last executing test programs: 3.176496954s ago: executing program 3 (id=278): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b28, &(0x7f0000000000)={'ip6gretap0\x00', @random="e32579d14a8f"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000040)={r3, &(0x7f00000000c0), &(0x7f0000000200)=""/71}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x43}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 3.0888034s ago: executing program 3 (id=280): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x2, 0x3, 0xfffffaa1, 0x810, 0x1, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x1a, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x50, 0x1, 0x0, 0x0, 0x20, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x71}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = getpid() sendmsg$unix(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000000c0)="1b62b4cb", 0x4}], 0x1, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x48041}, 0x0) write$cgroup_pid(r2, &(0x7f0000000540)=r4, 0x12) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r7) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="000000000b021700010000007f0000f338934f00c8e025e858f36028bfa73bb2a3bc1db82e97a4083e294dc3b848bc640d901478d2a06d49355c6ff10acaa2a5305f37ed99b68f9cc89c1d3a27c571a317a032ed932e3b98976a8d9c01b4332ca49a87", @ANYRES32=r0, @ANYBLOB="010400"/20, @ANYRES32=r1, @ANYRES32=r8, @ANYBLOB="0500000002000000020000000600"/28], 0x50) 2.871765953s ago: executing program 2 (id=286): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000200)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0xb, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711812000000000095"], &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x3, r7}, 0x38) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000800000000000c0000000c00000004000000020000000000000a0000000000323000"], &(0x7f0000000680)=""/31, 0x28, 0x1f, 0x1, 0xc7}, 0x28) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0xb}, 0x50) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)=@generic={&(0x7f0000000b00)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x18, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000800000000000000c500000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000001000000950000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018430000060000000000000000000000bf91000000000000b70200000000000085000000840000008dc95a2e8a38d6ed9500000000000000"], &(0x7f0000000940)='GPL\x00', 0x1400000, 0x1000, &(0x7f0000001040)=""/4096, 0x40f00, 0x61, '\x00', 0x0, @fallback=0x2e, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x0, 0xfffffff6, 0x7}, 0x10, 0xffffffffffffffff, r10, 0x2, &(0x7f0000000b80)=[r5, r7], &(0x7f0000000bc0)=[{0x1, 0x5, 0x7ff, 0x7}, {0x6, 0x2, 0x2, 0xb}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000000400000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)='%pB \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xb, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10001}, [@map_fd={0x18, 0x4, 0x1, 0x0, r4}, @map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}]}, &(0x7f0000000400)='GPL\x00', 0x2, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x52, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x5, 0x400}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000800)=[r9, r11], &(0x7f0000000840)=[{0x3, 0x2, 0x10, 0xa}, {0x4, 0x1, 0xa}, {0x2, 0x5, 0x5, 0xc}], 0x10, 0x4}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000cc0)={r0, r4}, 0xc) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711816000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.797305407s ago: executing program 3 (id=287): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x0, 0x4, 0x82f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex, 0xf3de32d8fe2bab73, 0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)={0x7, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={@cgroup=r5, r0, 0x14, 0x30, 0x0, @void, @void, @void, @value=r6, r4}, 0x20) sendmsg$sock(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000500)="90c29c9b05b952664ec34e014c8fe99b30bcb82fab9996e303a56ac1244c9be86cd9838aed8d6b7ea55e07e75edb0e6ebfdbe0e43949213c7666973f17d26eef9b19e09fca5dc91f76adc41c281999ee3fe34dd9b3ea2337684adb440472b33d0ffd5054bdcc38508d90d87f8616c2cc3863a2667e77340789ca4c837a3705a96d69964afb2b91d52b355d1c029ec4b842a6556a63a950889a22e85db02da095fa411769f58a7dbcf7aad89472b05e07e4167f4b76db03696ff56dd82973dfbbd37cdce2bd18b2", 0xc7}], 0x1, &(0x7f00000006c0)=[@txtime={{0x18, 0x1, 0x3d, 0x80000000}}], 0x18}, 0x24008000) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair(0x8, 0x1, 0x417, &(0x7f0000001000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8941, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4020000000000007911000000000000850000000c0000009500000000000000359bb9f4ffffb136000440c89844f3cec063027b45b1bf3fa2cef4363021028e2b63040fcfd3a9b59fed6aa4172c30b77f38d6daaed700"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0xffffffffffffff35}, 0x54) 2.630824506s ago: executing program 2 (id=288): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4120, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0xe, 0x9}, 0x0, 0x400000, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000700000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3a, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0xfffffef3, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x5562, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x5}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2, 0xfff0}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x8}, {0x3, 0x0, 0x6, 0xa, 0x9, 0xfff0, 0xa1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r2}, {}, {0x15, 0x0, 0x0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xd, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f3, &(0x7f0000000ac0)='K\x8dx\xbeB\x1b\xb8\xad\xe5\xad\vlM\\\x1d\xf3r\x84o>\xe4\x03\x00\x00\x00\xeb\x91\x19\xa3k\xddJ\xe8we>\x14N/\xdak79\xf4\xd6\xfe\xa7\xd4\x82\xc9)\fO\x8ed\xd3Q\n\xb0\xd9\xd14i\xa9\xbfbm7\xc0\x1a\xed$lt\xb8\x8cm\xd2\x1f\x14\xf9\x06\xa8C\xfa\xb1~\x00X},X\xfbV)\xb3\xc9\x9b=\t\xf1\xc0f\xc8\xb3i\r\x80|WF\xc7\xbb\x1e\xab\xa1\x8aV\x9c\vV\x10\xdb\a\x95\x90\xeeU\x1a\xacR\x91\t\xc3M\xacZ\x8d\x8b\x90@\xec1\\r\xe3\xec\x01g\xec\xc8?\xc4\x06\xac-\xfe\x8e-,\xf5(\xf9U\x92e\xaa\xa8\xa0\xe1e\xf1\xdfr\xf0\xffE\x85UOX\x88\xc8\xfb\x17\x94?\x01\xe9\n+:f( n(\x92S)\xe4\xaa\x1a7OF\x84\xe3\x1c\x8c\xd5\xb0yyE\xc7\xdb') perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 2.630391416s ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 2.424593419s ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) 1.986442474s ago: executing program 2 (id=289): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000024000000080000000b"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r2, &(0x7f0000000280), &(0x7f0000000080)=""/82}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069116600000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 1.985658964s ago: executing program 3 (id=290): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_clone(0x160000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x7d}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20302, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x202200, 0x0) close(r4) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (rerun: 32) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'veth1_virt_wifi\x00', 0xc00}) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000080)) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x8009400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.985258904s ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 1.680667892s ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) 1.503840853s ago: executing program 3 (id=291): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xffff0000, 0xa, 0x0, &(0x7f0000001a40)="2b206d074843b397737e", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000280)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xc, 0x1a, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xf9100000}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0x2, 0x2, 0x6, 0x4, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x5, 0x0, 0x5, 0x1, 0x7e52}, @alu={0x7, 0x1, 0xf, 0xa, 0xa, 0x100, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0x400, 0x10, &(0x7f0000000500)=""/16, 0x40f00, 0x34, '\x00', r6, @fallback=0x3, r7, 0x8, &(0x7f00000007c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0x1, 0x5, 0x3}, 0x10, 0xffffffffffffffff, r0, 0x5, 0x0, &(0x7f0000000840)=[{0x1, 0x4, 0x4, 0x2}, {0x4, 0x1, 0x8, 0x5}, {0x3, 0x4, 0x4, 0xc}, {0x0, 0x1, 0x2, 0x3}, {0x2, 0x4, 0x0, 0x1}], 0x10, 0x7}, 0x94) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x31b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xb5b8cd7d51c13fd4, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0200000002"], 0x10) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB="00000000d9f05c"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="02"], 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x280000, 0x0) 1.361518801s ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 1.151173204s ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) 1.069558508s ago: executing program 3 (id=292): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_msg}, 0x48) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x9, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x49}, @alu={0x7, 0x0, 0xc, 0x5, 0x5, 0x1, 0x10}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f0000000000)='GPL\x00', 0x3, 0x1f, &(0x7f0000000200)=""/31, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x4, 0xc4, 0xe6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x1, 0x1, 0x1], &(0x7f0000000340)=[{0x0, 0x5, 0x5, 0xa}, {0x1, 0x5, 0x3, 0x9}, {0x5, 0x5, 0xf, 0xa}], 0x10, 0x4}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r3, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x12, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000006300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.065885118s ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 998.665182ms ago: executing program 2 (id=293): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x1, 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r2, 0x20, &(0x7f0000000200)={&(0x7f0000000c80)=""/4096, 0x1000, 0x0, &(0x7f0000000140)=""/150, 0x96}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x16, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x1000, 0x0, 0x0, 0x40f00, 0x3e, '\x00', 0x0, @lirc_mode2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r0}, 0x94) 996.686182ms ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 916.994657ms ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 831.103112ms ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) 747.421807ms ago: executing program 2 (id=294): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x5f}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x3}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_clone(0x10000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000400)="40a27abf") perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x9, 0x90, 0x9, 0x0, 0x5, 0x2099, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x159, 0x4, @perf_config_ext={0x10001, 0xe}, 0x8704, 0x8000, 0x400, 0x4, 0x5, 0x3, 0x9, 0x0, 0x3f}, r2, 0xe, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001000)=@generic={0x0, r1}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0xfffffffffffffd93}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000851000000300000018000000", @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, '\x00', r3, r4, 0x3, 0x2, 0x1}, 0x50) 746.465797ms ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 647.236313ms ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 564.791348ms ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 484.982312ms ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) 386.462158ms ago: executing program 2 (id=295): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffd, 0x1, @perf_config_ext={0x8000000000000080, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000008000000020000000400000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x1000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x92d357db82b8cfe6}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x24010, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 384.439148ms ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 208.752789ms ago: executing program 4 (id=275): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net_cls'}, {0x2b, 'net'}, {0x6, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'rlimit'}]}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) (async) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 104.524734ms ago: executing program 0 (id=273): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 32) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@map=r1, 0x33, 0x1, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r5, r3, 0x15, 0x2010, 0x0, @value=r1, @void, @void, @void, r4}, 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r3, 0x4, r7}, 0xffffffffffffff4c) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) 0s ago: executing program 1 (id=186): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd26c0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xa, 0x98, 0x0, 0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb67d, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x81, 0x1, 0x5ec75f25, 0x0, 0xbe, 0x7ff, 0x17, 0x0, 0xfffffffa, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='.],^+^\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/83) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='.],^+^\x00') r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x6, 0xe0, 0x1, 0x0, 0x9, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x2}, 0x10002e, 0x7, 0xb, 0x7, 0x534e61e0, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, r1, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r4 = syz_clone(0x44004400, &(0x7f0000000340)="bb2d6b32848774551ee1c7abb8961d04bb551f073e7f5ab13b48a91e743d1b1b8f50436268e88f9053d92a9c4f198025ce24018271fd739340439c9b602e14b90884ae50f5323a7a61db8dbaa321c9c33bf0cd2b867e20e46ef98eff74cf25d709867b80e7237231f43df385f5914a777291e3ef2b9abc07d0f4d35c73114676aad66cde7e", 0x85, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="643b859c40bf54b05c3b7c9f7e0fff4f79722585ca8fb569f20e663c6ea341be093c47807387c2a2d95e415079c80090f209c4a98a2c628379") ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r2, 0xe0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000001640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880), 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)=@o_path={&(0x7f0000001900)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001980), &(0x7f00000019c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a40), &(0x7f0000001a80)=r2}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x32, 0xa, &(0x7f00000004c0)=@raw=[@generic={0x4, 0xd, 0x0, 0x5d65}, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0x2, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000540)='GPL\x00', 0x4, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x2, '\x00', r5, @fallback=0x1b, r6, 0x8, &(0x7f00000018c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001b00)=[r7, r8, r9], &(0x7f0000001b40)=[{0x2, 0x4, 0x10, 0x5}], 0x10, 0x7}, 0x94) write$cgroup_pid(r0, &(0x7f0000001c40)=r4, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002100)={r10, 0xe0, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001f00)=[{}], 0x8, 0x10, &(0x7f0000001f40), &(0x7f0000001f80), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001fc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_tracing={0x1a, 0x22, &(0x7f0000001c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x7, 0x1, 0x1, 0x5, 0x9, 0xffffffffffffffc2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000001e00)=""/47, 0x41000, 0x53, '\x00', r11, 0x18, r6, 0x8, &(0x7f0000002140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0xf, 0x73b, 0x4}, 0x10, 0xa1e9, 0xffffffffffffffff, 0x2, &(0x7f00000021c0)=[r8], &(0x7f0000002200)=[{0x0, 0x3, 0xb, 0xc}, {0x4, 0x5, 0xd, 0x6}], 0x10, 0x4}, 0x94) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{r8, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000023c0)={r12}, 0x4) syz_clone(0x800200, &(0x7f0000002400)="c11d16f4d6f0949c8488181bff301ced7741cd99f30e4ba716aef0686c7c150a6413189afa2d09a8ef0fc03f7961c630b4b063bfa62114dde8521e9d5710b92f9afd3ec2aeddadc7541120995f7e9195bbf37a73791d19e443c616a4b0b7b8124a256d776594bea3473baeb0143408c2f19ff0a701f9df4dbb0f8c9f3078c487dd88d04bdd8088de3d7ca8bfce3e490d5ea176525ba0ed3bdbfd62f515e9285e30adfedd12ededc00ced5f4ec2af9f120858e9937f1abd8de73cc6c9b237e787d963f0", 0xc3, &(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)="0fb83908ab086a7a1a43ee2805510fdc92f839bb1943814b0e8e7ab27efa7e2ea9dacaf16d2ca3749f9f86d26e073fa061e1d88d7e7f843f3d1572bc7e9bf6f8e1ca5fc8a29b47c5927d760746cc6e23c66692c28cbd98e32e6a0a700b0fe2eca1b44f8f86cada047de3c9f3d8b8c74e5f0a6a04788a1ad06373f593bf026eb2f4d21410ceae7d65e4cd2f88f1bdcf47b625220df08f750634760bf9bbc2f5544a47ddb9799991478b21c3dcc9110c95ea11e1463a3cb0f3169458bfacc86d3ea0ff") recvmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000002680), 0x6e, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/84, 0x54}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/43, 0x2b}, {&(0x7f0000003800)=""/37, 0x25}, {&(0x7f0000003840)=""/171, 0xab}, {&(0x7f0000003900)=""/22, 0x16}, {&(0x7f0000003940)=""/200, 0xc8}], 0x8, &(0x7f0000003ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xd0}, 0x1) r16 = perf_event_open(&(0x7f0000003c00)={0x2, 0x80, 0x5, 0x7f, 0xfa, 0xf, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x4000, 0xffff, 0x3, 0x2, 0x3, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8e2}, r15, 0x8, r13, 0x0) recvmsg$unix(r14, &(0x7f0000006140)={&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/230, 0xe6}, {&(0x7f0000004e00)=""/21, 0x15}, {&(0x7f0000004e40)=""/62, 0x3e}, {&(0x7f0000004e80)=""/183, 0xb7}, {&(0x7f0000004f40)=""/157, 0x9d}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/105, 0x69}], 0x8, &(0x7f0000006100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x42) openat$cgroup_int(r14, &(0x7f0000006180)='memory.swap.high\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000061c0)={0x0, 0x80, 0xd6, 0x7, 0x3b, 0x8, 0x0, 0x6, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x3ffc000000000000, 0x7fff}, 0x100040, 0x8, 0x0, 0x8, 0x7ff, 0x2, 0xc8eb, 0x0, 0x8abb, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r16, 0x3) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.119' (ED25519) to the list of known hosts. [ 23.476948][ T30] audit: type=1400 audit(1771140345.224:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.480670][ T274] cgroup: Unknown subsys name 'net' [ 23.499624][ T30] audit: type=1400 audit(1771140345.224:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.527151][ T30] audit: type=1400 audit(1771140345.244:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.527646][ T274] cgroup: Unknown subsys name 'devices' [ 23.668271][ T274] cgroup: Unknown subsys name 'hugetlb' [ 23.674023][ T274] cgroup: Unknown subsys name 'rlimit' [ 23.903428][ T30] audit: type=1400 audit(1771140345.644:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.927084][ T30] audit: type=1400 audit(1771140345.644:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.952753][ T30] audit: type=1400 audit(1771140345.644:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.964592][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.984861][ T30] audit: type=1400 audit(1771140345.724:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.010482][ T30] audit: type=1400 audit(1771140345.724:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.031293][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.036752][ T30] audit: type=1400 audit(1771140345.754:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.070659][ T30] audit: type=1400 audit(1771140345.754:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.520254][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.527561][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.535082][ T282] device bridge_slave_0 entered promiscuous mode [ 24.543033][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.550107][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.557581][ T282] device bridge_slave_1 entered promiscuous mode [ 24.649308][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.656497][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.663892][ T283] device bridge_slave_0 entered promiscuous mode [ 24.681259][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.688356][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.695918][ T283] device bridge_slave_1 entered promiscuous mode [ 24.737861][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.744929][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.752567][ T284] device bridge_slave_0 entered promiscuous mode [ 24.761227][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.768377][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.775851][ T284] device bridge_slave_1 entered promiscuous mode [ 24.793314][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.800430][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.807910][ T285] device bridge_slave_0 entered promiscuous mode [ 24.817776][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.824834][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.832275][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.839438][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.856443][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.863509][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.871018][ T285] device bridge_slave_1 entered promiscuous mode [ 24.928375][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.935446][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.942965][ T286] device bridge_slave_0 entered promiscuous mode [ 24.952585][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.959699][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.967264][ T286] device bridge_slave_1 entered promiscuous mode [ 25.048861][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.056492][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.066019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.073455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.127218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.135445][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.142545][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.157012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.165476][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.172557][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.202836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.229286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.237664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.245969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.254152][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.261218][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.268856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.279083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.287368][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.294419][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.323971][ T282] device veth0_vlan entered promiscuous mode [ 25.330714][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.339362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.347699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.355105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.362838][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.391198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.400147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.408218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.416948][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.425071][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.432164][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.439625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.447931][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.454988][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.462431][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.470749][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.477826][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.485367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.493605][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.500652][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.508144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.516208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.524107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.531820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.539708][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.552124][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.560459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.568686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.577120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.588645][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.597044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.616823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.626150][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.634349][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.641412][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.649602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.658419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.667032][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.675315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.683652][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.690730][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.699652][ T282] device veth1_macvtap entered promiscuous mode [ 25.711234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.718959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.726787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.735153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.745156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.753123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.768285][ T285] device veth0_vlan entered promiscuous mode [ 25.776915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.784498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.792095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.800832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.809094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.817493][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.826132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.834014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.842291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.850913][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.859589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.868084][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.878066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.885829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.893267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.901894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.911085][ T286] device veth0_vlan entered promiscuous mode [ 25.927529][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.935833][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.944165][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.951847][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.960729][ T283] device veth0_vlan entered promiscuous mode [ 25.973986][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 25.983540][ T285] device veth1_macvtap entered promiscuous mode [ 25.991303][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.000278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.008564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.019298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.027804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.040245][ T286] device veth1_macvtap entered promiscuous mode [ 26.053893][ T283] device veth1_macvtap entered promiscuous mode [ 26.061499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.075141][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.084302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.092404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.101556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.110300][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.118952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.127525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.143939][ T284] device veth0_vlan entered promiscuous mode [ 26.159575][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.169547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.179043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.187572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.206454][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.214780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.223671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.231944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.240515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.256393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.266230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.274551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.283293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.291152][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.339247][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.350593][ C0] hrtimer: interrupt took 26951 ns [ 26.358344][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.370614][ T284] device veth1_macvtap entered promiscuous mode [ 26.402336][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.446948][ T348] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 26.449937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.497392][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.536395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.549358][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.692758][ T451] device sit0 entered promiscuous mode [ 28.703637][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 28.703652][ T30] audit: type=1400 audit(1771140350.444:109): avc: denied { setopt } for pid=452 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.192772][ T30] audit: type=1400 audit(1771140350.934:110): avc: denied { create } for pid=462 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.269704][ T30] audit: type=1400 audit(1771140350.974:111): avc: denied { create } for pid=463 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 29.388412][ T464] device syzkaller0 entered promiscuous mode [ 29.650073][ T489] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.657358][ T489] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.850734][ T493] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.857855][ T493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.865225][ T493] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.872318][ T493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.886063][ T493] device bridge0 entered promiscuous mode [ 29.974407][ T30] audit: type=1400 audit(1771140351.714:112): avc: denied { create } for pid=505 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 30.084409][ T511] device sit0 entered promiscuous mode [ 30.185373][ T30] audit: type=1400 audit(1771140351.924:113): avc: denied { ioctl } for pid=519 comm="syz.0.54" path="socket:[16596]" dev="sockfs" ino=16596 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.226649][ T30] audit: type=1400 audit(1771140351.964:114): avc: denied { read } for pid=519 comm="syz.0.54" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.262100][ T30] audit: type=1400 audit(1771140351.964:115): avc: denied { open } for pid=519 comm="syz.0.54" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.372234][ T30] audit: type=1400 audit(1771140351.964:116): avc: denied { ioctl } for pid=519 comm="syz.0.54" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.453121][ T30] audit: type=1400 audit(1771140352.184:117): avc: denied { create } for pid=537 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 30.539175][ T30] audit: type=1400 audit(1771140352.244:118): avc: denied { read } for pid=541 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.069420][ T594] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.078350][ T594] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.106268][ T594] device bridge0 left promiscuous mode [ 31.209360][ T594] device bridge_slave_1 left promiscuous mode [ 31.247468][ T594] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.235556][ C0] sched: RT throttling activated [ 33.258332][ T594] device bridge_slave_0 left promiscuous mode [ 33.265351][ T594] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.393989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 33.483654][ T628] device macsec0 entered promiscuous mode [ 34.413809][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 34.413844][ T30] audit: type=1400 audit(1771140356.154:122): avc: denied { create } for pid=657 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 34.797631][ T693] Q6\bY4: renamed from lo [ 37.609260][ T30] audit: type=1400 audit(1771140359.354:123): avc: denied { create } for pid=857 comm="syz.2.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 39.248396][ T923] ------------[ cut here ]------------ [ 39.254300][ T923] trace type BPF program uses run-time allocation [ 39.302390][ T923] WARNING: CPU: 0 PID: 923 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 39.339953][ T923] Modules linked in: [ 39.348365][ T923] CPU: 0 PID: 923 Comm: syz.2.177 Not tainted syzkaller #0 [ 39.361651][ T923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 39.393159][ T923] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 39.415717][ T923] Code: ee ff 48 c7 c6 e0 45 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 96 1c ee ff c6 05 54 73 6a 05 01 48 c7 c7 40 42 48 85 e8 83 0d 2f 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 39.441349][ T935] cgroup: fork rejected by pids controller in /syz1 [ 39.495650][ T923] RSP: 0018:ffffc90000d5f428 EFLAGS: 00010246 [ 39.505157][ T923] RAX: c5c84aee1ad32900 RBX: 0000000000000001 RCX: 0000000000080000 [ 39.516723][ T923] RDX: ffffc9000239f000 RSI: 00000000000027e8 RDI: 00000000000027e9 [ 39.531872][ T923] RBP: ffffc90000d5f470 R08: ffff8881f7032f3f R09: 1ffff1103ee065e7 [ 39.545815][ T923] R10: dffffc0000000000 R11: ffffed103ee065e8 R12: ffff88812bcb4000 [ 39.574355][ T923] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888127a7c800 [ 39.606418][ T923] FS: 00007f70236966c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 39.629115][ T923] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.635976][ T923] CR2: 00007fbb26f12dac CR3: 000000012baca000 CR4: 00000000003506b0 [ 39.688230][ T923] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.721005][ T282] syz-executor (282) used greatest stack depth: 20640 bytes left [ 39.728828][ T923] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 39.785670][ T923] Call Trace: [ 39.790632][ T923] [ 39.845658][ T923] resolve_pseudo_ldimm64+0x656/0x1180 [ 39.858460][ T923] ? check_attach_btf_id+0xd70/0xd70 [ 39.872399][ T923] ? __mark_reg_known+0x1b0/0x1b0 [ 39.925239][ T923] ? security_capable+0x87/0xb0 [ 39.935836][ T923] bpf_check+0x32c7/0xf370 [ 39.970985][ T923] ? is_bpf_text_address+0x177/0x190 [ 40.015244][ T923] ? bpf_get_btf_vmlinux+0x60/0x60 [ 40.035645][ T923] ? unwind_get_return_address+0x4d/0x90 [ 40.056749][ T923] ? stack_trace_save+0xf0/0xf0 [ 40.082752][ T923] ? arch_stack_walk+0xee/0x140 [ 40.116052][ T923] ? stack_trace_save+0xa6/0xf0 [ 40.120979][ T923] ? __stack_depot_save+0x34/0x480 [ 40.137380][ T923] ? __kasan_slab_alloc+0x69/0xf0 [ 40.142474][ T923] ? __kasan_kmalloc+0xec/0x110 [ 40.157683][ T923] ? __kasan_kmalloc+0xda/0x110 [ 40.162598][ T923] ? kmem_cache_alloc_trace+0x119/0x270 [ 40.178502][ T923] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.184183][ T923] ? security_bpf_prog_alloc+0x62/0x90 [ 40.218806][ T923] ? bpf_prog_load+0x9f4/0x1640 [ 40.246494][ T923] ? __sys_bpf+0x51d/0x7d0 [ 40.261131][ T923] ? __x64_sys_bpf+0x7c/0x90 [ 40.289570][ T923] ? x64_sys_call+0x4b9/0x9a0 [ 40.294780][ T923] ? do_syscall_64+0x4c/0xa0 [ 40.385666][ T923] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.415628][ T923] ? check_stack_object+0x81/0x140 [ 40.420921][ T923] ? memset+0x35/0x40 [ 40.424947][ T923] ? bpf_obj_name_cpy+0x193/0x1e0 [ 40.451242][ T923] bpf_prog_load+0x10c4/0x1640 [ 40.475654][ T923] ? map_freeze+0x360/0x360 [ 40.490912][ T923] ? selinux_bpf+0xc7/0xf0 [ 40.495429][ T923] ? security_bpf+0x82/0xa0 [ 40.516154][ T923] __sys_bpf+0x51d/0x7d0 [ 40.520467][ T923] ? bpf_link_show_fdinfo+0x330/0x330 [ 40.556527][ T923] ? __kasan_check_write+0x14/0x20 [ 40.563125][ T923] ? switch_fpu_return+0x15d/0x2c0 [ 40.598729][ T923] __x64_sys_bpf+0x7c/0x90 [ 40.603219][ T923] x64_sys_call+0x4b9/0x9a0 [ 40.630977][ T923] do_syscall_64+0x4c/0xa0 [ 40.635467][ T923] ? clear_bhb_loop+0x50/0xa0 [ 40.655350][ T923] ? clear_bhb_loop+0x50/0xa0 [ 40.665631][ T923] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.671594][ T923] RIP: 0033:0x7f7024c3af79 [ 40.731600][ T923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 40.765406][ T923] RSP: 002b:00007f7023696028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.784203][ T923] RAX: ffffffffffffffda RBX: 00007f7024eb4fa0 RCX: 00007f7024c3af79 [ 40.792544][ T923] RDX: 0000000000000094 RSI: 0000200000000d00 RDI: 0000000000000005 [ 40.824485][ T923] RBP: 00007f7024cd17e0 R08: 0000000000000000 R09: 0000000000000000 [ 40.832817][ T923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.848968][ T923] R13: 00007f7024eb5038 R14: 00007f7024eb4fa0 R15: 00007ffd427632e8 [ 40.865592][ T923] [ 40.868701][ T923] ---[ end trace ba69400a962e0d2d ]--- [ 40.985352][ T30] audit: type=1400 audit(1771140362.724:124): avc: denied { create } for pid=979 comm="syz.2.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 41.706806][ T45] device bridge_slave_1 left promiscuous mode [ 41.723167][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.748963][ T45] device bridge_slave_0 left promiscuous mode [ 41.783301][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.846303][ T45] device veth1_macvtap left promiscuous mode [ 41.915603][ T45] device veth0_vlan left promiscuous mode [ 42.361884][ T30] audit: type=1400 audit(1771140364.104:125): avc: denied { create } for pid=1025 comm="syz.2.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 43.158292][ T1051] device lo entered promiscuous mode [ 43.436150][ T1063] device wg2 entered promiscuous mode [ 44.112374][ T30] audit: type=1400 audit(1771140365.854:126): avc: denied { create } for pid=1076 comm="syz.4.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 47.934623][ T1149] device veth1_macvtap left promiscuous mode [ 48.036606][ T30] audit: type=1400 audit(1771140369.784:127): avc: denied { create } for pid=1165 comm="syz.3.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 48.297557][ T1161] device veth1_macvtap entered promiscuous mode [ 48.304107][ T1161] device macsec0 entered promiscuous mode [ 48.385576][ T964] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.401169][ T30] audit: type=1400 audit(1771140371.144:128): avc: denied { read write } for pid=1190 comm="syz.2.257" name="cgroup.subtree_control" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.427460][ T30] audit: type=1400 audit(1771140371.144:129): avc: denied { open } for pid=1190 comm="syz.2.257" path="" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.661949][ T1220] device veth1_macvtap left promiscuous mode [ 50.714678][ T283] cgroup: fork rejected by pids controller in /syz0 [ 50.771241][ T30] audit: type=1400 audit(1771140372.514:130): avc: denied { create } for pid=1227 comm="syz.4.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 51.693054][ T1298] device sit0 left promiscuous mode [ 51.750286][ T30] audit: type=1400 audit(1771140373.494:131): avc: denied { create } for pid=1297 comm="syz.3.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 52.098155][ T45] device bridge_slave_1 left promiscuous mode [ 52.104346][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.112181][ T45] device bridge_slave_0 left promiscuous mode [ 52.118473][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.126424][ T45] device bridge_slave_1 left promiscuous mode [ 52.132543][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.140293][ T45] device bridge_slave_0 left promiscuous mode [ 52.146472][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.154732][ T45] device veth1_macvtap left promiscuous mode [ 52.160782][ T45] device veth0_vlan left promiscuous mode [ 52.166772][ T45] device veth1_macvtap left promiscuous mode [ 52.172887][ T45] device veth0_vlan left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=186 state=3 status=67 (errno 32: Broken pipe) [ 54.403445][ T30] audit: type=1400 audit(1771140376.144:132): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[14017]" dev="pipefs" ino=14017 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 56.577000][ T45] device bridge_slave_1 left promiscuous mode [ 56.583145][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.590966][ T45] device bridge_slave_0 left promiscuous mode [ 56.597190][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.605859][ T45] device veth1_macvtap left promiscuous mode [ 56.612018][ T45] device veth0_vlan left promiscuous mode [ 56.618246][ T45] device veth0_vlan left promiscuous mode