f00000005c0)=""/35, 0x40f00, 0x8, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0xf, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000680)=[r3, r3, r3, r5, 0x1, r3], &(0x7f00000006c0)=[{0x0, 0x2, 0xd, 0xc}], 0x10, 0x7}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000007c0)=@generic={&(0x7f00000003c0)='./file0\x00', r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000840)=r6, 0x4) r8 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x3, 0xf, 0x0, 0x7, 0x0, 0x9, 0x68101, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xfffffffffffffffd}, 0x197002, 0x2, 0x8000, 0x1, 0x3, 0x81, 0x0, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1a) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000900)='$\x16\x9f\x00') socketpair(0x3, 0x3, 0x0, &(0x7f0000000940)) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={0xffffffffffffffff, r3}, 0xc) close(r2) r9 = perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0xb, 0x1, 0x5, 0xc, 0x0, 0x8, 0x800, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000a40), 0x9}, 0x2200, 0xdb, 0x0, 0x5, 0x6, 0x4, 0x4, 0x0, 0x0, 0x0, 0x40}, r0, 0x2, r3, 0x3) r10 = perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x8, 0x6, 0x4, 0x4, 0x0, 0xfffffffffffffff7, 0x1, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x623}, 0x2410, 0x31e, 0x9, 0x5, 0x2, 0x5, 0x7ff, 0x0, 0xcc0c, 0x0, 0x5}, r1, 0xf, r9, 0x4) ioctl$PERF_EVENT_IOC_RESET(r10, 0x2403, 0x8) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00), 0x8) write$cgroup_int(r11, &(0x7f0000000b40)=0x7, 0x12) ioctl$TUNSETIFINDEX(r11, 0x400454da, &(0x7f0000000b80)=r4) syz_open_procfs$namespace(r1, &(0x7f0000000bc0)='ns/mnt\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d00)={{r11, 0xffffffffffffffff}, &(0x7f0000000c80), &(0x7f0000000cc0)=r6}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d40)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x7, '\x00', r4, r11, 0x4, 0x1, 0x7ff}, 0x50) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0xb, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, r10, 0x5, 0x0, 0x3}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e40)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x4, '\x00', r4, r11, 0x5, 0x3, 0x1}, 0x50) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000ec0)={'syz_tun\x00', @random="a767e5cc10fa"}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', r4, r11, 0x3, 0x4, 0x4}, 0x50) 1.998185866s ago: executing program 0 (id=1184): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.events\x00', 0x26e1, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'macsec0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000200)=[{0x40, 0x4, 0xb, 0xfffffff9}, {0x1, 0x0, 0x5, 0x7f}]}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8941, &(0x7f0000000080)) r6 = openat$cgroup_int(r4, &(0x7f00000001c0)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC], 0x27) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x82, 0x0, 0x41) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r2], 0xcfa4) 1.995317126s ago: executing program 1 (id=1185): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000001640)={r2, 0x0, 0x91, 0x0, &(0x7f0000000240)="885246fa625755476a3c659537f3f4e72db621eb2c5e5b296f21548384ff5dc27c1bb5711ee5ee86b05e99df7668d491e93c36a4c90f106c64c24c91b9b31b231f7cd26681099336d0da78ae54cccdef73a83045d962862dae0b88a5f7c6079702675ae0fe99dcc116a54d67de42b57b83f4e86018f1145bf701d60e67817395f4d3483ca27c3301be390c656b3fa25aaf", 0x0, 0xe, 0x0, 0xa5, 0x0, &(0x7f0000001580)="0af870b838ea7e3daebe191185766ddb87ee8cd4e8c027fac641f8dfbc98772a831b864c5f11ccb28706ed408df3a89700dbe1f994c4bfb5dc3d10d533507d22a72284264a67b51e2587f0b423e6dbda79c342eed387078525757e3103026ee4c821193a9f07979927dda555e0695cf2491761c6961f306b80a6384fa600089cffd87fe5c188814d0d3b22af974e7daa09cb9d7cf06fb635a12f497077cc1cf3df39ee396d", 0x0, 0x2, 0x0, 0xfffffff7}, 0x50) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x4008, r0}, 0x18) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x3, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000300), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000005000000020000000700000000000000", @ANYRES32=0x1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000ed0000000000000000"], 0x50) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x2}, 0x0, 0x4, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socketpair(0x15, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r4, &(0x7f0000001e40)=ANY=[@ANYBLOB="766c616e30323800086f5bcb76b9881de57fa5f5b33e4bf8cc5c5994b2d501667edf9efe"], 0x8) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r11, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001940)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000001a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x27, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x2, 0x1e, &(0x7f0000001700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x719}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001800)='GPL\x00', 0x2, 0xca, &(0x7f0000001840)=""/202, 0x41000, 0x0, '\x00', r12, @fallback=0x36, r2, 0x8, &(0x7f0000001c40)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001c80)={0x0, 0xb, 0x1ff, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000001cc0)=[r2, r2], &(0x7f0000001d00)=[{0x3, 0x1, 0xa, 0x4}, {0x3, 0x2, 0x9, 0x2}, {0x3, 0x2, 0x7, 0x4}, {0x3, 0x4, 0xa, 0x6}, {0x1, 0x3, 0x3, 0x2}, {0x5, 0x5, 0xb, 0x5}, {0x4, 0x4, 0xb, 0x1}], 0x10, 0x7}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000040)=@generic={&(0x7f0000000700)='./file0\x00', r13}, 0x18) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_pressure(r2, &(0x7f00000016c0)='io.pressure\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r14, 0x1, 0xe, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r3, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x18, &(0x7f0000001ec0)=ANY=[@ANYBLOB="18000000f9ffffff000000000800000018110000", @ANYRES32, @ANYRES16=r10, @ANYRES32=0x1, @ANYRES64=r6], &(0x7f00000000c0)='GPL\x00', 0x8000, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001400)={0x5, 0xe, 0x401, 0x83112e3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000001480)=[{0x0, 0x2, 0x3, 0xc}, {0x2, 0x3, 0x4, 0xa}]}, 0x94) 1.969883347s ago: executing program 4 (id=1186): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) (async) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0xc, 0x82a6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0xf, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffffb}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 1.941202689s ago: executing program 0 (id=1187): bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x7aa80, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={0x0, &(0x7f0000003680)=""/4091, 0x3f, 0xffb, 0x1}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000000}, 0x10}, 0x94) 1.845124981s ago: executing program 4 (id=1189): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0)=0x8, 0x12) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000100), 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x15, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xb}, @call={0x85, 0x0, 0x0, 0x5}, @exit, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x42}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0xd1, &(0x7f00000002c0)=""/209, 0x41000, 0x6, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xf, 0x9, 0x1}, 0x10, 0x14243, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x4, 0x4, 0x2, 0xa}], 0x10, 0xfffffc00}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0x34, 0x1, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0], &(0x7f0000000640)=[0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000700)={0x5, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@cgroup=r3, r4, 0x24, 0x2020, 0x0, @void, @void, @value=r7, @void, r6}, 0x20) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000000740)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={@map=r5, r5, 0x1f, 0x4, r4, @void, @value=r4, @void, @void, r6}, 0x20) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000800)=@generic={&(0x7f00000007c0)='./file0\x00'}, 0x18) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000880)=r7, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)={@cgroup=r3, r8, 0xc, 0x2000, 0x0, @value=r9, @void, @void, @void, r6}, 0x20) openat$cgroup_int(r3, &(0x7f00000008c0)='memory.low\x00', 0x2, 0x0) socketpair(0x1d, 0x800, 0x10000, &(0x7f0000000900)) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000940)) r10 = openat$cgroup_ro(r3, &(0x7f0000000980)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_type(r10, &(0x7f00000009c0), 0x2, 0x0) openat$cgroup_procs(r5, &(0x7f0000000a00)='tasks\x00', 0x2, 0x0) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@generic={&(0x7f0000000a40)='./file0\x00'}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r4, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], 0x0, 0xf6, &(0x7f0000000bc0)=[{}, {}], 0x10, 0x10, &(0x7f0000000c00), &(0x7f0000000c40), 0x8, 0xbe, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)={@ifindex=r12, r11, 0x21, 0x41, r8, @void, @value=r10, @void, @void, r6}, 0x20) r14 = openat$cgroup_ro(r3, &(0x7f0000000e00)='net_prio.prioidx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x12, 0x5, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, [@map_fd={0x18, 0x3, 0x1, 0x0, r14}]}, &(0x7f0000000e80)='syzkaller\x00', 0xf, 0x49, &(0x7f0000000ec0)=""/73, 0x41000, 0x40, '\x00', r12, @fallback=0x10, r14, 0x8, &(0x7f0000000f40)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000f80)={0x1, 0x5, 0x7, 0x10001}, 0x10, 0x0, r11, 0x2, &(0x7f0000000fc0)=[r14, r14, r5, r5, r10, r10], &(0x7f0000001000)=[{0x4, 0x4, 0x10, 0x9}, {0x1, 0x3, 0x8, 0x6}], 0x10, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000001100)={'syz_tun\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1c, 0x18, &(0x7f0000001140)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0xc, 0x4, 0x3, 0x6, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}], &(0x7f0000001200)='syzkaller\x00', 0x8000, 0xcb, &(0x7f0000001240)=""/203, 0x1e00, 0x4, '\x00', r12, @fallback=0x36, r14, 0x8, &(0x7f0000001340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001380)={0x5, 0xe, 0x4, 0x1}, 0x10, r13, 0xffffffffffffffff, 0xa, &(0x7f00000013c0), &(0x7f0000001400)=[{0x2, 0x5, 0xd, 0x7}, {0x3, 0x3, 0x3, 0x5}, {0x3, 0x4, 0x10, 0x5}, {0x1, 0x3, 0x3, 0x4}, {0x1, 0x5, 0xc, 0x5}, {0x3, 0x7, 0xb, 0x3}, {0x5, 0x5, 0x6, 0x671552c22cf41a20}, {0x3, 0x1, 0xb, 0x2}, {0x2, 0x1, 0x2, 0x5}, {0x2, 0x1, 0x7, 0x7}], 0x10, 0xdf}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001680)={r5, &(0x7f0000001580)="6451658297e88c237a768f0f510887837788cf131db5f9f079f50da67677192ef585bb3a18ff72274cc5a13c7cc0fd4d8938e5566a9bba040f7a97242b6cd69f92a4b5848294a47e29c6256215480a87734a7f0d1e406c5105371a029a409214e9148918991673393e353b91bd3e5f90e5eb47d482760fb9d80d1091aeb6c96137e06df49a68462c4ea2e4a154ca1a7848b26ffcadedff742647a33cac2121f83348bb95d2bff2c9b46fb96d708c95a58f8e397cbea2cb47a8cca66057e8beefb23dfc4925636eaebcfbca38a1c9466157244b0dd460308b024aad9ac2"}, 0x20) 1.842251141s ago: executing program 0 (id=1190): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32, @ANYRES16=r2], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x2, 0x12) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@func_proto, @union={0x2, 0x0, 0x0, 0x5, 0x1}, @var={0x1, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000002540)=""/4096, 0x44, 0x1000, 0x4}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="0300884f0200000000000000a0320000000000000000000000002000"], 0x50) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r9}, 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xffec) write$cgroup_netprio_ifpriomap(r10, 0x0, 0x12) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r4, 0x4, r6}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x9, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r13}, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r12, r10, 0x11, 0x22, r9, @void, @void, @void, @value=r13}, 0x20) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000240)=r11, 0x4) 1.734139025s ago: executing program 3 (id=1192): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x800000, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x55}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0xa, 0x3, 0x0, 0x92bd, 0x585c, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_config_ext={0x0, 0x3ad6}, 0x40, 0x0, 0x7, 0x6, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x4000020000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x15, &(0x7f0000000ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x98629, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x1, @perf_config_ext={0x9, 0x80000000000}, 0x8004, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0xc, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x6, 0x4, 0x50, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r9, &(0x7f0000000380), &(0x7f00000003c0)=""/247}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.733175295s ago: executing program 4 (id=1193): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x100820, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff0000000000000000851000000200000085000000070000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000100)=r6) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x100820, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff0000000000000000851000000200000085000000070000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000100)=r6) (async) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async) 1.731894005s ago: executing program 0 (id=1194): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000b"], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r5}, 0xc) close(r2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10, 0x0}, 0x40000) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200)="5752b28bf105e96748f1747bc373f6ea048d8ae418ac652914a48d3be48ee75fecf1af9721115c92eea59a993329f45c828c4d571a72721a2ae0789f7a2e9e06f89441b33fecb31cda2103", &(0x7f0000000280)=""/146}, 0x20) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x5452, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86\xae\xa5\xea?\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c"], 0x0, 0xfffffffffffffe3d}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000600000000000000000000020300000000000000000000020000000004"], 0x0, 0x42, 0x0, 0x1, 0xe988}, 0x28) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) 1.348089237s ago: executing program 1 (id=1197): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@call={0x85, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r0}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000b"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000100"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0xf, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xfffffff9}, {{0x18, 0x4, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5a}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x7}}, [], {{0x6, 0x1, 0x3, 0x8}, {0x6, 0x0, 0x2, 0x8}, {0x85, 0x0, 0x0, 0x6c}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r3}, 0xc) 1.098105895s ago: executing program 1 (id=1198): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x3, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000004000000850000006100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000bc02000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x5, 0x0, r3, 0x92e0, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x50) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/244, 0xf4}], 0x1, 0x0, 0x0, 0x200000}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8911, &(0x7f0000000080)) mkdirat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x1ff) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 861.570102ms ago: executing program 0 (id=1199): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="fdffffff0f000000020000000000000000000000a488ec10a49c9f9f8da54b9785547bfb8557685395cd33d87c40a0ec6ab6cb1bb47f4453564255e3ed8561e066d646a6b6089a34e66fc9434339454540e0bd6f8e3718d6e99841d5de9df8168602a1d7c622b14b4521eae4e4b4a0e881537c79c5bb3da4b57f03a4f8d230f2b8cbb81d8e1846e8c40f7c63d4d8f5190f80bd1154a463", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000400"/28], 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000180100002020642500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x7b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="85e3de50d5b66bd8f1ff08251a6c", 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 819.161774ms ago: executing program 4 (id=1200): r0 = perf_event_open$cgroup(&(0x7f0000001140)={0x5, 0x80, 0x5, 0x3, 0x49, 0x8, 0x0, 0xe, 0x20201, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf, 0x0, @perf_bp={&(0x7f0000001080), 0x4}, 0x10030, 0x9, 0xfa000000, 0x7, 0x2, 0x5, 0xff, 0x0, 0x82, 0x0, 0xf6b4}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x11, 0x3, &(0x7f00000011c0)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000001200)='syzkaller\x00', 0x3, 0x1b, &(0x7f0000001240)=""/27, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001280)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000012c0)={0x0, 0x5, 0x80000000, 0x7fff}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001300)=[{0x4, 0x3, 0x1, 0x9}, {0x4, 0x3, 0xf, 0x8}, {0x3, 0x4, 0xa}, {0x1, 0x1, 0x9, 0xb}]}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffc00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x3) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0xb}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x40, 0x3, 0x0, 0x0, 0x0, 0x5, 0x400, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x0, 0x4, 0x401, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xc, &(0x7f00000000c0)=r4, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r5, 0x0, 0xfffffffffffffd38, &(0x7f0000001400)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000001000), 0x8) openat$cgroup_procs(r6, &(0x7f0000001040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='cpu<=0||!') 764.080805ms ago: executing program 2 (id=1201): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x5, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200}, [@call={0x85, 0x0, 0x0, 0x23}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1e, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x40305839, &(0x7f0000000540)={'macsec0\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 654.796919ms ago: executing program 2 (id=1202): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x33, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@float={0x5, 0x0, 0x0, 0x10, 0x2}, @volatile={0x5, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x0, 0x30, 0x30, 0x2e, 0x5f, 0x61]}}, &(0x7f0000000240)=""/47, 0x45, 0x2f, 0x1, 0x8}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x6, 0x8, 0x8, 0x40}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0400000007000000030000000400000008000000", @ANYRES32=0x1, @ANYBLOB='\b\x00'/20, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="04000000040000000300000000000000000000000000000000000000aa0f3e0711f8814130702de845ba9f56bd74b05e6c0e552eda5c5977823ec1da547d"], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x33, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@float={0x5, 0x0, 0x0, 0x10, 0x2}, @volatile={0x5, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x0, 0x30, 0x30, 0x2e, 0x5f, 0x61]}}, &(0x7f0000000240)=""/47, 0x45, 0x2f, 0x1, 0x8}, 0x28) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x6, 0x8, 0x8, 0x40}, 0x50) (async) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0400000007000000030000000400000008000000", @ANYRES32=0x1, @ANYBLOB='\b\x00'/20, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="04000000040000000300000000000000000000000000000000000000aa0f3e0711f8814130702de845ba9f56bd74b05e6c0e552eda5c5977823ec1da547d"], 0x50) (async) 335.798419ms ago: executing program 2 (id=1203): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x627, 0xa85, 0x1, 0x10043, 0xffffffffffffffff, 0x8, '\x00', r0, r1, 0x4, 0x1, 0x1, 0x7, @void, @value, @value=r2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xf, 0x20, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x86}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x26, 0x0, 0x0, 0x41000, 0xa, '\x00', r4, @cgroup_device=0x6, r1, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x8, 0x7fffffff, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000440)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3], &(0x7f0000000480)=[{0x5, 0x1, 0x1, 0xa}, {0x0, 0x1, 0x3, 0x7}, {0x0, 0x1, 0xb, 0x4}, {0x5, 0x2, 0x0, 0x9e03fa40738200bb}, {0x1, 0x2, 0x7}], 0x10, 0x7ff}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r6, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000600)="0e711bf7d9eed425628f60e221322f1b1596b42baefdd6bc8d52da92c3d19107c90f90ba5e14f5c3ee053639180872a78b13918573e99ead9aea8c24139f79c23e2ab69ea48d781fcb129d1a0cbcac4a07fdb28f21ad9c0e1fc83643265d", 0x5e}, {&(0x7f0000000680)="66e94c81eb9ffd0278f2707ef30e18502655980ea699c348fd17031406822bc1c44b3100aa690d93ce59a847ec49a66c51f0b31881d7c15d4d5f0f0dea5b43bd54abe0839aaa6cfeaeef1089647e9dc0eb08c2186f56d1855f3c558f3d7dbf96387d32ce43b26f06eabb46e8290c0e0c8d1ed1615d28c02102715ee86ad1b73d044e51ba2e756f8a823412dec284533af4f02e831681117632cdc1af222e07a38e55f84382f80e85f2c51748a014cd4a2efef70dc2529019e48fef98eea287aa75efd3307c230ce5524b1e345fc23984c4e0fd1c9390b2200abb396285259023b6d2e2", 0xe3}, {&(0x7f0000000780)="819a2f26afebd3e6a6ee57ead68b5c586ef387b622cdb26f27bef5eaa24a25c9999b563df4f78bb48bd9b529ac7ca1a5aabe7e5e7fcdce9d26dec947e02b31c4c18d9f3796158677f1927c7b4596a3738fa3e93e7537c4777ca169bfd7a795d80974f329c97749248d0b42a5c33c4ed4071c3c802e81796880c13f5351d86b8f984bf5c49743b7070b1e8baf740e8358994d0d8bb3407d1e2eea8d9ca9de681f9a1738e37944de5b324979b6ffbd280637", 0xb1}, {&(0x7f0000000840)="ae060177791874a0890dc7fbf03395b578c05f52a90f97a76fae71fea3517b359c4351e13562c644ec6c11a81423a8d9146cd7122aec619d0a1e33ed35610971142c2f64faa774b05e5d3fad537584a7d6c049", 0x53}, {&(0x7f00000008c0)="ed3b8524d856ecbf2f75b2ffc731f517094fc4c46081bbfe546ad754fccd84be7320999f20e156ec75e801c689937d9b697088c1726594aff5b877883f7629396f4ebbc9c9df5fac1ac44b358f48b61b481a1fd30ec33ea241044a31e40e7e7954f8e08544a3f7d1ab374f265ad908f4f48e27aedc4cd67f0eacfe228f92b8a717d762f7712fd89663f8d89dc6e3c9cf6abdb01e7791ec67a7b5d39f89238b80da41b52bb6297de87648f1649f211987f55a3999679405e609cadc13849e38642137b9f9649880506feb44b53d1fe8", 0xcf}, {&(0x7f00000009c0)="75b361e0048d0dc11dc54f60edc38097a54a95d1ca179406c17e3d8f4f2e3bb2583893a278b8951b50d7b1829fef98a33375df502486424656f8ee5041e925e57e081de6dbde8547bd5214957b2316005c8717f09ba08e4402c6f78477f9ad465116c22dc7a937941d6088c217427c668d1b5124859e6a2e1afcadd099df0b52763e7a4b798fd2c9b01e1c35360d061fa67c2c7cb7c55963d1fca10bcd7364f642054ede3f4d0fa02fdbdae6b2bd1ea10bc854860a55de8d7acdc0b57182eff70394bc33bd78cdf90d", 0xc9}], 0x6, &(0x7f0000000b40)=[@txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}], 0x18}, 0x880) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000bc0)={r5}, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000c00)={0xffffffffffffffff}) close(r3) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@bloom_filter={0x1e, 0x1, 0xb37, 0x860, 0x14001, r7, 0x3, '\x00', r4, r1, 0x400, 0x3, 0x3, 0x8, @void, @value, @value=r7}, 0x50) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r7}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000d00)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{r3, 0xffffffffffffffff}, &(0x7f0000000d40), &(0x7f0000000d80)=r7}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0x23, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x96}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000f40)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x25, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f80)={0x5, 0xf, 0x2, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000fc0)=[r3, r9, r10], &(0x7f0000001000)=[{0x2, 0x4, 0x9, 0xa}], 0x10, 0xfffffffd}, 0x94) sendmsg$sock(r8, &(0x7f00000015c0)={&(0x7f0000001100)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001180)="b286a02e2852c38addc9fa3346e93b18ecabb2a0ec374bd2dedad9de06e6afdecf9602d9aaeef0dd7409e30f3025850b2d48a0e9d83d4100c64d40c3f61dbafbe09acd4c69331a9258b69c6e53ae26b511d960417c4cbbad55cb63578697b258becd09f3b585769083643fd6a65f5aedd5582ba00b27fa18ef502586bba74145c58718fe4a3dd3ab50ff482e5c6da311796736fbd57d2e8e14a80def7aff53f0ff1e", 0xa2}, {&(0x7f0000001240)="cccb59b99e6ca3501cb83329fd3fb795dbfc5e42f135e6fb6f2f", 0x1a}, {&(0x7f0000001280)="bc680dbd729e6a790224e022c274a0a768985652837613b383590089a1556dc65ab27cd20c27050e9c66ad2780290bdd01ac000dcfd1c21ab72eec6b18501f7e694d0a9f3773e5128dd947868c593cbccbe11d8beccb2963e48caa957da22396b0376a64885d1f1d37a3c20ce4965adbc6339278b916a6b59ee1a5930d2ad5e27eb15090ac9a82e27be726734ba231e0a82362237704813987472f20224395e816797019f4877f142bcedbe8af8201", 0xaf}, {&(0x7f0000001340)="42862c0c0f9d515f0dd34d557e1f018d07263b8b3b123b7aec2f7d863484767e5927250758c74f6298ddc105a4c0d624a1cb5cb3a7bcdb4f0fcb894b54d5e55566a68b3b58de5b81f97d54a04d8a482c29809df056101555bad2847474abada5c0b3aef92e26c54b3ff5b7b396944de90a9b29b7f100568aa0f65aada3b3df8b9a57412e337de8abb5b0677a6db3273cceee76f6226ea5a71ee4939401436ad5707d6e9ce5e841b329eba379851a0c671afb3fc8bdeecf7d263fcaece8b487730f48725491825df1f4be037e1e632bf82a42c9fb361d3c84f5fd24bb79d72bd223400b3234806435a9da15fe28d10ed17525ad54cd7c6dcd306a38", 0xfb}, {&(0x7f0000001440)="8903b0bcecd26259f231b48ac77e18040e50e93263a115f3ac828592de7a9e1f09d9ca492602d97bd53197a72a5d2101d0dfb174b97ebdf436a211bf93d2df040152715c78b27f0b", 0x48}], 0x5, &(0x7f0000001540)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xf}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x60}, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f0000001800)={&(0x7f0000001640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000017c0)=[{&(0x7f00000016c0)="fef0d189f3e75acb0bb9f95865b1facc9f2038c76de49177ad6abd18cb4db9e85855a1174ea87844beac7893e31bd816e70d22d6eb604321eeb363ba9e71527b4147d007c79438b2426703451b6f77632ee90b1975e70e5b1f102c06f9138c", 0x5f}, {&(0x7f0000001740)="29f00e4e443ae32435715ab3f144c159acbc363452baf4b22c5d62f0d7b8b1081763ad0d5ca59f7ff36838190bf099fcb43e9920215ade38a1c9a2480a56b4d5521592bdb35c1cd1596a76e3", 0x4c}], 0x2}, 0x0) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001840)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x6f, '\x00', r4, r10, 0x3, 0x1}, 0x50) close(r13) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000018c0)={'veth1_to_bridge\x00', 0x600}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001bc0)={0x6, 0x17, &(0x7f0000001900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffe8}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x400}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x0, 0x9, 0xffffffffffffffff}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000019c0)='GPL\x00', 0x80, 0x85, &(0x7f0000001a00)=""/133, 0x40f00, 0x50, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000001ac0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001b00)={0x2, 0xf, 0x6, 0x800}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001b40)=[r9, r11, r7], &(0x7f0000001b80)=[{0x2, 0x4, 0xa, 0x6}, {0x4, 0x3, 0x10}, {0x3, 0x3, 0x4}, {0x3, 0x3, 0x4}], 0x10, 0x27}, 0x94) close(0xffffffffffffffff) r14 = perf_event_open(&(0x7f0000001d40)={0x2, 0x80, 0x7, 0x96, 0x4, 0x3, 0x0, 0xc9, 0x840, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f0000001d00), 0xc}, 0x110000, 0x7, 0x5, 0x4, 0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0xb000000000000000}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001c80)={0x4, 0x80, 0x3, 0xc, 0x5, 0x3, 0x0, 0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x40, 0x3}, 0x800, 0x93aa, 0x2, 0x4, 0x8, 0x8, 0x7, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, r14, 0x3) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001dc0)={0xffffffffffffffff, r10}, 0xc) ioctl$TUNSETDEBUG(r10, 0x400454c9, &(0x7f0000001e00)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001e40)) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000001e80)={'dummy0\x00'}) 277.694771ms ago: executing program 0 (id=1204): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e00000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x10, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0x6, 0x3, 0x2, 0x20, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0xc, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[r2, r4, 0x1], 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071113b00000000008510000002000000850000005000000095000000000000009500a50500000000"], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffcd5}, 0x70) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) ioctl$SIOCSIFHWADDR(r1, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 276.671401ms ago: executing program 4 (id=1205): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82744, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x7, 0x10000}, 0x0, 0xc8, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3fd}, 0x0, 0x5, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000006c0)=ANY=[@ANYBLOB="0100000000000000000000001cfd98b2e092d35108ff685d97d50284f7d5de43"]) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYRESHEX=0x0], 0x5a9b) (async) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu&\t\t') (async) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xfb5) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x13, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c252500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1ad8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000080000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000003c0)="186b9099560842f7ffffffffffff", 0x0, 0xff, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073019f00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x300}, 0x48) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000e2050000000000000004000018000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r8, 0x0, &(0x7f0000001780)=""/4096}, 0x20) (async) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x9e}}, &(0x7f0000000480)='GPL\x00'}, 0x80) 259.988461ms ago: executing program 2 (id=1206): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/25], 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000340)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000d000000000000000000000004"], 0x0, 0x56}, 0x28) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x0, 0x0, r0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 228.216053ms ago: executing program 4 (id=1207): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000203000000000000000000000d0000000c0000000000258ba1f40420000009000000000000"], &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES16=r1, @ANYBLOB="bd3b3b43dd25442ee34c80a3a03604f04e0cfffabb5690d37e6f398178211f823fa200e6a78cef6cbd9332d477b0855f0fe29578a55edb5ef2fa540bac828c84ae2006376c1bb0b11e8eda3f2c", @ANYRES8=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) close(0x3) r7 = syz_clone(0x200800, &(0x7f00000007c0)="484a1d36419b1c1754fd42b053faee8df9f70f6dead71314ccb673da125f118e462bef29ed06b644de3b", 0x2a, &(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)="aab98285204c2b3fc53748bcad86b342f54bf9b3612e16cccdbf37fb6321a1c8ec5930fe94d36a847c9269ce5f7749bbca0a1662d045619fea12ed342b0b249fef4022e3090e9262ab9ef57f4141896cf7df08bb8ac6b41f07d0ab84197ac5775c3e8eec54a47ae570c4317b436b511d32f2ffb08f095081a7ac9b32be995a8e058be49fb3301c8b3ad2becc0cc0d58d9c") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001d40)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r10}, &(0x7f0000000400), &(0x7f0000000300)=r12}, 0x20) sendmsg$inet(r9, &(0x7f0000003000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="0000000002", 0x5}], 0x1}, 0x200900c0) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x2, 0x1, 0x3, 0xfb, 0x0, 0x20, 0x64000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x60, 0x3, 0x3, 0x0, 0x0, 0x28a, 0x6, 0x0, 0x0, 0x0, 0x2}, r7, 0x2, r3, 0x2) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r13}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000000)={0x5, 0x4a, 0x5f, 0xfe, 0x4, 0x4, 0x0, 0x3, 0x80000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x110200, 0xd, 0x9, 0x7, 0x7, 0x7, 0x0, 0x0, 0xfffffffd, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYRES8=r5], &(0x7f0000000000)='GPL\x00', 0x1b5af2ce, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x11}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r16) ioctl$PERF_EVENT_IOC_QUERY_BPF(r15, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000bd0001000080000000001800"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xc08c) close(r6) 0s ago: executing program 2 (id=1208): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xb, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000730000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xb, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000730000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xd, 0x1f8, 0x1, 0x51, 0x62000, r1, 0x2, '\x00', r2, r5, 0x2, 0x4, 0x3}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xd, 0x1f8, 0x1, 0x51, 0x62000, r1, 0x2, '\x00', r2, r5, 0x2, 0x4, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffc0, 0x18, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffc0, 0x18, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.47' (ED25519) to the list of known hosts. [ 18.310954][ T24] audit: type=1400 audit(1778729788.469:64): avc: denied { mounton } for pid=271 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.311916][ T271] cgroup: Unknown subsys name 'net' [ 18.314086][ T24] audit: type=1400 audit(1778729788.469:65): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.317869][ T24] audit: type=1400 audit(1778729788.469:66): avc: denied { unmount } for pid=271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.318015][ T271] cgroup: Unknown subsys name 'devices' [ 18.440123][ T271] cgroup: Unknown subsys name 'hugetlb' [ 18.445698][ T271] cgroup: Unknown subsys name 'rlimit' [ 18.581898][ T24] audit: type=1400 audit(1778729788.739:67): avc: denied { setattr } for pid=271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.605014][ T24] audit: type=1400 audit(1778729788.739:68): avc: denied { mounton } for pid=271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.629668][ T24] audit: type=1400 audit(1778729788.739:69): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.655991][ T273] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 18.664845][ T24] audit: type=1400 audit(1778729788.819:70): avc: denied { relabelto } for pid=273 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.690233][ T24] audit: type=1400 audit(1778729788.819:71): avc: denied { write } for pid=273 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.720584][ T24] audit: type=1400 audit(1778729788.879:72): avc: denied { read } for pid=271 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.746074][ T24] audit: type=1400 audit(1778729788.879:73): avc: denied { open } for pid=271 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.772091][ T271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.350433][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.357476][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.365101][ T279] device bridge_slave_0 entered promiscuous mode [ 19.372614][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.379653][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.386946][ T279] device bridge_slave_1 entered promiscuous mode [ 19.419737][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.426754][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.434172][ T280] device bridge_slave_0 entered promiscuous mode [ 19.440778][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.447781][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.455169][ T281] device bridge_slave_0 entered promiscuous mode [ 19.462703][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.469739][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.476919][ T281] device bridge_slave_1 entered promiscuous mode [ 19.483475][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.490579][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.497772][ T280] device bridge_slave_1 entered promiscuous mode [ 19.555561][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.562634][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.570005][ T282] device bridge_slave_0 entered promiscuous mode [ 19.576738][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.583914][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.591191][ T282] device bridge_slave_1 entered promiscuous mode [ 19.658620][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.665667][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.672969][ T283] device bridge_slave_0 entered promiscuous mode [ 19.679738][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.686763][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.694101][ T283] device bridge_slave_1 entered promiscuous mode [ 19.749005][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.756034][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.763290][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.770308][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.810565][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.817588][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.824831][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.831839][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.840174][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.847189][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.854439][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.861454][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.874869][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.881898][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.889138][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.896135][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.926004][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.933040][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.940281][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.947284][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.963275][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.970629][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.977701][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.984914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.992490][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.999649][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.006720][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.013939][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.021222][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.028496][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.035642][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.043418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.051688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.059079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.072415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.080510][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.087504][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.095033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.103207][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.110230][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.123706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.131182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.139423][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.146415][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.153937][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.162048][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.169061][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.176337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.184692][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.191707][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.206250][ T281] device veth0_vlan entered promiscuous mode [ 20.221281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.229770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.237592][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.245183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.252862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.260806][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.268671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.276857][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.283881][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.291166][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.299271][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.306270][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.315325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.339853][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.347723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.356047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.364576][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.371599][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.379005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.386954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.394714][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.402736][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.410660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.418644][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.428884][ T281] device veth1_macvtap entered promiscuous mode [ 20.442826][ T280] device veth0_vlan entered promiscuous mode [ 20.450582][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.458217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.466633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.475122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.483558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.491827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.500149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.508167][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.515177][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.522547][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.530814][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.538892][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.545895][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.553233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.561074][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.568902][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.576816][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.585275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.592832][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.605857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.614127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.622427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.630395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.644671][ T280] device veth1_macvtap entered promiscuous mode [ 20.655080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.663381][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.671785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.679514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.687671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.695913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.703963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.720937][ T279] device veth0_vlan entered promiscuous mode [ 20.732625][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 20.740695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.749737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.757961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.766134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.774214][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.782507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.790830][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.799246][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.807448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.814920][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.825065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.832923][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.844951][ T279] device veth1_macvtap entered promiscuous mode [ 20.852340][ T281] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.863978][ T283] device veth0_vlan entered promiscuous mode [ 20.870980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.878573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.886603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.895165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.903342][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.910998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.919412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.930815][ T282] device veth0_vlan entered promiscuous mode [ 20.937684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.945593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.964535][ T283] device veth1_macvtap entered promiscuous mode [ 20.983520][ T282] device veth1_macvtap entered promiscuous mode [ 20.991153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.999980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.008119][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.019641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.049040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.057267][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.066173][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.078297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.087300][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.099915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.108183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.116993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.125411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.135165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.146030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.154462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.189359][ T320] device syzkaller0 entered promiscuous mode [ 21.234791][ C0] hrtimer: interrupt took 28312 ns [ 22.046192][ T363] cgroup: syz.3.17 (363) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.072509][ T363] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.444051][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.451270][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.552048][ T428] device syzkaller0 entered promiscuous mode [ 23.562911][ T423] device bridge_slave_1 left promiscuous mode [ 23.569097][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.576376][ T423] device bridge_slave_0 left promiscuous mode [ 23.582671][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.679396][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 23.679404][ T24] audit: type=1400 audit(1778729793.839:116): avc: denied { tracepoint } for pid=438 comm="syz.2.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 23.728501][ T448] device bridge0 entered promiscuous mode [ 23.787741][ T456] device syzkaller0 entered promiscuous mode [ 23.807163][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 23.876394][ T24] audit: type=1400 audit(1778729794.029:117): avc: denied { create } for pid=459 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 24.162158][ T485] cgroup: fork rejected by pids controller in /syz3 [ 24.808439][ T24] audit: type=1400 audit(1778729794.959:118): avc: denied { create } for pid=509 comm="syz.2.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 25.806830][ T535] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.816837][ T535] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.825099][ T535] device bridge_slave_0 entered promiscuous mode [ 25.875424][ T535] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.900479][ T535] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.919849][ T535] device bridge_slave_1 entered promiscuous mode [ 25.982189][ T24] audit: type=1400 audit(1778729796.139:119): avc: denied { write } for pid=554 comm="syz.2.69" name="ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.153674][ T24] audit: type=1400 audit(1778729796.159:120): avc: denied { open } for pid=554 comm="syz.2.69" path="/dev/ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.243716][ T24] audit: type=1400 audit(1778729796.169:121): avc: denied { read } for pid=554 comm="syz.2.69" name="ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.280311][ T7] device veth1_macvtap left promiscuous mode [ 26.296693][ T24] audit: type=1400 audit(1778729796.389:122): avc: denied { create } for pid=535 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.298899][ T7] device veth0_vlan left promiscuous mode [ 26.317979][ T24] audit: type=1400 audit(1778729796.389:123): avc: denied { write } for pid=535 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.344175][ T24] audit: type=1400 audit(1778729796.389:124): avc: denied { read } for pid=535 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.439973][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.450120][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.458030][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.468781][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.480676][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.489098][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.497226][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.504284][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.512144][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.520818][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.528995][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.536011][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.543594][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.551606][ T24] audit: type=1400 audit(1778729796.709:125): avc: denied { setopt } for pid=567 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.607302][ T535] device veth0_vlan entered promiscuous mode [ 26.629238][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.637559][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.649369][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.656731][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.668154][ T580] device syzkaller0 entered promiscuous mode [ 26.683924][ T535] device veth1_macvtap entered promiscuous mode [ 26.708454][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.721661][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.760307][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.943752][ T623] ref_ctr_offset mismatch. inode: 0x89 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 27.156579][ T640] device syzkaller0 entered promiscuous mode [ 27.909184][ T686] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.916399][ T686] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.947386][ T686] device bridge_slave_1 left promiscuous mode [ 27.966558][ T686] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.993691][ T686] device bridge_slave_0 left promiscuous mode [ 28.011834][ T686] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.943503][ T719] device syzkaller0 entered promiscuous mode [ 29.256406][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 29.256416][ T24] audit: type=1400 audit(1778729799.409:128): avc: denied { create } for pid=766 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 29.616122][ T24] audit: type=1400 audit(1778729799.769:129): avc: denied { append } for pid=816 comm="syz.0.139" name="ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.189832][ T834] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 30.437995][ T856] syz.3.151[856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.438047][ T856] syz.3.151[856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.647733][ T878] geneve0: tun_chr_ioctl cmd 1074025677 [ 30.664491][ T878] geneve0: linktype set to 778 [ 30.757963][ T24] audit: type=1400 audit(1778729800.909:130): avc: denied { create } for pid=884 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 30.878702][ T890] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 31.094019][ T893] geneve0: tun_chr_ioctl cmd 1074025677 [ 31.100151][ T893] geneve0: linktype set to 1 [ 31.105154][ T893] geneve0: tun_chr_ioctl cmd 35234 [ 31.319798][ T911] device syzkaller0 entered promiscuous mode [ 32.093423][ T24] audit: type=1400 audit(1778729802.249:131): avc: denied { create } for pid=954 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 33.227928][ T995] device syzkaller0 entered promiscuous mode [ 33.429147][ T1003] device sit0 entered promiscuous mode [ 33.746281][ T1007] device syzkaller0 entered promiscuous mode [ 34.109742][ T24] audit: type=1400 audit(1778729804.269:132): avc: denied { attach_queue } for pid=1019 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.272455][ T1035] device syzkaller0 entered promiscuous mode [ 35.554126][ T1075] device veth1_to_batadv entered promiscuous mode [ 35.604934][ T24] audit: type=1400 audit(1778729805.759:133): avc: denied { create } for pid=1088 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 35.880734][ T24] audit: type=1400 audit(1778729806.039:134): avc: denied { create } for pid=1141 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 36.147131][ T24] audit: type=1400 audit(1778729806.299:135): avc: denied { create } for pid=1134 comm="syz.4.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.442890][ T1135] device wg2 entered promiscuous mode [ 36.703172][ T1171] @0Ù: renamed from bond_slave_1 [ 38.086618][ T1232] device syzkaller0 entered promiscuous mode [ 38.150327][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 38.509470][ T1249] device syzkaller0 entered promiscuous mode [ 41.904155][ T24] audit: type=1400 audit(1778729812.059:136): avc: denied { create } for pid=1410 comm="syz.2.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 42.074229][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 44.854384][ T1550] device syzkaller0 left promiscuous mode [ 45.714290][ T24] audit: type=1400 audit(1778729815.869:137): avc: denied { create } for pid=1603 comm="syz.2.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 46.489873][ T1648] device syzkaller0 entered promiscuous mode [ 46.856537][ T1714] device syzkaller0 entered promiscuous mode [ 48.134154][ T1761] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.141333][ T1761] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.148929][ T1761] device bridge0 left promiscuous mode [ 48.365287][ T1765] device bridge_slave_1 left promiscuous mode [ 48.388965][ T1765] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.399476][ T1765] device bridge_slave_0 left promiscuous mode [ 48.405596][ T1765] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.492993][ T1773] ------------[ cut here ]------------ [ 48.498505][ T1773] trace type BPF program uses run-time allocation [ 48.505374][ T1773] WARNING: CPU: 0 PID: 1773 at kernel/bpf/verifier.c:10518 check_map_prog_compatibility+0x5d6/0x740 [ 48.516326][ T1773] Modules linked in: [ 48.592018][ T1773] CPU: 0 PID: 1773 Comm: syz.1.410 Not tainted syzkaller #0 [ 48.620156][ T1774] cgroup: fork rejected by pids controller in /syz1 [ 48.626796][ T1773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 48.644563][ T1773] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 48.651781][ T1773] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 06 b8 4b 05 01 48 c7 c7 c0 d2 25 85 e8 3a 25 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 48.671601][ T1773] RSP: 0018:ffffc900013d7448 EFLAGS: 00010246 [ 48.677719][ T1773] RAX: f3a84452a50ce500 RBX: 0000000000000001 RCX: 0000000000080000 [ 48.685929][ T1773] RDX: ffffc9000193c000 RSI: 0000000000002aa2 RDI: 0000000000002aa3 [ 48.693991][ T1773] RBP: ffffc900013d7490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 48.702062][ T1773] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff88811af74000 [ 48.710058][ T1773] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811d366000 [ 48.718112][ T1773] FS: 00007f192b07f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 48.727076][ T1773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.733740][ T1773] CR2: 00007f192c672540 CR3: 000000010ff19000 CR4: 00000000003506b0 [ 48.741768][ T1773] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 48.749803][ T1773] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 48.757764][ T1773] Call Trace: [ 48.761112][ T1773] ? __fdget+0x1a1/0x230 [ 48.765368][ T1773] resolve_pseudo_ldimm64+0x55e/0x1060 [ 48.770849][ T1773] ? bpf_check+0xdb10/0xdb10 [ 48.775476][ T1773] ? kvmalloc_node+0x88/0x130 [ 48.780188][ T1773] bpf_check+0x9058/0xdb10 [ 48.784597][ T1773] ? bpf_get_btf_vmlinux+0x60/0x60 [ 48.789788][ T1773] ? is_bpf_text_address+0x177/0x190 [ 48.795070][ T1773] ? selinux_bpf_prog_alloc+0x51/0x140 [ 48.800828][ T1773] ? __kernel_text_address+0xa0/0x100 [ 48.814908][ T1773] ? unwind_get_return_address+0x4d/0x90 [ 48.824423][ T1773] ? stack_trace_save+0xf0/0xf0 [ 48.829578][ T1773] ? arch_stack_walk+0xee/0x140 [ 48.834519][ T1773] ? stack_trace_save+0xa6/0xf0 [ 48.839497][ T1773] ? stack_trace_snprint+0xf0/0xf0 [ 48.876514][ T1773] ? __kasan_slab_alloc+0x69/0xf0 [ 48.892965][ T1773] ? pcpu_block_update+0x53b/0x900 [ 48.903757][ T1773] ? selinux_bpf_prog_alloc+0x51/0x140 [ 48.909680][ T1773] ? selinux_bpf_prog_alloc+0x51/0x140 [ 48.915638][ T1773] ? __kasan_kmalloc+0xec/0x110 [ 48.921234][ T1773] ? __kasan_kmalloc+0xda/0x110 [ 48.926384][ T1773] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 48.931959][ T1773] ? selinux_bpf_prog_alloc+0x51/0x140 [ 48.937489][ T1773] ? security_bpf_prog_alloc+0x62/0x90 [ 48.943023][ T1773] ? bpf_prog_load+0x9d8/0x14a0 [ 48.947934][ T1773] ? __se_sys_bpf+0x49a/0x740 [ 48.961779][ T1773] ? __x64_sys_bpf+0x7b/0x90 [ 48.966369][ T1773] ? do_syscall_64+0x31/0x40 [ 48.971734][ T1773] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.040292][ T1773] ? memset+0x35/0x40 [ 49.055588][ T1773] ? bpf_obj_name_cpy+0x193/0x1e0 [ 49.060783][ T1773] bpf_prog_load+0xfca/0x14a0 [ 49.065514][ T1773] ? map_freeze+0x320/0x320 [ 49.070212][ T1773] ? selinux_bpf+0xc7/0xf0 [ 49.074696][ T1773] ? security_bpf+0x82/0xa0 [ 49.164955][ T1773] __se_sys_bpf+0x49a/0x740 [ 49.169923][ T1773] ? __x64_sys_bpf+0x90/0x90 [ 49.175674][ T1773] ? __kasan_check_read+0x11/0x20 [ 49.180817][ T1773] __x64_sys_bpf+0x7b/0x90 [ 49.185232][ T1773] do_syscall_64+0x31/0x40 [ 49.190281][ T1773] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.196273][ T1773] RIP: 0033:0x7f192c624e59 [ 49.200897][ T1773] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.221151][ T1773] RSP: 002b:00007f192b07f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.229729][ T1773] RAX: ffffffffffffffda RBX: 00007f192c89dfa0 RCX: 00007f192c624e59 [ 49.237791][ T1773] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 49.246004][ T1773] RBP: 00007f192c6bad6f R08: 0000000000000000 R09: 0000000000000000 [ 49.254168][ T1773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.262275][ T1773] R13: 00007f192c89e038 R14: 00007f192c89dfa0 R15: 00007fffa26e6a98 [ 49.270458][ T1773] ---[ end trace 6181ad6eefc8cf48 ]--- [ 49.932016][ T1814] device veth0_vlan left promiscuous mode [ 50.099816][ T1814] device veth0_vlan entered promiscuous mode [ 50.140543][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.535252][ T1821] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.619324][ T1821] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.735316][ T1821] device bridge_slave_0 entered promiscuous mode [ 50.838118][ T1821] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.930209][ T1821] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.939345][ T1821] device bridge_slave_1 entered promiscuous mode [ 51.264045][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.272346][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.291069][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.299330][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.307474][ T588] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.314529][ T588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.322247][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.330576][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.338652][ T588] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.345674][ T588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.353055][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.361703][ T7] device bridge_slave_1 left promiscuous mode [ 51.367861][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.375211][ T7] device bridge_slave_0 left promiscuous mode [ 51.381424][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.389478][ T7] device veth1_macvtap left promiscuous mode [ 51.395508][ T7] device veth0_vlan left promiscuous mode [ 51.485968][ T1839] device syzkaller0 entered promiscuous mode [ 51.498826][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.513474][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.543948][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.564158][ T1821] device veth0_vlan entered promiscuous mode [ 51.573916][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.584188][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.598066][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.613953][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.627660][ T1821] device veth1_macvtap entered promiscuous mode [ 51.662405][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.672147][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.020465][ T1885] device sit0 entered promiscuous mode [ 52.769494][ T24] audit: type=1400 audit(1778729822.929:138): avc: denied { create } for pid=1923 comm="syz.2.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 53.022408][ T1954] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 53.283337][ T1972] device sit0 left promiscuous mode [ 53.340415][ T1972] device sit0 entered promiscuous mode [ 54.978251][ T24] audit: type=1400 audit(1778729825.129:139): avc: denied { ioctl } for pid=2087 comm="syz.4.504" path="mnt:[4026532534]" dev="nsfs" ino=4026532534 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.348540][ T2117] device syzkaller0 entered promiscuous mode [ 56.000669][ T2172] tun0: tun_chr_ioctl cmd 2148553947 [ 56.693420][ T24] audit: type=1400 audit(1778729826.839:140): avc: denied { create } for pid=2179 comm="syz.4.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 57.779470][ T2222] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 57.791079][ T2222] device syzkaller0 entered promiscuous mode [ 59.603191][ T2239] syz.2.548 uses obsolete (PF_INET,SOCK_PACKET) [ 64.753586][ T2266] device syzkaller0 entered promiscuous mode [ 65.443667][ T2296] device syzkaller0 entered promiscuous mode [ 65.870689][ T2318] device syzkaller0 entered promiscuous mode [ 66.001340][ T2318] device syzkaller0 left promiscuous mode [ 67.064146][ T24] audit: type=1400 audit(1778729837.219:141): avc: denied { create } for pid=2345 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 68.046883][ T2400] device syzkaller0 entered promiscuous mode [ 68.212725][ T24] audit: type=1400 audit(1778729838.369:142): avc: denied { create } for pid=2418 comm="syz.0.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 68.271263][ T24] audit: type=1400 audit(1778729838.429:143): avc: denied { create } for pid=2424 comm="syz.2.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 68.440284][ T2462] device syzkaller0 entered promiscuous mode [ 68.835577][ T24] audit: type=1400 audit(1778729838.989:144): avc: denied { create } for pid=2481 comm="syz.0.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 70.120634][ T2537] device syzkaller0 entered promiscuous mode [ 70.406496][ T2555] tap0: tun_chr_ioctl cmd 1074025681 [ 71.116145][ T2592] device syzkaller0 entered promiscuous mode [ 72.226178][ T2664] device sit0 left promiscuous mode [ 72.319497][ T2664] device sit0 entered promiscuous mode [ 72.476333][ T24] audit: type=1400 audit(1778729842.629:145): avc: denied { create } for pid=2682 comm="syz.0.682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 72.624718][ T24] audit: type=1400 audit(1778729842.779:146): avc: denied { write } for pid=2685 comm="syz.0.683" name="cgroup.subtree_control" dev="cgroup2" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 72.649288][ T24] audit: type=1400 audit(1778729842.779:147): avc: denied { open } for pid=2685 comm="syz.0.683" path="" dev="cgroup2" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.077296][ T2701] device syzkaller0 entered promiscuous mode [ 74.316991][ T24] audit: type=1400 audit(1778729844.469:148): avc: denied { getattr } for pid=2752 comm="syz.2.706" path="net:[4026532453]" dev="nsfs" ino=4026532453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.362726][ T2820] device syzkaller0 entered promiscuous mode [ 75.795516][ T24] audit: type=1400 audit(1778729845.949:149): avc: denied { create } for pid=2860 comm="syz.4.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 76.591887][ T588] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 77.848645][ T24] audit: type=1400 audit(1778729847.999:150): avc: denied { ioctl } for pid=2951 comm="syz.4.763" path="" dev="cgroup2" ino=356 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 78.042824][ T2960] device veth0_vlan left promiscuous mode [ 79.245086][ T3007] device syzkaller0 entered promiscuous mode [ 79.391549][ T24] audit: type=1400 audit(1778729849.549:151): avc: denied { create } for pid=3018 comm="syz.3.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 80.539394][ T3086] tun0: tun_chr_ioctl cmd 2148553947 [ 80.765400][ T3092] device veth1_to_bond entered promiscuous mode [ 81.257496][ T3114] tun0: tun_chr_ioctl cmd 1074025675 [ 81.263074][ T3114] tun0: persist enabled [ 82.069791][ T24] audit: type=1400 audit(1778729852.219:152): avc: denied { create } for pid=3181 comm="syz.3.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 82.141712][ T3188] device syzkaller0 entered promiscuous mode [ 82.148970][ T3188] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 82.383480][ T24] audit: type=1400 audit(1778729852.539:153): avc: denied { create } for pid=3209 comm="syz.2.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 82.580089][ T3227] device syzkaller0 entered promiscuous mode [ 83.522268][ T3283] device syzkaller0 entered promiscuous mode [ 83.595791][ T3294] device dummy0 entered promiscuous mode [ 85.712948][ T3361] device syzkaller0 entered promiscuous mode [ 86.231434][ T3393] device wg2 entered promiscuous mode [ 86.335203][ T3409] device syzkaller0 entered promiscuous mode [ 86.424237][ T3431] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.431425][ T3431] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.465729][ T3429] device syzkaller0 entered promiscuous mode [ 87.466661][ T24] audit: type=1400 audit(1778729857.619:154): avc: denied { create } for pid=3516 comm="syz.0.913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 90.534277][ T3664] bridge0: port 3(veth0_to_bridge) entered blocking state [ 90.549327][ T3664] bridge0: port 3(veth0_to_bridge) entered disabled state [ 90.556913][ T3664] device veth0_to_bridge entered promiscuous mode [ 90.659716][ T3664] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 90.698897][ T3664] bridge0: port 3(veth0_to_bridge) entered blocking state [ 90.706041][ T3664] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 94.629025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.641209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.653316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.665352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.677416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.689591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.701639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.713715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.725780][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 94.737830][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 97.772303][ T3830] 7B’ç÷ï: renamed from syzkaller0 [ 97.924585][ T3833] device syzkaller0 entered promiscuous mode [ 98.231287][ T24] audit: type=1400 audit(1778729868.389:155): avc: denied { create } for pid=3843 comm="syz.1.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 98.626031][ T24] audit: type=1400 audit(1778729868.779:156): avc: denied { associate } for pid=3851 comm="syz.3.980" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 99.562898][ T24] audit: type=1400 audit(1778729869.719:157): avc: denied { create } for pid=3869 comm="syz.3.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 99.638894][ C0] net_ratelimit: 81840 callbacks suppressed [ 99.638906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.656911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.668962][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.681096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.693168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.705228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.717378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.729442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.741539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 99.753725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 103.366382][ T4001] device syzkaller0 entered promiscuous mode [ 104.603314][ T4033] device syzkaller0 entered promiscuous mode [ 104.648870][ C0] net_ratelimit: 78767 callbacks suppressed [ 104.648882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.666841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.678933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.690988][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.703054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.715128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.727184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.739340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.751503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 104.763566][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 105.093310][ T4059] device syzkaller0 entered promiscuous mode [ 109.323271][ T4164] device syzkaller0 left promiscuous mode [ 109.626248][ T4177] -1: renamed from syzkaller0 [ 109.660278][ C0] net_ratelimit: 73157 callbacks suppressed [ 109.660306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.679480][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.692687][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.707688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.721640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.735190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.749655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.761935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.774325][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 109.786695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 113.483612][ T24] audit: type=1400 audit(1778729883.639:158): avc: denied { create } for pid=4284 comm="syz.1.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 114.191552][ T4301] device syzkaller0 entered promiscuous mode [ 114.197957][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 114.493380][ T24] audit: type=1400 audit(1778729884.619:159): avc: denied { read } for pid=4308 comm="syz.1.1103" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.668936][ C0] net_ratelimit: 64976 callbacks suppressed [ 114.668965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.688026][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.701188][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.714599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.715975][ T24] audit: type=1400 audit(1778729884.669:160): avc: denied { open } for pid=4308 comm="syz.1.1103" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.727917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.765446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.778564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.791519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.804498][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 114.817562][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 116.328316][ T4347] : port 1(ip6gretap0) entered blocking state [ 116.420342][ T4347] : port 1(ip6gretap0) entered disabled state [ 116.742538][ T4347] device ip6gretap0 entered promiscuous mode [ 117.028364][ T4350] device ip6gretap0 left promiscuous mode [ 117.037583][ T4350] : port 1(ip6gretap0) entered disabled state [ 119.678891][ C0] net_ratelimit: 70687 callbacks suppressed [ 119.678903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.696883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.708950][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.721033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.733088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.745135][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.757190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.769241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.781297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 119.793343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 120.090610][ T4518] ªªªªªª: renamed from vlan0 [ 123.492098][ T4630] device syzkaller0 entered promiscuous mode [ 123.680179][ T4646] Ÿë: port 1(veth0_to_team) entered blocking state [ 123.690978][ T4646] Ÿë: port 1(veth0_to_team) entered disabled state [ 123.799002][ T4646] device veth0_to_team entered promiscuous mode [ 124.688886][ C0] net_ratelimit: 103423 callbacks suppressed [ 124.688899][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.706969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.719025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.731086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.743140][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.755193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.767268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.779332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.791393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.803451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:97:f3:ad:51:04, vlan:0) [ 124.869040][ T4671] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.876190][ T4671] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.279291][ T1255] ------------[ cut here ]------------ [ 125.284783][ T1255] kernel BUG at kernel/bpf/arraymap.c:993! [ 125.306077][ T4671] device bridge_slave_1 left promiscuous mode [ 125.364946][ T1255] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 125.371042][ T1255] CPU: 1 PID: 1255 Comm: kworker/1:21 Tainted: G W syzkaller #0 [ 125.379957][ T1255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 125.390016][ T1255] Workqueue: events prog_array_map_clear_deferred [ 125.396422][ T1255] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 125.402645][ T1255] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 125.422230][ T1255] RSP: 0018:ffffc900013b7c18 EFLAGS: 00010293 [ 125.428274][ T1255] RAX: ffffffff817b560b RBX: ffff888111d1b890 RCX: ffff88811dd2a780 [ 125.436221][ T1255] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 125.444170][ T1255] RBP: ffffc900013b7c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 125.452119][ T1255] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 125.460078][ T1255] R13: ffff88812799de00 R14: 0000000000000001 R15: ffff88812799de00 [ 125.468040][ T1255] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 125.476946][ T1255] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 125.483513][ T1255] CR2: 0000000000000000 CR3: 000000011da12000 CR4: 00000000003506a0 [ 125.491466][ T1255] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 125.499424][ T1255] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 125.507380][ T1255] Call Trace: [ 125.510662][ T1255] ? bpf_prog_6c78e34c4e1ba855+0xb/0x5b8 [ 125.516275][ T1255] fd_array_map_delete_elem+0x14c/0x250 [ 125.521801][ T1255] prog_array_map_clear_deferred+0x9e/0x140 [ 125.527675][ T1255] process_one_work+0x6e1/0xba0 [ 125.532502][ T1255] worker_thread+0xa6a/0x13c0 [ 125.537158][ T1255] kthread+0x346/0x3d0 [ 125.541209][ T1255] ? worker_clr_flags+0x190/0x190 [ 125.546208][ T1255] ? kthread_blkcg+0xd0/0xd0 [ 125.550776][ T1255] ret_from_fork+0x1f/0x30 [ 125.555181][ T1255] Modules linked in: [ 125.562167][ T4671] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.595570][ T1255] ---[ end trace 6181ad6eefc8cf49 ]--- [ 125.601141][ T1255] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 125.607452][ T1255] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 125.642142][ T1255] RSP: 0018:ffffc900013b7c18 EFLAGS: 00010293 [ 125.652619][ T1255] RAX: ffffffff817b560b RBX: ffff888111d1b890 RCX: ffff88811dd2a780 [ 125.669389][ T1255] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 125.686162][ T1255] RBP: ffffc900013b7c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 125.702938][ T1255] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 125.719733][ T1255] R13: ffff88812799de00 R14: 0000000000000001 R15: ffff88812799de00 [ 125.736425][ T1255] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 125.755149][ T1255] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 125.949031][ T1255] CR2: 00007f37bbe58540 CR3: 0000000116289000 CR4: 00000000003506a0 [ 125.957027][ T1255] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 125.970722][ T1255] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 125.978697][ T1255] Kernel panic - not syncing: Fatal exception [ 125.984942][ T1255] Kernel Offset: disabled [ 125.989254][ T1255] Rebooting in 86400 seconds..