last executing test programs: 6.329700716s ago: executing program 4 (id=2130): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006b00000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000ff000000000000ffffff9f2c0000000000000095000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x3f, 0x4e, &(0x7f00000002c0)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000500)="af0f586e5bf9ac353da66a4e6243979858f641706889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f909316d09000fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x5, 0x3, 0x10001}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa1000000000000070100"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0xe3, 0x0, 0x0, 0x7, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xfffffffffffffff9}, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000004000000040000000010000000000000", @ANYRES32, @ANYBLOB="00010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x49, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="170100000000b2000500000000000000850000008a00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200, 0x4620, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x9}}, 0x0, 0xfefffffffffffffe, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/net\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x22, &(0x7f00000000c0), 0x4) recvmsg(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffe1c}, 0x40000140) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3820, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x1, 0x5}, 0x0, 0xffffffffffffffff, 0x6, 0x9, 0x2, 0x0, 0x2, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 6.229131769s ago: executing program 4 (id=2132): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) socketpair(0x2, 0x5, 0x0, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000004000000040000000a", @ANYRES32=0x0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 6.20302788s ago: executing program 4 (id=2134): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000007c0)=ANY=[], 0x6) (async) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480)=r2, 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x0, 0x2}}, 0x10, 0x0}, 0x4040000) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x1000000, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240)="91851f793562e360bdb30d6b9a3c7ec011d3ea7b916634834cf026270c23f9fa01571323de98091d0b8dd55212524b859036d34d16a8555ddfdd7814ab8493d1b5405ace94354633") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x804) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000005000000fd0900008500000041000000a194e8ca153f1d5ea48506546fab3493ea0d643ded8eef6a2191aa122125dbdc73f07afcfe816d702ff574e776b5346962d120fc4284deb5be31de30a09222e8cad6b6123be4bdf4a746faf76b78433f38dcb4e2f24b7f0f17a90000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r6, &(0x7f0000000340), 0xffffffffffffff87) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 6.178139971s ago: executing program 4 (id=2135): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000a58000000000000018110000", @ANYRESOCT=r1, @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x541b, 0x200000000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="d2205d96c717ab96f0ded75d86dd", 0x0, 0xd5b7, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x772}, 0x18000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x7ff}}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3, 0x4}, {0x6, 0x5}]}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000005c0)=""/4096, 0x50, 0x1000, 0x0, 0x74}, 0x28) 6.008558286s ago: executing program 4 (id=2138): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r1, &(0x7f0000000280)="a5ebb8891f94d21a3d4fe272a8829b7e8c45e31f37c8def9097e012f7e36baa1874e0f6bad0c88e8d7f3a6ebc2f4c9c01d47dc8a677ca006889438145714673a3e892c7000495ae896c90fa058cc0ef0a4bd29b5b6ec71180c040e4574ee7b86622e31a3ed8f23aaa279f431a86c6ef03ec11a7abf7cf6ffb359fc7c27e4f3529bb900d34c9257b6c8c65690d84b0ba67c333b0dc19c30a5a8c6f6cbe81aec558011272500afb284c99daf8b3b3d7341ebd160275f21871183ced147be53f17b3301737067046eb2ab462e161b987dd0deb019e1c8c3b07119a5a699fa3b32433b51be5f572528cda9d5d3a3d3", &(0x7f00000004c0)=""/200}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300001a93"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071102900000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x6e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@map=r3, 0x1, 0x0, 0xd, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000009c0)=ANY=[@ANYRES32=r8, @ANYRES32=r2, @ANYBLOB="1a00000002200000", @ANYRES32=r6, @ANYRES32=r9, @ANYBLOB="1b126cc83d3c0b46ad3504e6d210a68937a62a8275eb0862df25e223935106025ebef67bb289827e47270b7973038ef256", @ANYRES64=r7], 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="450a0000000000006111bc000000000018000000000000000000000000000000950000000000000071b26ef2d83ea1de9c98f9ef06486361f495c7aa918dc301a5e313b9254558b3e306651f473da798468a26ee589b992c8808008e7015bdd0a4d383d6092c59266a0ca0302ed7f1f317cf56bd6de8be9462b6a79e769d28bd5d3c6400451fe5517632916ceecd59528aac6bde4200b75df2d0a76ffbd19d43a70caaa0feb3c8ac47533a84040bba7d378ebb933029a17df365ba309feeb458e329e9007ab9ecdf51f0d6a9dde1e13b046cc7ba45ba6e329e09a63e2093b3dc8a38cb8479dda6acb353a0d73ef013616803a0acf87638771b7493"], &(0x7f0000000000)='GPL\x00'}, 0x80) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 5.798639663s ago: executing program 4 (id=2145): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000900), 0x5, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000500)="818a77", 0x0}, 0x20) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8940, &(0x7f0000000080)) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000006a000085000000860000008500000007000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r6, 0x4) write$cgroup_freezer_state(r5, 0x0, 0x0) (async) r10 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xc, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x1a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x7, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r8, @ANYRESHEX=r3, @ANYBLOB="ef9fdc5d33044b71b9788783bad9f135dd2fea3e0cfb0cadc76602792420a58c3c138830fe790a9e5ae748f6d539", @ANYRESHEX=r2, @ANYBLOB="adde20df7ffd699d011185a8bf54a377ed7e81b1c0d60276e706d2c1ca6af723", @ANYRES64=r0, @ANYRESDEC=r7], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r12) (async, rerun: 64) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 2.915538846s ago: executing program 0 (id=2184): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1000}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001980)={0xffffffffffffffff, 0xe0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000640)=[0x0], &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f0000001800), 0x8, 0x83, 0x8, 0x8, &(0x7f0000001840)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000019c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x50) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x79, 0x0, 0x0, 0x85}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x0, 0xea, 0x0, 0x0, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYBLOB, @ANYRES32=r4, @ANYRES32, @ANYBLOB="04000000ec000000000000200000"], 0x50) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f00000007c0)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003280)=r6, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a80)={0x1b, 0x0, 0x0, 0x8000, 0x0, r5, 0x981, '\x00', r1, r7, 0x3, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x20, 0x15, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x9, 0x96, &(0x7f0000000140)=""/150, 0x40f00, 0x51, '\x00', r4, @netfilter=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, 0x10, r6, r2, 0x0, &(0x7f0000000280), 0x0, 0x10, 0x20000}, 0x94) 2.852197318s ago: executing program 3 (id=2185): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4340, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="0a00000006003c393357c28df0a6717ef4b3526f24caee", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'nr0\x00', 0x31}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001ac0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0xc, '\x00', r5, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x50) sendmsg$inet(r3, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000680)=[{&(0x7f00000004c0)="604c171ad5a5907384bef11bd79d877c78", 0x11}, {&(0x7f0000000780)="384a2d82db7e1ee9e3550f848ae3e108b5dae82d8439489e3489a6f9389ae7157b6070ab6f10541fbfee432120f5a3049c8eec891800ed0856f1ee9817820efec9bce13104deee12aa998196109097d1ef3c5df3c61ed02278aa66f027a29356639fef1136293878f3a62a198eb9405e6722f5b1b9153fa4e065e8236ecef14be90dc610917c751e44e145bc72522f4945bbd7e18ce0aca9988a1fd605f92997e110e4c958095efc44feaf7692d2590e795cc5a2f081e99de7b9fd3f2915115f00051ec944fb6d3f79828df077d67c071cdbca0cc9379eb90796ecab26a1a2459eb0aabea347709e4717d6fedcc102229791941472aa4cafbd7fe0eef74b1c28d181a2d1254bc863fed0052285ad4116c0b55d95942a6e2b9fa8d8b97905de7a974a283220bf80dc2fab49cf7ee964dea068f26f68cc55db58d58365968584b7aa4404c3dcbd8f6ad1094a7ecd55a395e42b55fb8abca3680c98d720efe525c263a4f295e2f3a0f45d8e0c3d3bd202aa4b1f19f05e44ca8ab964304a2cb2455127f3a1672589175c6efe493b4a3c827999739ca6dc2a5bc8b47eb99d200fa4dc74f5df2f22d04861769ce9fb40deca1f377eeed1856e163a5a48462a36d5c0eddf3008cb8fb90a7f7c07de28fba554908904783be8acb6914f72c1606212d8dab4e4918e4514c58f433047c9de8172494c8e33b15613d5f596b96a41716dd7549fff87f485a210387943dea2a4517df29bdadd62b5a829c38fc5551621539d41b53cfaebf703ed9d532c57512b24f02b0287594357b5467c4089a4ad982fea49dea6223e7965af178126e7e4b2aea0595c3bb88982ced967075886c2494b7adce012ad3079a9a586be1c1d6204d1eeda9c4bd276cf2b92d57e038744d822e87e0abbca8900b3638a78fd865140d0b7e2df147cb96712926e4d5c9761be583b4b357ba5a185cb3c06623515c92db8e19418d1e9a54df2f2c00bdc8d119ed4352dbf268f25fabee60ae18562d5e37633270fd4e2c1e0ce5eebe5642a4cf6ecf13e9d4f150ab75dcbfb73952e34b3925b1d958bc61d6ff2bd5e1a62064dc30819545a31578cbbb50f19f3452ffd13ca7c50b065a278766e3ff7f2768307b7b5b07df7b9a4215d22e7a3451db5ccec9e5aba1c7f49c32295bdf53340d87ef3ce698fdbad45fc8bc7538e941688806f9b5282db72bb95e9c5156d976215df2fced771dbfe0cddd44a31d7370d7b0c708b613a923ea8425ae8d4442f96d59667e24c8524c57ef2365007c181c8d3062e3c0188e7fd2b3255568ebc60fc631cd7c4876226e3d75977f77c637797da64b762ee1f768a76305d2833499e395605ae527a44390b67cb99eee7504f181ac8e3a07f804dd817ee6ac548a06e12d08e8829c75b1bb13b074af72accea2ea0748979668ab13af6f134132580792c324f43576fcf1375bae8edb85333fa035d472b8d2851d24902ddfad1ef6a613a7066d3d3b85b81b830313280eebcfed09e7ead0c4639826ff48cce14b43715077d18dec5790f9fad0d8fd7e72500257b0ab7ff6518b61e0f5e9c1060bde948ff57f9ee47eff28263674038f9fe8eb07504b930acc1724cb861c186fe0dc19c8c239d5f0ecc16768c299f454885287187e701bb580e4e0c7e08d5a87dcc484b25756c361986df2e0a3ca498046d10e347e016cb771ee49dde6c5928505e84bcfd5a24b0313ecf3223bbefd903aff265bb9c5ad69c2d178f0c8136f72bc36654d65cf2ebcb1e8a3c176117a2cd4fc09ef563105f400ca66f986ba31adc66782881905ecdc4c49b0657db7bbc711987b68ff5600824ec87a1fd1b08dbe0795e108715fb1b61bbe777626efd9be1dbd1efc31054dc06fbc82f637910ff906bd321281d956b9e4ae489987aace9990f27cd443b30aa3ae30f9a65cb7d8194453f632bc8cdc019b972e7769c19512079b12f78fd6bc46a97a05724dcddaf77f1f104347cbc6fe12ab92bf0dabfe46ea153de5259103bbac9e896bf4f4c35033db9684a05dacf25e8eafb527b939dfc0b615fd4a6e507889c6152ea9f256aad720573f8270fe5a2e9f9e3aabc41a459279691370acaaf116bd00dda6516d8ae47df893b52043d232151dc0dfeb787ffed442e27dc8b2fed540687674ab76d308aafbc01113bd5e6a2328a47f2e29a9740de0f03e647c0bce43b267c8739a4f0bbb7c10c94a4b38268259308c9b4f7c230c8762a50f99c9ae108c08f51d9c2e4814ae3c052997ea46117796a6bc4082a5d5502c19da60ed129fc1e8089afbf0f1a8953ff937e88190af784544eb935d4c84043c173f45be96a8cbbea5396eb418bdbeca0ded03f7cc5195887550e5e9d34efc2a2b329c8b51bad29207ca9d398a6b75a5b6b38d6b5c96896a44e27345b04633572010540e7db06f95aee8bf35be65360b6ce942cf67b1ec5b92ad81f693c237a77b258bca61436b2446b423fb21ac423b5d569d97b28e25d367aab5e5dd6b966713c0d5c4c712ecfe5e3a73453473869a39312a4b5cc8210c30ce3bcdb416df79d18ddb3f3cb4011f7a11a32f91bfcdc6a279679ff8b165ee26c603c54e220735e676b40e099f831143fc0e0ba29859ed31c3cc4bb251d2022a6f3a612a4203f47d0b1d98a4ad1afe40e85a06ea286d792206b6bd26d2f53fafc4620d897d01848609ca375a1acf49f5d2999af33d8c858bd8e5517d0e2ee2ae7ef77c7127b9ffcf5bad63a44f47dd297559fc9705518df371ec8129aa545a3cc6643e3bf73fb958c1672b9c463ce6121d0bc799a678ffe40c21efa5ac37c957340ac6d0c15cb5d2292fec496d243a196da4f105a4057f7342139e75f40268d034fb0e005f9177cc51024a264bea2ad83afae9c173f046c4b0c3245366d804a7881a340b5a60d0f899a9b41171f6cb0e977912ee1b4651fadfd7f9cedaeeace3845745a8fad33e635d6a8e5d098f1c4f8440e84336b5cc562a58e6232760630ccc6bfceff57ac7b5e4c2919c1ac856bd9142331c261225183a5987cbdd518a2c6a81ce04cb189bddae1274f0d94acdb33a137dc9058dcadec141e0c9a34b5bd5454ecca77aa0219515929371f91713f03aad4f912f63bf195735e3852bd5fe897a07ffc1f7216b58645eff10fb925cf528c755d6d12738f1415307db148b81c1b57a585bade2902f29bab898715add02c5f813748f9b6a92d610ec4deef5999b0f47784ff1ce30a21fcd754958861a337d7e857985f5582b49cc5ee0afb62f1d4b70ab2ff4cb206718cf30e4b2fc76fd66cdc8993155ddba4b591165fdcd8978808e0cd525c2c18776aa394d39ff3561077f78f1fb262084f0e52d1c72dcf6b7057a2e53e9adc98d3bff10090025bead8011a070669fb408e0302f69bd170924e95f0659ebaff3a2f369963bccfccbabcf9a238dd291cb15354e0b3666c76183b70f51afc03b744182df5b805cc49f47e350f154f167e1f5616144e5540b41833aabc7919513d0ba36ffea90a01a26e6d380e2182f6053721f2185d2062b3211673640d2d865bd32bb88ad129a6e81646b406d85d8237e69048b27c6b754095c0a42694b2e8f6ab64049c53b95bc2f1ee4fbee8d918fc1a29e90f71fada2b2d097abba7ca93f5e19827568a52d95d84c19131a51a8e4af2c890874dd1c7c53baf82d9e99f5f73806da37a28e9a37e6e71d8183a0da9536039b15103d5f92df6a6c158fc88362f281974b0b78f6ada521b1ef3ba24420628a50504276d114dd46b7b41cfae137984da2a44191508815909dfc4d11904d9ac37aed38612a79d05ff305431e5110f5188fc39b14b57306f5d4af4298659c919e9a68f272f0bfc15bb3d030f6cfb92dc6b802fd6fbdbab8d2c56db7fda3ba3c0b13cebbc7f23a369178a195bd30bb4e018484225f1cc3ee7c34d4ff5660a3348e74ac52506de643d6a337e7d83609c893fba80d20ddcb54440949e388aedda8b1fc33dee11194459926d4bde5bf0ce836018da1e2b1faa7eb97fd828ba3d230af7c8a507d20bf578db6616eb8443903d8e73190e637f98f29a31ba22e25509a0e17c675818433c2e63e95c1857f1b4755c1106e68b369d64ce8e18f05cddb9e4c4df63bbb2f25baf0925d1f307d74878b599134f57358024404705d5e50bee1e3a6c40a4f6ee9f0962eaad162d451c5116db43a62505fdae7df6bf74e4481a5f5fdacd00de1bc2a0c6003032c463f29cd8daa7202a8af5d416d6450a78673c20e06d76cba76c6dfa231dbb7a39da76d2f74aa0a88b4cdd6062b9c2f685efbc0734f9fba89267e57a57b9684cf81d4e4c75dc03caf150d3e2727a48ce94017ff2a05408d512c1f4e8eefc0db88ac8f97dfb1d6d47f0b387b291a18fcdd46127ef757975fb81de41c0f11e8c05af16114fc3829aceadba213c2de23f736ebb29218641f08484a4145996c1c56c0ad8016ea57dcf21b4da342b7d22d13530540bdd5e6c8300c1b764a7de8936e38452bf520b1a69b59410771d413acbec8152c911083de7e5171d7130a71a30a534588c5cc1b4942948755c11e17b25bac081a5560268de18a053fca370d5f348ab147033d310915d6ab96eddbfbabb5574ca8c97a2dd021432785e615058a6f31ef2ec164a25878cd428c677dae8eed57e1286ad81cad0b24f2851dc90b7eba807944044036daa47ffc2d743c44ce3eea5c23638f2050432d6ee668f207689b5ca26deeb72d02a04b0be4f213fca7be8f32e89abbae6d9ec6b931c9e3caafd63d988413f37b79e67c7bfc6040e4013f310e25ef99a88a7a1ad12f78b6fac60c3d40a4569dc0614fd613ae855ed34fa4f5ae4642031e26ce03af834c799c9002c25fed76cf6398bae1f6c351d27b6b2f020a75cb61bb0223cc08a88538357264f30128f5884224c4a64b00f0c61613d13fa3ef96dd8290dad6c84a3c0fa3d937cac75f60268084e6a4e3db7ca3188c64f2564f8351336cb444fc669770391adc22cbd434230b52c594ab39c9fa8562d8bff0d1026838bca7e7a7432286187ff1c1a9b639c89c471f6b84dd7cfd3502bcff021f3a01fd06e8962c2639d44f57ea752975e0f1399262fbcccc37d656580021d0646bf59e99cd1701eb8733efb44b5c36a0180f65a8e653848f47f57fea0825296907639336030cead391dbe778c0c105e2ed4d69d5299f180f46a06b87af4c453fce5bde4dc26bf5623d651fbed841853625f3d9e2a5c93c2aac6682896d48d4ced4de56c340d8d612d263cb4bc610632f72039b67fd0f7e2c6b535c3cb940b5a34169a74a6d0ee7909a6cd26ce47ebfcac9eeba74ac188a1b021e2cb73c4d1b752556feb091022b2e59654676c4aa2e5b7044f7dec6054c7e3aab2cf7e2f14f5ce4b7f179a4477bbe343b9d9fb61e38b69d2db18b512f3d78514a38642bf9dbff1660468dc114ab4f047a5c699d6e46055c7b0b12ed943d0a02357ff4af372de2f00ec15ae59a71b2d14d50c599ef4091d91e4e17570fa3696925b2dd1c3c74917824bc70dde8e8a25853642a7a81693db94e4e37a5ff3a5f0fe69a16632ce469721dadbd02887581014e08f6e441aa23f6fb6e8e98de40e7763a1cde4e0b2a1fe1d46178b95f0b060e670658b705dcf8c250584d3fccd53663c6750a7cc44652b91a8e0572ce2ef6e366195869f9f51c3101dae72080bd7cef7dbc776282c4f1cdd81578885b9bc6849eae2f898c3a924498ffa9a297d58d00c4d06588cf2fe9cd2b571baadeadd1a6702d91fae42a44e536dcb62fff486c844a5f6edf69fddf942fbe8c5229796", 0x1000}, {&(0x7f0000000500)="3703ee3494c25a6e53d22b4f017f22d06b16bf3bdc9569fe7cf67d9fad48a3b505c176b1b5205fb6196ff90c44bad66a029758ab0530a01daf5ff0e42d5ff7195a4aeb5f2be6a147bcbdc52b6559f8d662", 0x51}, {&(0x7f0000000580)="0934fa65536ddd21574335f3e848b8c92d56aabb000a8df54bd5767961918b4b6062995852ba5aab9d81b65ee583a74bb422f478d47cc3dee42fb8e511e7de06ee46c55865b5a2aa077124b3f35db72b7339012efb7a49add65974eedc8a4bf39c3781f5f9d5315e2ead20f2c84c8e7b8faf597cacb41c476382d17181b786e5b1f60ab6c408278aaa7e0cc009685fbfe91fd5883442b18fb192502acd6e2b0976bae8c8149c5178fd2c956b733ed8f24b7ce4e945aa4dc447b77a4bc5fbd5a687ea31457864f5dd34", 0xc9}], 0x4, &(0x7f0000001780)=[@ip_retopts={{0x84, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x6b, 0x1, 0x8, [{@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x41}, 0x4}, {@loopback, 0xffff}, {@private=0xa010100, 0x2}, {@local, 0x1}]}, @ra={0x94, 0x4, 0x1}, @end, @ssrr={0x89, 0x7, 0xbb, [@broadcast]}, @end, @ssrr={0x89, 0x23, 0xd2, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @private=0xa010100, @broadcast]}, @lsrr={0x83, 0x17, 0xfe, [@multicast1, @loopback, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x3f}, @multicast2]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x587}}], 0x118}, 0x4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f00000018c0)='\xc0\xd5{\xf0\xe6\xe6]g\xd6\xac\xc4\xea{\xc7\xb6\xe0a$\xa0\xfd\xe7\xf4\xe6\xb1m\r|\xcc\x87\xd8\x96:\x1c\xa8(G\xf4\b]\xe2\x9bk(\x0e)\xfd\xdcO\x1c\t\xf9>|j\xd4.t\xd3\x8e\x87\xcf`\xa2\x11\xcc^\xf7e1\xa0\xf5\xb4\x8dp\xb7X\xe4\\/cf\xf6b\xf8\xc9\xac\x1a+\xab\x8c\xc5\t\x0f\xf5\xda\xbe\xa7\xe2\xf09I8.\x1b\bu\xd7\x03~*yK\xdep\xa7\xfc@\xc8\x0e#\x83\x06\xa6\xdd\xe9') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4020940d, &(0x7f0000000300)=0x80000000000004) recvmsg(r7, &(0x7f0000000200)={&(0x7f00000000c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f0000000000)=""/51, 0x33}], 0x2, &(0x7f0000000280)=""/92, 0x5c}, 0x2102) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x72, 0x0, 0x7, 0x7f, 0x0, 0x80000001, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0xaaea, 0x9}, 0x31c0, 0x2, 0x1, 0x7, 0x7, 0x9, 0x6, 0x0, 0x7a, 0x0, 0x5}, r8, 0xf, r0, 0x1) 2.78930863s ago: executing program 0 (id=2186): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a060000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x28, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x35, 0x0, 0x7fffffff, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0]}, 0x40) 2.774730471s ago: executing program 0 (id=2188): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x7, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000000000000000048000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000010c0), 0xb}, 0x0, 0xc48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000010c0), 0xb}, 0x0, 0xc48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000cc0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03316844268cb89914f00800", 0x0, 0x23, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03316844268cb89914f00800", 0x0, 0x23, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000280)=""/15, 0xf, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0xc00}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001540)=@bpf_ext={0x1c, 0x11, &(0x7f0000001140)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000950000000000000018600000010000000000000001000000bf91000000000000b7020000010000008500000084000000b70000000000000095000000000000000000"], &(0x7f0000000d00)='syzkaller\x00', 0x1, 0x11, &(0x7f0000001040)=""/17, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001480)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000014c0)={0x4, 0xd, 0xffff, 0x1800000}, 0x3c, 0x11635, r4, 0x0, &(0x7f0000001500)=[r3, r3, r3], 0x0, 0x10, 0xe}, 0x94) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0a00000004000000080000000c00000000000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="9fd70000000008000000000000000000000000000000000000000000644c37ab1852807b401a6a07c8e4f62cd7640471e2331c0be9e33f82117b7c9fd5249a7189b55ec7e4b21a808549767550c459c83ef67048d1d12df4b4f2f0cc3f2448755a6f0903a95e346b8ba7f58db646e05342838dfa30692506d78a5d6fe27605941a7cb9753612e476a327022893454ee6661aafe3"], 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0a00000004000000080000000c00000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="9fd70000000008000000000000000000000000000000000000000000644c37ab1852807b401a6a07c8e4f62cd7640471e2331c0be9e33f82117b7c9fd5249a7189b55ec7e4b21a808549767550c459c83ef67048d1d12df4b4f2f0cc3f2448755a6f0903a95e346b8ba7f58db646e05342838dfa30692506d78a5d6fe27605941a7cb9753612e476a327022893454ee6661aafe3"], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r6}, 0xc) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYRES8=r1, @ANYRES32, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x0, 0x0, &(0x7f0000001080)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0xf5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) syz_clone(0x2100000, &(0x7f0000000080)="fe6f697ddca261961cbc51e7d4f8daa757c26fe248b976df8e11be551f4aad124e6d5e01c812f38028ab66bb71df29b908f0bb72a9a18d60b172aa8203233b2ce97127229fb6f47d85c9039253cc2e5beee857758d2bb93447a7e7c17277c358755f303f76c06e654bf3ea9d249f46e91a55cedddb0f7f32f1cf3c76673f6f315a957cbc05ed10e39a811efe427b16a2a551b5ef6589206c048e91469250fa6de703134842f879a3a6e37c05eb71d62280b4fe4b5c430a120cdf4c3eded3b336", 0xc0, 0x0, &(0x7f0000000200), &(0x7f0000000380)="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") bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=ANY=[@ANYRESDEC=r5, @ANYRESHEX=0x0, @ANYRES32=r7], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=ANY=[@ANYRESDEC=r5, @ANYRESHEX=0x0, @ANYRES32=r7], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000ec0)=ANY=[@ANYRES8, @ANYRES16, @ANYRES64=r1], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000ec0)=ANY=[@ANYRES8, @ANYRES16, @ANYRES64=r1], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) gettid() (async) gettid() r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="020000000408000000ff130002b6450096800000002ee43ed325d72718feac640115307da9e2e70b8d677a94f906a4a9d2265143d9b7f54fee45fb84c96d6071ea7279cbf86bd0c58dafc8a6be7b754db698a22030c9c12b6c2bd778299bc5f07e53b18012df5ba09dd8cf761d65680eaf3eac974b0adc6ac21ae964", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r9, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2.771147961s ago: executing program 3 (id=2189): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x62, 0x0, 0x1, 0x6, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffa, 0x6, @perf_bp={&(0x7f0000000040), 0xc}, 0xd213, 0xce65, 0x8000, 0x0, 0x1, 0x81, 0x0, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x2d, 0x8001}, 0x3, 0x101, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0xc1, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8, 0x7ff}, 0x410, 0x2000001, 0x0, 0x8, 0x8ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000060000000450000007"], 0x48) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$sock(r5, 0x0, 0x20040851) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0xd, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000003dc7000002"], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000004000000850000008a000000950000000000000006fa51c421cbc65fbc14b1ec88489bdffa"], &(0x7f0000000900)='GPL\x00', 0x3, 0x8a, &(0x7f00000000c0)=""/138}, 0x94) 2.592538847s ago: executing program 0 (id=2190): bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0xffffffff, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0004000071106b00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xb4, &(0x7f0000000540)}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {&(0x7f00000006c0)="97b13f5cf9", 0x5}], 0x3}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230041) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') 1.112934714s ago: executing program 3 (id=2202): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, 0x0, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x9, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f00000003c0)="f51f559c934242a941825ff2ab27f7a982883cc9f9f8cb8b459a5134f8a3aae2f140754b348d5087ee64e882d928b6969c41c4ae0c47b0e15d8794e9a6a3e420842dff5f16ba1ee0b47fc25ee8b52ee6d6625f58307a28820c338914764b51be3557a841378d88ae4ee1f150332ad6f8510733639b3d14b2e7fd57c5039cf555beed5c9f3ff9992b4a20a3a9af7164cf7f2b11c44b30720dbc5fc49cf88a77b4c6ba9980d891bfbed094974187840e67a3ae54a6f3bbdaa2617e6b1b8a8ca4dc57fb039f48d035928ef07e158a", &(0x7f0000000900)=""/170, &(0x7f0000000c40), 0x0, 0x80000001}, 0x38) mkdirat$cgroup(r1, &(0x7f0000000b80)='syz0\x00', 0x1ff) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c00), 0x8) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 1.058184146s ago: executing program 3 (id=2204): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ff0700000000000000000000aaacb7d42dbd1c6c8e255ff863b970d157ade9edb740c0e2079653133dea"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe8253446691d1519, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x10, 0x0, 0x10, 0x0, 0x0, 0x5d35, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@cgroup, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8b, 0x35}, [@call]}, 0x0, 0x4, 0x0, 0x0, 0x41100}, 0x94) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000020400000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014001200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r8) 1.018602008s ago: executing program 3 (id=2208): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x8, 0x0}, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32=r3, @ANYRESHEX=r3], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r4, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0xc, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffca}, 0x164) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0xfffffffe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) write$cgroup_pid(r7, &(0x7f0000000000), 0x12) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x3ff}, 0xc) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000300"/28], 0x50) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r12, @ANYBLOB="0000000002000020b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x230, &(0x7f0000002500)=""/4106, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x4a) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x196, 0x6e, &(0x7f0000000280)=""/110, 0x41100, 0x50, '\x00', r1, @fallback=0x2a, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x5, 0x10, 0x5}, 0x10, r3, r8, 0x2, &(0x7f0000000500)=[r9, r10, r11, r12, r13], &(0x7f0000000540)=[{0x4, 0x1, 0x7, 0x6}, {0x3, 0x3, 0x10}], 0x10, 0x80000000}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r14, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 948.59796ms ago: executing program 0 (id=2210): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000002"], 0x0, 0x26}, 0x28) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r1, @ANYBLOB="0000000002000000b705000008000000850000005d00000095"], &(0x7f0000000300)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000080)=ANY=[@ANYRES64=r2], 0x0, 0x404, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r3, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4b) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000d2000000000000000000001906c336dcec2f89a4d95d380f3a5e4cd5d4610bd1ae6ce2ebf2bba6fcf74fa1fc784a95fdee46e26ec86bbcc8b692c9094891fc7007dc60f043af684783f832635e0acec94a1bcfeecd3736619c37fe878c7ac5a37b25045244eb6400e8a0008fde92343a82222d3ceaa08ca86e3eed1787ca4399cd6ebcafe715c2eb160b0d6f816b9747a411679b4c202cc445e9c49f04a05cd00bd8c2628905575eaaa4f9081cefb1ef870b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 819.427864ms ago: executing program 0 (id=2213): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000380)={'gre0\x00', @remote}) 790.111075ms ago: executing program 1 (id=2216): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xa, 0x42, 0x40, 0xc0, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f0000000180)=""/40}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711845000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 785.229285ms ago: executing program 2 (id=2217): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000003000000000000000000000903000000000000000000000105000000080000000100000000000008000000000000000000000003000000000100000002000000000000000061"], 0x0, 0x5b}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 626.7367ms ago: executing program 2 (id=2218): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="d50a0000000000006111780000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xa, 0xc}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6a2e4e0ed11fabf6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) sendmsg$unix(r9, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2000000}, 0x10}, 0x94) 626.28399ms ago: executing program 1 (id=2219): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @ldst={0x1, 0x0, 0x2, 0x0, 0xa, 0xfffffffffffffff4, 0xfffffffffffffff0}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x7}]}, &(0x7f0000000840)='syzkaller\x00', 0x6, 0x67, &(0x7f0000000880)=""/103, 0x40f00, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x2fafa, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940), 0x10, 0x41e}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) (async) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x1fffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000000000000300000002"], 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="1800f0ff06000000000000000000000061120000000000e8cd00a0a73d00000000d88c480a3d15165ceeb4e6084e52c190b1ec5ecbab40bbc53761e21143431a2e9a944d42a30e3405172c0bb71c00ca3172d3c0602b185f30e7cb58d5843b63055f367d554e171e7354753a94b68591e1e7559a28c4a787fceea9bca0c5584ecfe18c357ba62721e537d9cbd18be51f96902468b43f083d962c61fb7033f39a8d2343f0c876d429affc95c2446d086d90b9907f9e540d267818db271373870b366d8fa492c5c52835d515efc5522d6dd3"], &(0x7f0000000140)='syzkaller\x00', 0x5, 0xec, &(0x7f0000000000)=""/236}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0xfffffe51) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305829, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0x4}, 0x11c03a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x157}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000dc0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/pid\x00') (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'nr0\x00', 0x31}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 556.245333ms ago: executing program 3 (id=2220): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0xe3, 0x0, 0x0, 0x7, 0x10000}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40047438, 0x3ba59a06df0f85b7) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x50}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x1, 0x2000}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0x4, 0x9, 0xb3, 0x0, 0x0, 0xe, 0xb310a, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x25f, 0x8}, 0x100000, 0x2, 0x5, 0x0, 0xb561, 0xe, 0xfffb, 0x0, 0x0, 0x0, 0x4}, r0, 0xb, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='1u'], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff0000000071100200000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r10 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, r8, 0x0, 0x0, 0x0}, 0x30) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 512.719604ms ago: executing program 1 (id=2221): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xd, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68881", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x3}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (rerun: 32) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="130000001000000002000000"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000001000000f9ff03ecdf9520a27f3f3cc90987b4ffffff78000000020008000c00c4eb69425e15cc58137876e5e01da868fff7dbf998e0ea878dd6a8f1ac067bfd8d611db4ed"], &(0x7f0000000040)=""/247, 0x1a, 0xf7, 0x1}, 0x20) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x33}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async, rerun: 64) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETIFF(r3, 0x5421, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="d0020000000400e7ff0700000001000000800000", @ANYRES32=r0, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="03000000020000000100"/28], 0x50) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x11, 0x0, r0, 0x6, '\x00', 0x0, r0, 0x0, 0x4, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10}, [@cb_func={0x18, 0x4e35ac8ea3b0c1fa}]}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xd5, &(0x7f0000000440)=""/213, 0x41000, 0x14, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0xe, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r5, r6, 0x1], 0x0, 0x10, 0x7}, 0x94) (async, rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async, rerun: 32) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 414.113287ms ago: executing program 2 (id=2222): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB="000002000000000000000000000000377823f60749fccfa59522e16934128638c10cc2fc406582bbfe2474bc421ada1e4763bbb4a1ca1c59b22329bad16c3c04ce5c828eaedc849607b49953e24a66316ddc0c5dfdca0a7762486b2eac13eafa7e0a9d1b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r4, 0x1}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) 413.776187ms ago: executing program 1 (id=2223): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xf, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x39, 0x0, &(0x7f00000000c0)="e460cdfbef2408002900119386dd6a00000000072beb3014cd3ec8a774c1e1380081ffad000400e8d50000000100000bb500000500242c1089", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="810000007300000084175ca4ec142f0604186a097f54e127290ab9e4f6272c"], &(0x7f0000000380)='GPL\x00', 0x9, 0xfd, &(0x7f0000000600)=""/253, 0x41000, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000740)=[{0x0, 0x2, 0x9, 0xb}, {0x4, 0x1, 0xc, 0x4}, {0x0, 0x2, 0xd, 0xb}]}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000009c0)={0x1, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1e, 0x4, &(0x7f0000000700)=ANY=[@ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', r5, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r9, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, r9, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x3, 0x7, &(0x7f0000000180)) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0x1b, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x1, 0xf, 0x1, 0x9, 0x4b3}, @generic={0x81, 0xd, 0xd, 0x8, 0x7}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0x7f, 0x9, 0x8, 0x0, 0x3ff}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000040)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000800)=""/4096, 0x41000, 0x2, '\x00', r5, @fallback=0x2c, r7, 0x8, &(0x7f0000000080)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0xd, 0x4}, 0x10, r10, r11, 0x2, &(0x7f0000000600)=[r2], &(0x7f0000000640)=[{0x5, 0x2, 0x8, 0x4}, {0x1, 0x1, 0x4, 0x2}], 0x10, 0x5}, 0x94) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r12, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1ffffffffffffc36, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x44, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 285.220351ms ago: executing program 2 (id=2224): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 64) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0x44) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="19f2ffff030000d43d413e5e173732abb4ef0004", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) close(0x3) 273.734761ms ago: executing program 1 (id=2225): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000500000028000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x9, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b700000018000000850000005000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000280), &(0x7f0000000240)=r3}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000f80)={r1}, 0xc) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40400, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000080)={'veth0_vlan\x00', 0x600}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1000000) 112.160797ms ago: executing program 2 (id=2226): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x84}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000200), &(0x7f00000004c0)=r1}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) (async) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8e480, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffff}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x8}}, 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 17.49745ms ago: executing program 1 (id=2227): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x28241, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x28241, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) (async) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="030000000400e900040700"/20, @ANYRES32=r0, @ANYBLOB='{\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000010000000300"/28], 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="030000000400e900040700"/20, @ANYRES32=r0, @ANYBLOB='{\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000010000000300"/28], 0x50) 0s ago: executing program 2 (id=2228): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9b}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000003000000000000000040000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4}, 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x21, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000780)="05002f", 0x3}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71ef2685634a8270e7123c00000000000000000000000000ac1414cf14"], 0xffdd) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.25' (ED25519) to the list of known hosts. [ 19.265546][ T24] audit: type=1400 audit(1774965326.309:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.266549][ T267] cgroup: Unknown subsys name 'net' [ 19.269093][ T24] audit: type=1400 audit(1774965326.309:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.273551][ T24] audit: type=1400 audit(1774965326.319:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.273706][ T267] cgroup: Unknown subsys name 'devices' [ 19.481460][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.487041][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.713046][ T24] audit: type=1400 audit(1774965326.759:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.724792][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.736359][ T24] audit: type=1400 audit(1774965326.759:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.769526][ T24] audit: type=1400 audit(1774965326.759:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.792758][ T24] audit: type=1400 audit(1774965326.789:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.792776][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.818126][ T24] audit: type=1400 audit(1774965326.789:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.818140][ T24] audit: type=1400 audit(1774965326.819:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.818154][ T24] audit: type=1400 audit(1774965326.819:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.550765][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.557813][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.565273][ T279] device bridge_slave_0 entered promiscuous mode [ 20.573994][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.581099][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.588352][ T276] device bridge_slave_0 entered promiscuous mode [ 20.600290][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.607317][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.614643][ T279] device bridge_slave_1 entered promiscuous mode [ 20.621190][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.628211][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.635555][ T275] device bridge_slave_0 entered promiscuous mode [ 20.642143][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.649153][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.656499][ T276] device bridge_slave_1 entered promiscuous mode [ 20.670295][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.677320][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.684636][ T275] device bridge_slave_1 entered promiscuous mode [ 20.719879][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.726918][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.734279][ T277] device bridge_slave_0 entered promiscuous mode [ 20.755357][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.762485][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.769799][ T277] device bridge_slave_1 entered promiscuous mode [ 20.776244][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.783311][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.790594][ T278] device bridge_slave_0 entered promiscuous mode [ 20.797338][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.804409][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.811776][ T278] device bridge_slave_1 entered promiscuous mode [ 20.944772][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.951822][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.959103][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.966138][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.978239][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.985320][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.992575][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.999606][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.014735][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.021788][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.029018][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.036045][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.063325][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.070378][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.077606][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.084631][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.098200][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.105284][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.112546][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.119658][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.129251][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.136800][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.144066][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.151620][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.158747][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.165947][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.173075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.180610][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.187694][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.194887][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.202038][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.213312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.227698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.236087][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.243128][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.250680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.258766][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.265792][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.283571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.291690][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.298680][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.306239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.314551][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.321579][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.328931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.353723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.361692][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.369802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.377143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.385465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.393652][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.400689][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.408078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.416371][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.423418][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.430718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.438803][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.445833][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.463420][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.471708][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.478705][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.486044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.494579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.502522][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.510402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.520183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.527586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.542934][ T275] device veth0_vlan entered promiscuous mode [ 21.549419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.557872][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.566813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.575033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.583089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.591191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.599026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.606880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.614825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.622289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.642127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.650686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.658735][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.665766][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.673663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.682046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.690226][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.697219][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.704569][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.712560][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.720547][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.728564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.743078][ T275] device veth1_macvtap entered promiscuous mode [ 21.754162][ T276] device veth0_vlan entered promiscuous mode [ 21.762593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.770909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.779110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.787428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.795773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.803514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.811855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.820174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.827888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.836026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.844050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.852079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.859526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.866891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.874315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.892149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.900547][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.908733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.917100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.925924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.934153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.942611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.950986][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.959827][ T279] device veth0_vlan entered promiscuous mode [ 21.968630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.976724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.989271][ T277] device veth0_vlan entered promiscuous mode [ 21.997044][ T278] device veth0_vlan entered promiscuous mode [ 22.003496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.011136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.018487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.026452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.034559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.042195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.058470][ T279] device veth1_macvtap entered promiscuous mode [ 22.065063][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 22.075692][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.084791][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.093136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.100833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.109243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.117833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.126257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.136341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.147823][ T276] device veth1_macvtap entered promiscuous mode [ 22.154648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.163002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.171561][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.179612][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.193005][ T277] device veth1_macvtap entered promiscuous mode [ 22.211257][ T278] device veth1_macvtap entered promiscuous mode [ 22.222561][ T297] cgroup: fork rejected by pids controller in /syz3 [ 22.230313][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.247558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.266052][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.273985][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.279469][ C1] hrtimer: interrupt took 28547 ns [ 22.306329][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.319589][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.327870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.349772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.358226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.367118][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.375446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.416119][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.430310][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.440125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.448377][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.546808][ T325] cgroup: syz.4.5 (325) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.572844][ T324] device syzkaller0 entered promiscuous mode [ 22.589607][ T325] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.694989][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.708562][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.718172][ T328] device bridge_slave_0 entered promiscuous mode [ 22.735982][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.747755][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.759931][ T328] device bridge_slave_1 entered promiscuous mode [ 22.878418][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.885562][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.892822][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.899839][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.916020][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.924078][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.931477][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.949739][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.959098][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.966160][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.984501][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.993339][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.000411][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.014848][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.034046][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.072712][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.176295][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.206604][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.220176][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.239026][ T328] device veth0_vlan entered promiscuous mode [ 23.273678][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.313633][ T328] device veth1_macvtap entered promiscuous mode [ 23.344581][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.431968][ T7] device bridge_slave_1 left promiscuous mode [ 23.443574][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.479997][ T7] device bridge_slave_0 left promiscuous mode [ 23.489659][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.498387][ T7] device veth1_macvtap left promiscuous mode [ 23.505308][ T7] device veth0_vlan left promiscuous mode [ 23.621284][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.300156][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 24.300165][ T24] audit: type=1400 audit(1774965331.349:115): avc: denied { write } for pid=434 comm="syz.2.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 24.662735][ T24] audit: type=1400 audit(1774965331.709:116): avc: denied { cpu } for pid=453 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.499657][ T24] audit: type=1400 audit(1774965332.549:117): avc: denied { read } for pid=497 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.286992][ T532] -: renamed from syzkaller0 [ 28.803292][ T24] audit: type=1400 audit(1774965335.839:118): avc: denied { create } for pid=538 comm="syz.4.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.622423][ T24] audit: type=1400 audit(1774965336.669:119): avc: denied { write } for pid=560 comm="syz.2.64" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.669912][ T557] device pim6reg1 entered promiscuous mode [ 30.008953][ T578] device syzkaller0 entered promiscuous mode [ 31.850785][ T24] audit: type=1400 audit(1774965338.899:120): avc: denied { create } for pid=694 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 33.136218][ T24] audit: type=1400 audit(1774965340.179:121): avc: denied { create } for pid=759 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 33.212002][ T760] device syzkaller0 entered promiscuous mode [ 33.495775][ T24] audit: type=1400 audit(1774965340.539:122): avc: denied { ioctl } for pid=753 comm="syz.1.114" path="net:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0x54d9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 33.748404][ T784] ÿÿÿÿÿÿ: renamed from vlan1 [ 33.756971][ T24] audit: type=1400 audit(1774965340.799:123): avc: denied { create } for pid=785 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 33.943418][ T794] device syzkaller0 entered promiscuous mode [ 34.047833][ T811] device veth1_macvtap left promiscuous mode [ 34.064129][ T811] device veth1_macvtap entered promiscuous mode [ 34.074812][ T811] device macsec0 entered promiscuous mode [ 34.220394][ T24] audit: type=1400 audit(1774965341.259:124): avc: denied { write } for pid=818 comm="syz.2.135" name="cgroup.subtree_control" dev="cgroup2" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 34.361059][ T24] audit: type=1400 audit(1774965341.329:125): avc: denied { open } for pid=818 comm="syz.2.135" path="" dev="cgroup2" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 34.610463][ T857] bridge0: port 3(veth1) entered blocking state [ 34.632984][ T857] bridge0: port 3(veth1) entered disabled state [ 34.653744][ T857] device veth1 entered promiscuous mode [ 34.673483][ T857] bridge0: port 3(veth1) entered blocking state [ 34.679790][ T857] bridge0: port 3(veth1) entered forwarding state [ 35.074360][ T863] device syzkaller0 entered promiscuous mode [ 35.368682][ T880] device syzkaller0 entered promiscuous mode [ 35.571762][ T894] device syzkaller0 entered promiscuous mode [ 37.159553][ T24] audit: type=1400 audit(1774965344.199:126): avc: denied { ioctl } for pid=943 comm="syz.4.169" path="socket:[17771]" dev="sockfs" ino=17771 ioctlcmd=0x2408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.223285][ T24] audit: type=1400 audit(1774965344.229:127): avc: denied { create } for pid=961 comm="syz.3.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 38.100648][ T987] bridge0: port 4(gretap0) entered blocking state [ 38.114959][ T987] bridge0: port 4(gretap0) entered disabled state [ 38.130903][ T987] device gretap0 entered promiscuous mode [ 38.146592][ T987] bridge0: port 4(gretap0) entered blocking state [ 38.153074][ T987] bridge0: port 4(gretap0) entered forwarding state [ 38.416881][ T24] audit: type=1400 audit(1774965345.459:128): avc: denied { append } for pid=1011 comm="syz.2.189" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.543074][ T1024] geneve0: tun_chr_ioctl cmd 1074025677 [ 38.553124][ T1024] geneve0: linktype set to 1 [ 38.899293][ T1045] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 38.920413][ T1045] device syzkaller0 entered promiscuous mode [ 38.935267][ T1048] : renamed from bond_slave_0 [ 39.063312][ T24] audit: type=1400 audit(1774965346.109:129): avc: denied { create } for pid=1060 comm="syz.4.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 39.582756][ T1084] device syzkaller0 entered promiscuous mode [ 39.882832][ T1118] device syzkaller0 entered promiscuous mode [ 40.369100][ T24] audit: type=1400 audit(1774965347.409:130): avc: denied { create } for pid=1177 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 40.453568][ T24] audit: type=1400 audit(1774965347.499:131): avc: denied { create } for pid=1195 comm="syz.4.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.514139][ T24] audit: type=1400 audit(1774965347.529:132): avc: denied { create } for pid=1197 comm="syz.3.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 40.782691][ T1225] device syzkaller0 entered promiscuous mode [ 40.823105][ T1220] device syzkaller0 left promiscuous mode [ 41.130763][ T24] audit: type=1400 audit(1774965348.179:133): avc: denied { create } for pid=1269 comm="syz.4.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 41.431806][ T1296] device dummy0 entered promiscuous mode [ 41.529628][ T1294] tap0: tun_chr_ioctl cmd 1074025675 [ 41.565304][ T1294] tap0: persist enabled [ 41.592105][ T1306] tap0: tun_chr_ioctl cmd 1074025675 [ 41.676187][ T1306] tap0: persist disabled [ 42.041306][ T24] audit: type=1400 audit(1774965349.089:134): avc: denied { create } for pid=1343 comm="syz.1.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 42.496629][ T1360] device syzkaller0 entered promiscuous mode [ 44.400025][ T24] audit: type=1400 audit(1774965351.449:135): avc: denied { create } for pid=1443 comm="syz.2.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 44.998994][ T1480] device team_slave_1 entered promiscuous mode [ 45.009894][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.026058][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.328292][ T1505] device syzkaller0 entered promiscuous mode [ 45.335413][ T24] audit: type=1400 audit(1774965352.379:136): avc: denied { create } for pid=1503 comm="syz.2.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 46.935496][ T24] audit: type=1400 audit(1774965353.979:137): avc: denied { create } for pid=1581 comm="syz.3.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 47.082960][ T24] audit: type=1400 audit(1774965354.129:138): avc: denied { create } for pid=1620 comm="syz.4.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 47.228803][ T1637] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 48.206823][ T1684] nr0: port 1(macsec0) entered blocking state [ 48.216947][ T1684] nr0: port 1(macsec0) entered disabled state [ 48.246643][ T1684] device macsec0 entered promiscuous mode [ 49.660082][ T24] audit: type=1400 audit(1774965356.709:139): avc: denied { create } for pid=1736 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 49.733786][ T24] audit: type=1400 audit(1774965356.779:140): avc: denied { create } for pid=1746 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 51.499949][ T1889] ------------[ cut here ]------------ [ 51.505424][ T1889] trace type BPF program uses run-time allocation [ 51.549661][ T1889] WARNING: CPU: 1 PID: 1889 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 51.579549][ T1889] Modules linked in: [ 51.597555][ T1889] CPU: 1 PID: 1889 Comm: syz.4.439 Not tainted syzkaller #0 [ 51.629573][ T1889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 51.648728][ T1889] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 51.655614][ T1889] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 51.689896][ T1889] RSP: 0018:ffffc90000f07448 EFLAGS: 00010246 [ 51.710070][ T1889] RAX: 755408c39f8de200 RBX: 0000000000000001 RCX: 0000000000080000 [ 51.723273][ T24] audit: type=1400 audit(1774965358.769:141): avc: denied { create } for pid=1912 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 51.743342][ T1889] RDX: ffffc90003d05000 RSI: 0000000000002fa5 RDI: 0000000000002fa6 [ 51.759543][ T1889] RBP: ffffc90000f07490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 51.779671][ T1889] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff88811c2d8000 [ 51.787706][ T1889] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888126e2f000 [ 51.821376][ T1889] FS: 00007f386190a6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 51.843468][ T1889] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.876870][ T1889] CR2: 0000000000000000 CR3: 0000000111ec5000 CR4: 00000000003506a0 [ 51.909370][ T1889] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 51.918101][ T1889] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 51.936390][ T1889] Call Trace: [ 51.940355][ T1889] ? __fdget+0x1a1/0x230 [ 51.944678][ T1889] resolve_pseudo_ldimm64+0x55e/0x1060 [ 51.950304][ T1889] ? bpf_check+0xdb10/0xdb10 [ 51.955824][ T1889] ? kvmalloc_node+0x88/0x130 [ 51.976932][ T1889] bpf_check+0x9058/0xdb10 [ 51.989585][ T1889] ? bpf_get_btf_vmlinux+0x60/0x60 [ 52.009848][ T1889] ? 0xffffffffa001ac40 [ 52.019741][ T1889] ? is_bpf_text_address+0x177/0x190 [ 52.039448][ T1889] ? selinux_bpf_prog_alloc+0x51/0x140 [ 52.045552][ T1889] ? __kernel_text_address+0xa0/0x100 [ 52.071389][ T1889] ? unwind_get_return_address+0x4d/0x90 [ 52.093285][ T1889] ? stack_trace_save+0xf0/0xf0 [ 52.103371][ T1889] ? arch_stack_walk+0xee/0x140 [ 52.108562][ T1889] ? stack_trace_save+0xa6/0xf0 [ 52.191884][ T1889] ? stack_trace_snprint+0xf0/0xf0 [ 52.197272][ T1889] ? __kasan_slab_alloc+0x69/0xf0 [ 52.260052][ T1889] ? pcpu_block_update+0x3ec/0x900 [ 52.289636][ T1889] ? selinux_bpf_prog_alloc+0x51/0x140 [ 52.295411][ T1889] ? selinux_bpf_prog_alloc+0x51/0x140 [ 52.306405][ T1889] ? __kasan_kmalloc+0xec/0x110 [ 52.328888][ T1889] ? __kasan_kmalloc+0xda/0x110 [ 52.334131][ T1889] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 52.339996][ T1889] ? selinux_bpf_prog_alloc+0x51/0x140 [ 52.345721][ T1889] ? security_bpf_prog_alloc+0x62/0x90 [ 52.361882][ T1889] ? bpf_prog_load+0x9d8/0x14a0 [ 52.366755][ T1889] ? __se_sys_bpf+0x49a/0x740 [ 52.382241][ T1889] ? __x64_sys_bpf+0x7b/0x90 [ 52.386868][ T1889] ? do_syscall_64+0x31/0x40 [ 52.392289][ T1889] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.399725][ T1889] ? memset+0x35/0x40 [ 52.409658][ T1889] ? bpf_obj_name_cpy+0x193/0x1e0 [ 52.419406][ T1889] bpf_prog_load+0xfca/0x14a0 [ 52.433067][ T1889] ? map_freeze+0x320/0x320 [ 52.437617][ T1889] ? selinux_bpf+0xc7/0xf0 [ 52.453565][ T1889] ? security_bpf+0x82/0xa0 [ 52.458112][ T1889] __se_sys_bpf+0x49a/0x740 [ 52.473747][ T1889] ? __x64_sys_bpf+0x90/0x90 [ 52.478381][ T1889] ? __kasan_check_read+0x11/0x20 [ 52.487478][ T1889] __x64_sys_bpf+0x7b/0x90 [ 52.496229][ T1889] do_syscall_64+0x31/0x40 [ 52.533542][ T1889] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.539513][ T1889] RIP: 0033:0x7f3862eaf819 [ 52.544024][ T1889] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 52.569625][ T1889] RSP: 002b:00007f386190a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.617887][ T1889] RAX: ffffffffffffffda RBX: 00007f3863128fa0 RCX: 00007f3862eaf819 [ 52.636711][ T1889] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 52.645652][ T1889] RBP: 00007f3862f45c91 R08: 0000000000000000 R09: 0000000000000000 [ 52.663828][ T1889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 52.714421][ T1889] R13: 00007f3863129038 R14: 00007f3863128fa0 R15: 00007ffc5c9f1d38 [ 52.724385][ T1889] ---[ end trace 5fb6d04b05600916 ]--- [ 53.003998][ T2022] device syzkaller0 entered promiscuous mode [ 53.043763][ T2030] device dummy0 left promiscuous mode [ 53.145499][ T2051] device syzkaller0 entered promiscuous mode [ 53.198199][ T2047] device syzkaller0 entered promiscuous mode [ 53.258558][ T2068] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 53.644061][ T2131] device syzkaller0 entered promiscuous mode [ 53.904816][ T2140] device pim6reg1 entered promiscuous mode [ 53.956958][ T2143] device syzkaller0 entered promiscuous mode [ 54.458551][ T24] audit: type=1400 audit(1774965361.499:142): avc: denied { create } for pid=2205 comm="syz.2.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 54.775927][ T2224] device syzkaller0 entered promiscuous mode [ 54.813646][ T2228] device syzkaller0 entered promiscuous mode [ 55.625452][ T24] audit: type=1400 audit(1774965362.669:143): avc: denied { create } for pid=2267 comm="syz.3.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 56.551845][ T24] audit: type=1400 audit(1774965363.599:144): avc: denied { create } for pid=2306 comm="syz.3.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.680604][ T2329] device syzkaller0 entered promiscuous mode [ 57.368478][ T2355] device syzkaller0 entered promiscuous mode [ 57.874204][ T24] audit: type=1400 audit(1774965364.919:145): avc: denied { ioctl } for pid=2374 comm="syz.3.568" path="" dev="cgroup2" ino=233 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 59.339368][ T24] audit: type=1400 audit(1774965366.379:146): avc: denied { create } for pid=2474 comm="syz.3.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 59.349850][ T2470] device syzkaller0 entered promiscuous mode [ 60.574456][ T24] audit: type=1400 audit(1774965367.619:147): avc: denied { create } for pid=2549 comm="syz.2.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 61.188882][ T2571] device syzkaller0 entered promiscuous mode [ 62.105652][ T2632] device syzkaller0 entered promiscuous mode [ 63.233447][ T2680] device syzkaller0 entered promiscuous mode [ 63.546659][ T2721] device syzkaller0 entered promiscuous mode [ 64.542494][ T2847] device syzkaller0 entered promiscuous mode [ 64.815908][ T2855] device lo entered promiscuous mode [ 65.366785][ T2897] device bridge0 entered promiscuous mode [ 65.473911][ T2900] device syzkaller0 entered promiscuous mode [ 65.723580][ T2935] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.730818][ T2935] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.003433][ T2976] device syzkaller0 entered promiscuous mode [ 66.010556][ T2982] syz.3.742[2982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.010610][ T2982] syz.3.742[2982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.145756][ T2994] device syzkaller0 entered promiscuous mode [ 66.999745][ T24] audit: type=1400 audit(1774965374.049:148): avc: denied { create } for pid=3051 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 68.710173][ T3163] device sit0 entered promiscuous mode [ 68.764817][ T3172] device syzkaller0 entered promiscuous mode [ 71.543785][ T3289] device syzkaller0 entered promiscuous mode [ 72.061157][ T24] audit: type=1400 audit(1774965379.109:149): avc: denied { create } for pid=3317 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 72.260217][ T24] audit: type=1400 audit(1774965379.309:150): avc: denied { create } for pid=3349 comm="syz.2.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 73.063721][ T3391] device syzkaller0 entered promiscuous mode [ 73.565605][ T3451] device syzkaller0 entered promiscuous mode [ 74.763144][ T3572] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 74.772372][ T3572] device syzkaller0 entered promiscuous mode [ 74.826542][ T3575] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.833671][ T3575] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.841382][ T3575] device bridge_slave_0 entered promiscuous mode [ 74.848199][ T3575] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.855327][ T3575] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.862839][ T3575] device bridge_slave_1 entered promiscuous mode [ 74.929248][ T24] audit: type=1400 audit(1774965381.969:151): avc: denied { create } for pid=3575 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.955368][ T24] audit: type=1400 audit(1774965381.999:152): avc: denied { write } for pid=3575 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.976299][ T24] audit: type=1400 audit(1774965381.999:153): avc: denied { read } for pid=3575 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.052952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.061342][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.105048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.126131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.134460][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.141533][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.148941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.157622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.166183][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.173235][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.184091][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.192254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.200556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.208665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.230165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.255110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.273544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.316531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.324891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.338983][ T3575] device veth0_vlan entered promiscuous mode [ 75.353557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.419585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.433378][ T3575] device veth1_macvtap entered promiscuous mode [ 75.591192][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.751882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.795557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.866127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.906780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.221994][ T3670] device syzkaller0 entered promiscuous mode [ 77.520410][ T303] bridge0: port 4(gretap0) entered disabled state [ 77.563393][ T303] device gretap0 left promiscuous mode [ 77.568879][ T303] bridge0: port 4(gretap0) entered disabled state [ 77.982929][ T303] device macsec0 left promiscuous mode [ 77.988541][ T303] nr0: port 1(macsec0) entered disabled state [ 78.103460][ T303] device veth1 left promiscuous mode [ 78.108823][ T303] bridge0: port 3(veth1) entered disabled state [ 78.174679][ T303] device bridge_slave_1 left promiscuous mode [ 78.235404][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.322403][ T303] device bridge_slave_0 left promiscuous mode [ 78.349282][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.390519][ T303] device veth1_macvtap left promiscuous mode [ 78.670918][ T3723] geneve1: tun_chr_ioctl cmd 1074025672 [ 78.676492][ T3723] geneve1: ignored: set checksum enabled [ 78.944058][ T3736] -1: renamed from syzkaller0 [ 80.127485][ T3821] device wg2 entered promiscuous mode [ 81.878515][ T3918] device veth1_macvtap left promiscuous mode [ 81.904904][ T3913] device veth1_macvtap entered promiscuous mode [ 81.922595][ T3913] device macsec0 entered promiscuous mode [ 82.143329][ T3930] : port 1(syz_tun) entered blocking state [ 82.155106][ T3930] : port 1(syz_tun) entered disabled state [ 82.161881][ T3930] device syz_tun entered promiscuous mode [ 82.214053][ T3936] device syzkaller0 entered promiscuous mode [ 83.796150][ T4070] device syzkaller0 entered promiscuous mode [ 83.889631][ T4079] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 83.939949][ T4079] device syzkaller0 entered promiscuous mode [ 84.795185][ T4102] device syzkaller0 entered promiscuous mode [ 85.454638][ T4120] device syzkaller0 left promiscuous mode [ 88.441080][ T4253] device syzkaller0 entered promiscuous mode [ 88.447754][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 88.532302][ T4278] device syzkaller0 entered promiscuous mode [ 89.225386][ T4308] device syzkaller0 entered promiscuous mode [ 89.358386][ T4319] €Â0: renamed from pim6reg1 [ 91.178314][ T4376] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.185512][ T4376] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.217008][ T4374] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.224096][ T4374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.231409][ T4374] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.238425][ T4374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.248334][ T4374] device bridge0 entered promiscuous mode [ 91.497924][ T4386] Â: renamed from pim6reg1 [ 92.341980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.361312][ T24] audit: type=1400 audit(1774965400.409:154): avc: denied { attach_queue } for pid=4467 comm="syz.2.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 94.852832][ T4496] device syzkaller0 entered promiscuous mode [ 94.879676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 96.091697][ T4509] device syzkaller0 entered promiscuous mode [ 96.298041][ T4516] tun0: tun_chr_ioctl cmd 1074025677 [ 96.399935][ T4516] tun0: linktype set to 804 [ 96.847312][ T4519] IPv6: pim6reg1: Disabled Multicast RS [ 97.319200][ T4542] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 97.705139][ T4562] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 97.996619][ T4591] device syzkaller0 entered promiscuous mode [ 103.670659][ T24] audit: type=1400 audit(1774965410.719:155): avc: denied { create } for pid=4803 comm="syz.2.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 103.681841][ T4802] device syzkaller0 entered promiscuous mode [ 104.493186][ T4878] device syzkaller0 entered promiscuous mode [ 104.933845][ T24] audit: type=1400 audit(1774965411.979:156): avc: denied { create } for pid=4916 comm="syz.0.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 106.160497][ T5005] device syzkaller0 entered promiscuous mode [ 106.245219][ T24] audit: type=1400 audit(1774965413.279:157): avc: denied { read } for pid=5011 comm="syz.0.1279" dev="nsfs" ino=4026532283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 106.327852][ T24] audit: type=1400 audit(1774965413.289:158): avc: denied { open } for pid=5011 comm="syz.0.1279" path="pid:[4026532283]" dev="nsfs" ino=4026532283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.774089][ T5120] batadv0: tun_chr_ioctl cmd 2148553947 [ 109.552705][ T5175] device syzkaller0 entered promiscuous mode [ 111.066276][ T5262] device wg2 entered promiscuous mode [ 111.389636][ T24] audit: type=1400 audit(1774965418.439:159): avc: denied { associate } for pid=5280 comm="syz.2.1357" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 111.797336][ T5299] device syzkaller0 entered promiscuous mode [ 112.160695][ T5314] cgroup: fork rejected by pids controller in /syz4 [ 112.170079][ T5335] syz.3.1368 uses obsolete (PF_INET,SOCK_PACKET) [ 114.260934][ T5448] device syzkaller0 entered promiscuous mode [ 114.591912][ T24] audit: type=1400 audit(1774965421.639:160): avc: denied { ioctl } for pid=5475 comm="syz.4.1399" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 116.520572][ T5565] syzkaller0: refused to change device tx_queue_len [ 117.115195][ T5605] device syzkaller0 entered promiscuous mode [ 117.373829][ T24] audit: type=1400 audit(1774965424.419:161): avc: denied { create } for pid=5637 comm="syz.4.1443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 119.488382][ T24] audit: type=1400 audit(1774965426.529:162): avc: denied { create } for pid=5752 comm="syz.3.1478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.072274][ T5890] device syzkaller0 entered promiscuous mode [ 121.128942][ T5891] device bridge_slave_1 left promiscuous mode [ 121.135484][ T5891] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.184881][ T5891] device bridge_slave_0 left promiscuous mode [ 121.197628][ T5891] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.467626][ T5922] device syzkaller0 entered promiscuous mode [ 121.829570][ T24] audit: type=1400 audit(1774965428.869:163): avc: denied { setattr } for pid=5979 comm="syz.2.1545" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 122.079890][ T5993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.670635][ T6010] device syzkaller0 entered promiscuous mode [ 123.679063][ T6062] device syzkaller0 entered promiscuous mode [ 123.889590][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 123.930269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 124.280639][ T6081] device veth0_vlan left promiscuous mode [ 124.294402][ T6081] device veth0_vlan entered promiscuous mode [ 124.461830][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.475252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.495211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 125.506734][ T6143] device syzkaller0 entered promiscuous mode [ 125.519992][ T6150] device veth0_vlan left promiscuous mode [ 125.526145][ T6150] device veth0_vlan entered promiscuous mode [ 125.542945][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.553021][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.563695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.298379][ T6242] device syzkaller0 entered promiscuous mode [ 128.823350][ T6301] device pim6reg1 entered promiscuous mode [ 128.839216][ T6307] device sit0 entered promiscuous mode [ 130.508646][ T6396] device macsec0 entered promiscuous mode [ 131.732628][ T6488] cgroup: fork rejected by pids controller in /syz0 [ 131.937134][ T6501] device syzkaller0 entered promiscuous mode [ 131.968988][ T6501] device syzkaller0 left promiscuous mode [ 132.074801][ T6503] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.089737][ T6503] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.109211][ T6503] device bridge_slave_0 entered promiscuous mode [ 132.174027][ T6503] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.213583][ T6503] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.263238][ T6503] device bridge_slave_1 entered promiscuous mode [ 132.351653][ T6520] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.358714][ T6520] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.366213][ T6520] device bridge_slave_0 entered promiscuous mode [ 132.373134][ T6520] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.380187][ T6520] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.387452][ T6520] device bridge_slave_1 entered promiscuous mode [ 132.394173][ T6503] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.401227][ T6503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.408456][ T6503] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.415482][ T6503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.450027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.458347][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.491940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.502958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.542937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.593187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.609293][ T6503] device veth0_vlan entered promiscuous mode [ 132.617495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.625958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.633796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.642019][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.675834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.704388][ T6503] device veth1_macvtap entered promiscuous mode [ 132.723652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.751256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.776155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.837601][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.851548][ T388] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.858595][ T388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.879602][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.914278][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.932461][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.939538][ T388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.954745][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.038015][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.050289][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.120063][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.138728][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.148632][ T6520] device veth0_vlan entered promiscuous mode [ 133.156319][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.164077][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.279211][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.292181][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.312058][ T6520] device veth1_macvtap entered promiscuous mode [ 133.359984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.368075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.384496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.423541][ T6699] device syzkaller0 entered promiscuous mode [ 133.447392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.461182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.991911][ T6724] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.006795][ T6724] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.022177][ T6724] device bridge_slave_0 entered promiscuous mode [ 134.060140][ T6724] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.074217][ T6724] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.091507][ T6724] device bridge_slave_1 entered promiscuous mode [ 134.125127][ T303] device bridge_slave_1 left promiscuous mode [ 134.133662][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.160465][ T303] device bridge_slave_0 left promiscuous mode [ 134.171008][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.187171][ T303] device bridge_slave_1 left promiscuous mode [ 134.198943][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.214758][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.233484][ T303] device veth1_macvtap left promiscuous mode [ 134.246444][ T303] device veth1_macvtap left promiscuous mode [ 134.259157][ T303] device veth0_vlan left promiscuous mode [ 134.706051][ T6781] device veth1_macvtap left promiscuous mode [ 134.957710][ T6794] device syzkaller0 entered promiscuous mode [ 134.994269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.026841][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.054651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.067767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.080285][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.087362][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.117740][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.127930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.136714][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.143784][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.156392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.182494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.191154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.401575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.420899][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.433724][ T6724] device veth0_vlan entered promiscuous mode [ 135.479351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.489808][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.513304][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.543324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.559350][ T6724] device veth1_macvtap entered promiscuous mode [ 135.571432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.580144][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.588330][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.616706][ T6835] device dummy0 entered promiscuous mode [ 135.623033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.635152][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.648217][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.661603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.095025][ T303] device veth1_macvtap left promiscuous mode [ 140.302747][ T6995] device syzkaller0 entered promiscuous mode [ 141.541720][ T7054] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.151282][ T7093] device syzkaller0 entered promiscuous mode [ 142.256856][ T7140] device syzkaller0 entered promiscuous mode [ 142.347066][ T7142] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 142.354968][ T7142] pim6reg0: linktype set to 768 [ 142.365371][ T7142] pim6reg0: tun_chr_ioctl cmd 35108 [ 144.230613][ T7258] veth1_to_hsr: mtu less than device minimum [ 145.716982][ T7348] device syzkaller0 entered promiscuous mode [ 145.749662][ T7348] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 145.858685][ T7351] device macsec0 entered promiscuous mode [ 146.802632][ T7392] device aaaaaaaaaaaaaaa entered promiscuous mode [ 146.863034][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 146.881541][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.502837][ T7494] lo: mtu less than device minimum [ 147.615411][ T7504] device syzkaller0 entered promiscuous mode [ 147.915257][ T7525] device syzkaller0 entered promiscuous mode [ 148.244889][ T7543] device veth0_vlan left promiscuous mode [ 148.251892][ T7543] device veth0_vlan entered promiscuous mode [ 148.312732][ T7546] device syzkaller0 entered promiscuous mode [ 148.326258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 148.855433][ T7578] device wg2 entered promiscuous mode [ 149.762116][ T7604] device syzkaller0 entered promiscuous mode [ 149.827168][ T24] audit: type=1400 audit(1774965456.869:164): avc: denied { create } for pid=7599 comm="syz.1.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 150.606113][ T7688] cgroup: fork rejected by pids controller in /syz2 [ 151.004155][ T279] device syz_tun left promiscuous mode [ 151.011863][ T279] : port 1(syz_tun) entered disabled state [ 151.318792][ T7834] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.345807][ T7834] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.352886][ T7834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.376876][ T7834] device bridge0 entered promiscuous mode [ 151.683817][ T7835] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.702521][ T7835] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.787661][ T7835] device bridge_slave_0 entered promiscuous mode [ 151.930798][ T7835] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.023210][ T7835] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.149946][ T7835] device bridge_slave_1 entered promiscuous mode [ 152.945859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.971679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.031729][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.046602][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.074780][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.081889][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.102245][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.124582][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.146958][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.154043][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.264759][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.281664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.320187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.334659][ T7835] device veth0_vlan entered promiscuous mode [ 153.356014][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.374713][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.390275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.410097][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.434084][ T7835] device veth1_macvtap entered promiscuous mode [ 153.464679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 153.477795][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.480851][ T7928] syz.1.2030[7928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.485765][ T7928] syz.1.2030[7928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.496435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.546973][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.586606][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.644246][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.734091][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.889075][ T7944] device syzkaller0 entered promiscuous mode [ 155.445855][ T303] device bridge_slave_1 left promiscuous mode [ 155.475574][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.605970][ T303] device bridge_slave_0 left promiscuous mode [ 155.612421][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.659327][ T303] device veth0_vlan left promiscuous mode [ 156.180216][ T8031] device syzkaller0 entered promiscuous mode [ 156.354009][ T8067] sock: sock_set_timeout: `syz.2.2064' (pid 8067) tries to set negative timeout [ 159.144161][ T8172] device syzkaller0 entered promiscuous mode [ 159.978357][ T8189] device syzkaller0 entered promiscuous mode [ 160.389310][ T8204] @ÿ: renamed from bond_slave_0 [ 160.910929][ T8216] device syzkaller0 entered promiscuous mode [ 162.165567][ T8263] device syzkaller0 entered promiscuous mode [ 163.847103][ T8365] device sit0 entered promiscuous mode [ 164.047640][ T8397] device syzkaller0 entered promiscuous mode [ 164.268060][ T8407] device syzkaller0 entered promiscuous mode [ 165.784439][ T8482] device aaaaaaaaaaaaaaa entered promiscuous mode [ 165.810835][ T8486] device veth0_vlan left promiscuous mode [ 165.836759][ T8486] device veth0_vlan entered promiscuous mode [ 165.924864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.936423][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.956466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.971346][ T8489] device wg2 left promiscuous mode [ 166.185291][ T8488] device wg2 entered promiscuous mode [ 167.847932][ T8537] device syzkaller0 entered promiscuous mode [ 167.859136][ T8537] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 167.875582][ T8535] syzkaller0: mtu greater than device maximum [ 169.333540][ T1172] ------------[ cut here ]------------ [ 169.339028][ T1172] kernel BUG at kernel/bpf/arraymap.c:993! [ 169.386172][ T1172] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 169.392275][ T1172] CPU: 0 PID: 1172 Comm: kworker/0:12 Tainted: G W syzkaller #0 [ 169.401285][ T1172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 169.411347][ T1172] Workqueue: events prog_array_map_clear_deferred [ 169.417755][ T1172] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 169.423971][ T1172] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 169.443553][ T1172] RSP: 0018:ffffc90000ea7c18 EFLAGS: 00010293 [ 169.449595][ T1172] RAX: ffffffff817b4f8b RBX: ffff888116c990d0 RCX: ffff888119264f00 [ 169.457569][ T1172] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 169.465518][ T1172] RBP: ffffc90000ea7c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 169.473474][ T1172] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 169.481421][ T1172] R13: ffff88810ab50480 R14: 0000000000000001 R15: ffff88810ab50400 [ 169.489365][ T1172] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 169.498263][ T1172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.504852][ T1172] CR2: 00007f26dc929ff8 CR3: 0000000125c3c000 CR4: 00000000003506b0 [ 169.512851][ T1172] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 169.520812][ T1172] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.528768][ T1172] Call Trace: [ 169.532050][ T1172] ? bpf_prog_6b48f2853ccda4ef+0xb/0x64 [ 169.537570][ T1172] fd_array_map_delete_elem+0x14c/0x250 [ 169.543092][ T1172] prog_array_map_clear_deferred+0x9e/0x140 [ 169.548994][ T1172] process_one_work+0x6e1/0xba0 [ 169.553825][ T1172] worker_thread+0xa6a/0x13c0 [ 169.558480][ T1172] kthread+0x346/0x3d0 [ 169.562522][ T1172] ? worker_clr_flags+0x190/0x190 [ 169.567524][ T1172] ? kthread_blkcg+0xd0/0xd0 [ 169.572086][ T1172] ret_from_fork+0x1f/0x30 [ 169.576477][ T1172] Modules linked in: [ 169.582076][ T1172] ---[ end trace 5fb6d04b05600917 ]--- [ 169.587560][ T1172] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 169.594148][ T1172] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 169.614244][ T1172] RSP: 0018:ffffc90000ea7c18 EFLAGS: 00010293 [ 169.620530][ T1172] RAX: ffffffff817b4f8b RBX: ffff888116c990d0 RCX: ffff888119264f00 [ 169.630159][ T1172] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 169.638141][ T1172] RBP: ffffc90000ea7c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 169.646389][ T1172] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 169.654554][ T1172] R13: ffff88810ab50480 R14: 0000000000000001 R15: ffff88810ab50400 [ 169.662747][ T1172] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 169.671714][ T1172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.678352][ T1172] CR2: 00007f75f0504ff8 CR3: 000000010d4fb000 CR4: 00000000003506b0 [ 169.686340][ T1172] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 169.694351][ T1172] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.702356][ T1172] Kernel panic - not syncing: Fatal exception [ 169.703644][ T24] audit: type=1400 audit(1774965476.749:165): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 169.708689][ T1172] Kernel Offset: disabled [ 169.734659][ T1172] Rebooting in 86400 seconds..