last executing test programs: 21.472450853s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 18.211554887s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 14.457832284s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 11.108265014s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 6.734499075s ago: executing program 2 (id=1921): perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000600000000000000850000009e0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000000000000000e300850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x4, '\x00', 0x0, r2, 0x1, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000300)={'caif0\x00'}) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100)=0x1, 0x12) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r7, 0x0}, 0x20) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0xb, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffc01}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}]}, &(0x7f0000000380)='syzkaller\x00', 0x1ff, 0xc0, &(0x7f00000007c0)=""/192, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x2, 0x5, 0x401}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000880)=[r3, r2, r5, r7, r3, r7, r4, r5, r3, r7], &(0x7f00000008c0)=[{0x5, 0x5, 0x10, 0xc}, {0x5, 0x3, 0x2}], 0x10, 0x4}, 0x94) (async) write$cgroup_pid(r7, &(0x7f0000000340), 0x12) (async) write$cgroup_pid(r5, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r5, 0x0, 0x2, 0x0) (async) write$cgroup_type(r5, &(0x7f0000000080), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 6.439122134s ago: executing program 2 (id=1924): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381"], 0xfdef) (async) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/pid_for_children\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800700}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async, rerun: 64) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="0200"], 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@cgroup=r7, r6, 0x2, 0x6, 0x4000}, 0x10) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x41, &(0x7f0000000100)=r9, 0x4) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 6.437288424s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 4.518092345s ago: executing program 4 (id=1927): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x4a}, 0x28) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x101}, 0x0, 0x400000, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x37}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x26, 0x4, 0x0, 0x0, 0x0, 0x4, 0x4975e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x20000001}, 0x10008, 0x6, 0x8, 0x1, 0x8, 0x5, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000900)="b9ff0300600d698cff9e14f008004c", 0x0, 0xffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 4.517445455s ago: executing program 2 (id=1928): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000008000000001"], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000060000850000001b000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) close(0x4) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@fallback=r2, 0x1f, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x44, 0x0, 0x0, 0xe, 0x4, 0x1}, @func_proto, @typedef={0x0, 0x0, 0x0, 0x10, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a40)={r4, 0x58, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x6, 0x14, &(0x7f0000000740)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x5}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x81}}, @alu={0x4, 0x0, 0x1, 0x6, 0xa, 0xffffffffffffffe0, 0x1}, @call={0x85, 0x0, 0x0, 0x78}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffff0}, @jmp={0x5, 0x1, 0xd, 0x5, 0xa4a39359fb55c4c6, 0x6, 0x1}, @alu={0x4, 0x0, 0xd, 0x4, 0x8, 0xffffffffffffffc0, 0x46f7d515c5b8d7f0}], &(0x7f0000000880)='syzkaller\x00', 0xf6b, 0xd2, &(0x7f00000008c0)=""/210, 0x41000, 0x30, '\x00', r6, 0x25, r3, 0x8, &(0x7f0000000a80)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0xa, 0x10000, 0x9}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000b00)=[r4, r3, r3, r4], &(0x7f0000000b40)=[{0x3, 0x4, 0xe}, {0x2, 0x3, 0xa, 0xb}, {0x0, 0x3, 0x7, 0xa}, {0x4, 0x3, 0x6, 0x7}, {0x1, 0x4, 0x5, 0x6}, {0x4, 0x4, 0x7, 0x8}, {0x4, 0x2, 0x7, 0xb}, {0x3, 0x5, 0x8, 0x14}, {0x0, 0x2, 0xe, 0xc}, {0x1, 0x2, 0x4}], 0x10, 0xffff}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="b702000026000000bfa300000000000005000000000000007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67d5b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e6a9f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d996d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0183babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289c2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007976699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d250721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e671282a2d3066ac968c7d7d7db195f255b1b4a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f512493af8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f74b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b2c16bd94d2da66059de81abfa15eeeae3b0ba38d8bb1bf032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c095162b82ceaeaae9b1713b5fb3832ee68e2b53d44bd84bf6770157e96bbb96b5e1f165c87e7a9a7d53c281d88ebb175a4dbb82130e6870980e47913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3df3572a7d9ef5f6103997f1f9e4b0c3970bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bff000000000000000000000000000000000000000000000079aaf19bd1e18f582aac5b83d76bd50eee7c16dfdf09b5783defef3bfa7297512fdcdad18bcf2455bc80394d8f34e2ef84f33038f4b6ef516d7baa99f24f2f100fc46aec"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0xc, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000005c0)="a75f04ebffffff6f2f3534fdb867", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="05000000040000c304b0312009000000080009009d8c0a97073bbf", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000), 0xfdef) 4.408356043s ago: executing program 4 (id=1930): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xae6, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2}, 0x50) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x9, 0x27, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x4, 0x0, 0xa, 0x2, 0x7, 0xffffffffffffffff, 0xffffffffffffffff}, @generic={0xa4, 0x9, 0x5, 0x8, 0xc6b}, @ldst={0x3, 0x3, 0x0, 0xf, 0x9, 0x1, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @generic={0x3, 0xf, 0x6, 0xffff, 0x5}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit, @printk={@u}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='syzkaller\x00', 0xf77, 0xa7, &(0x7f0000000480)=""/167, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=[r2, r0, r3], &(0x7f0000000640)=[{0x3, 0x4, 0x0, 0x1}], 0x10, 0xfffffffb}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.407521313s ago: executing program 2 (id=1931): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000010880)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000010400)={0x11, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000040000001802000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x4240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000180)="c1dfb080cd21d308098ee68888a8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{0x0}], 0x1}, 0x12) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 4.385306107s ago: executing program 4 (id=1932): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x10506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000801, 0x1}, 0x7402, 0x2, 0x0, 0x9, 0x0, 0xffffffff, 0x46}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xda1a}, [@generic={0x6b, 0x1, 0x1, 0x1a}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x126400, 0x0, 0x0, 0x0, 0x0, 0x0) 4.213582616s ago: executing program 2 (id=1933): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f092dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x4, 0x0, &(0x7f00000002c0)="00000002", 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, &(0x7f0000000300), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0500000007000000080000000500000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000088ad1f81550c0fec1855fd8172f3446cde864fef", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r5, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.099190915s ago: executing program 4 (id=1934): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="100000000000000001000000f2ffffff100000000000000001000000050000004dc6166ba56519bcd48949efd6308e5be77f894c84f276192bec7f169061dea36c4394fd69621007876d760b0b6404a6ed00df74c479a09bb104bc3aa81f91b72a00d46d99e3c9cbbd251f8b2611aed6191afd978e0f98faba253fd0679d20b444689111fa686f4a95618fc575eac454573271987499e7dd7a72a6c741b4dd80116ab81444861ced433cac2930e8b59bcd8be58ac6ce76a9cb72e9df99eef5536c5639d6fb29f538bf4590964ab2c9d2b28de8a1773b978d7d2bce35512fa967deb72b139fff98af818ea00920afa32414426117"], 0x20}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="85000000a0000000720a00ff000000005500000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500000000000000950000000000000050120aab7e551e53e9112155f41ba2fbb53badfbabd1dbffcb0968a9220472a22b2ff72c57f17d9d6164374cf645cdc6dfbbeac98861ccc49d94be941424a57584f3de24dad568920f5647b3a6060b2f858b5afaa660b6fff27ac7a1c8931d7a27793d09936b676d09"], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x0, 0xe, '\x00', 0x0, @cgroup_sock}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$unix(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)="b324", 0x2}], 0x1, 0x0, 0x0, 0x800}, 0x40044) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x1a, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x2}}, 0x0, 0x4, 0xd2, &(0x7f0000000040)=""/210}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x24}, 0x94) 3.220632772s ago: executing program 3 (id=1940): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000080000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000080000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 3.002164368s ago: executing program 1 (id=1943): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@ifindex=0x0, 0x5, 0x0, 0x7fff, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@map, r1, 0x14, 0x20, 0x0, @void, @void, @void, @value=r4, r3}, 0x20) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r5, 0xffffffffffffffff, 0x0, r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1b, 0x1b, 0x4, [@datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x3, 0x6}], "991019"}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000005c0)=""/128, 0x38, 0x80, 0x0, 0xa}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x7, 0xf06, 0x20f3, 0x2461, 0xffffffffffffffff, 0x6, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x7}, 0x50) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x50) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x200, 0x0, 0xffffffffffffffff, 0xf, '\x00', r2, 0xffffffffffffffff, 0x5, 0x1}, 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x5, 0x5, 0xfffffff0, 0x48, 0x1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x3, 0x5, 0xd}, 0x50) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0x1a, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf054, 0x0, 0x0, 0x0, 0x2}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xead}}, @alu={0x7, 0x0, 0xa, 0x8, 0x6, 0xfffffffffffffff8, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x3, 0x1, 0x6, 0x6, 0x8}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x9, 0x5, 0xb, 0x10, 0x8}, @ldst={0x2, 0x0, 0x4, 0x6, 0xb, 0x2, 0x1}]}, &(0x7f0000000540)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, '\x00', r2, 0x0, r7, 0x8, &(0x7f0000000680)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0xa, 0x11}, 0x10, 0x302cb, r1, 0x6, &(0x7f0000000980)=[r8, 0xffffffffffffffff, 0x1, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x3, 0x3, 0x8, 0x4}, {0x0, 0x5, 0x3, 0xc}, {0x4, 0x1, 0x7, 0x9}, {0x4, 0x1, 0x7, 0x5}, {0x3, 0x2, 0x1, 0x9}, {0x4, 0x5, 0xe}], 0x10, 0x6a}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000b00)={r5, r1, 0x4, r10}, 0x10) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000b40)={r5}, 0x8) recvmsg$unix(r13, &(0x7f0000001f40)={&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000001e80)=[{&(0x7f0000000c00)=""/134, 0x86}, {&(0x7f0000000cc0)=""/214, 0xd6}, {&(0x7f0000000dc0)=""/51, 0x33}, {&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/125, 0x7d}], 0x5, &(0x7f0000001f00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40002024) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002000)=@o_path={&(0x7f0000001fc0)='./file0\x00', 0x0, 0x10, r12}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f80)={@ifindex=r2, r15, 0x5, 0x0, r13, @void, @value=r16, @void, @void, r3}, 0x20) r17 = gettid() write$cgroup_pid(r16, &(0x7f0000002040)=r17, 0x12) r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002300)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8001, '\x00', r2, r12, 0x5, 0x3, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002400)={0x11, 0x1e, &(0x7f0000002080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002180)='GPL\x00', 0x5, 0xc0, &(0x7f00000021c0)=""/192, 0x41100, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000022c0)={0x4, 0x1, 0xfb3, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002380)=[r13, r18], &(0x7f00000023c0)=[{0x3, 0x5, 0xf, 0xa}, {0x3, 0x3, 0x6, 0xb}], 0x10, 0x6}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000024c0)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000002500)={r14, r19}, 0xc) socketpair(0x2c, 0x4, 0x3, &(0x7f0000002540)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002580)={r4}, 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000002680)) 2.975360672s ago: executing program 3 (id=1944): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000200), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4fb5b6f85a83c771}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2c, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000007d40)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r4}, 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x11, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40002}, [@call={0x85, 0x0, 0x0, 0x53}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="b34715ecd04550d3abc89b6f7bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f00000000c0)={'team_slave_1\x00', @random="01324336b1ff"}) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000feffffff8500000007000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300009362c12a300c232f831260b486bae12b7ab726e18c899074a4396efb9b931f06b8042b46abeae2bedb1b3e8448f0450e3e6c85c7519c39aa6f03b646fa327022873b11586c4f1507c31d60023dea3258c59d4d780017d86c62c75246855a6cf55405b6997da8378f11906fd199f8e174cfb24efda2d538aeb6584a6dcf7f3dad4f458149bad4", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a70000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r8}, 0xc) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffffac14140a000000000000000000000000ac1414aa"], 0xfdef) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0x4e6a1fcc) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000180)={r0}, 0x8) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r11}, 0x8) 2.974240483s ago: executing program 1 (id=1945): perf_event_open(&(0x7f0000000800)={0x2, 0xca, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800000000000800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000010008500000023000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000000a80)={'dummy0\x00'}) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x3, 0x8, 0x2, 0x0, 0x1ff, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x2, 0x4}, 0xca03, 0x7, 0xfffffffc, 0x7, 0xd0700, 0x4, 0x3ff, 0x0, 0xffff52d1, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000b80)={0x5, 0x80, 0x5, 0x7, 0x6, 0x7, 0x0, 0xfffffffffffffffc, 0x8002, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x41, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffffffffa0c5}, 0x1, 0x6, 0x2, 0x9, 0x1af0c075, 0x2, 0x8, 0x0, 0x585f, 0x0, 0x506640c1}, r3, 0x0, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70400000800000085000d007800fc0095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r7, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x249d, 0x4, @perf_config_ext={0x8000000000000001, 0x8}, 0x7602, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x44a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_type(r8, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r9, &(0x7f0000000280), 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400000000000000dd42857418430a00000000000000009500"/37], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) r10 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000080), 0x12) 2.835405806s ago: executing program 3 (id=1946): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10000000040000000800000005"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095", @ANYRES16=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7df}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8128, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x100004}, 0x6000, 0xc8, 0x0, 0x7, 0x0, 0x0, 0xffff, 0x0, 0xffffffe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xffc0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={&(0x7f0000000200)='./file0\x00', r6, 0x4000, r2}, 0x18) write$cgroup_pressure(r5, &(0x7f00000001c0)={'some', 0x20, 0x0, 0x20, 0xb0d}, 0x2f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000340)="b9ff03076804268c989e14f0e69e45", 0x0, 0x53f, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.833996336s ago: executing program 1 (id=1947): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ff07000000000000850000002a00000018010000646c6c2500000002002020207b1af8ff0000697b76c7cc000000000007010000f8ffffffb702000008000000b703000000009cd47c26fea2eba924c12b1c0000950000007200d728f9a2698a8acf000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="06000000040000001810000089"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r0, 0x0, 0x7}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) recvmsg$unix(r5, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x20) sendmsg$unix(r6, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18, 0x80}, 0x40000) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc9, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xffffff81}, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000005c0), 0x12) r10 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() sendmsg$unix(r11, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c18345e2b4f02ff}, 0x20020014) recvmsg(r12, 0x0, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="06000000040000000900000008"], 0x50) 2.663845045s ago: executing program 3 (id=1948): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x9, 0x4, 0x0, 0x1, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff, 0x3, 0x4, 0x6}, 0x48) close(r1) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x101048, 0x0, 0x0, 0x0, 0x101, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x6}, {0xe, 0x1}]}]}, {0x0, [0x0, 0x2e, 0x2e, 0x5f, 0x61]}}, &(0x7f0000000000)=""/147, 0x3b, 0x93, 0x1}, 0x28) setsockopt$sock_attach_bpf(r2, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="3f19", 0x2}], 0x1}, 0x4000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='$\x9c,%+\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x10060) 2.662648825s ago: executing program 3 (id=1949): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x16, 0x200000000000011d, &(0x7f0000001040)=ANY=[@ANYBLOB="39f9bd7456a34dd30000000000000000d7df5151ac4dfdaa19272d36b17dfc93b66513c7a9e33dc32a9b5b34364db9af24b6b9c952cfc22f7616bf2e2a508f378ef320d55b699698a62706ad260895a1aa7e182d195b13db374fac9a9f02a9b02c7128da437e288acf9188d5559df9cd69a4a38a6a43777c9970e3abef46ed9e55c2c19cb93150cc599d43b6c0283548c74955515bceb0611901293d173bb58516a72dc0a4e45b914fa0a7b90ff85f6fd4f2344c6b4e1a65078b900f0fd635fef3d205a12d23c81c6cb40d83c5a739efc56fa5988c5b0366670a7cf150c596ae05ff52b2b7ae4c2ae6b20665dbee1d35db4c02e4a7b0c940594aa387d9c4c35e09a934948791b88fecf5182ce19deac9b339f2bcef2ddaef3832bb7b86da33c4d6ce0c85ea581a71073c46a781c53c8f6e8dd8f019b8f9a8c0111deff2808a39c0f6cc1badf29432c90bc82967b207caf1b450dda803f75313e5db1e573994fb0a976b86a9667b90106974a4ca4a94626a211c6a6ec0ba36f716b85735e3e9e7e9d5a4b87d29fb6ad96770a189d8016cb33a293fa85ea357a196e0a913bbc00c5d4f8c51c529cf0bac06a0e8663665e2299652f30f8d2fdd278c9a5dcf48a1fb98176c7c5929f42c6d5347f604fb8e1295d44834a293da50"], &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r7, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x10042) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000b7cff78089403875c0fece05035368d420e4c81cc66b9afb35ac7eb265f1c919e55637555323fe5961eeccb8db80940f15a974547ba55d40ade9b78a35cab64f436f630906e9c7cc87371ca4be877ac473d327bb0f14c25a5c26010300656e5ce6284f30a1671eafa357d1599cae41c708d1559e3d4e5c3982f8bfdfa7df1420438049c6b6c3a4bdfe48bf0a2d17a0e72c06e9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r12 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4f75e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x5}, 0x10008, 0x3, 0x8, 0x1, 0xb, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r11}, &(0x7f0000000000), &(0x7f0000000140)=r1}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f00000002c0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0)=r14, 0x4) sendmsg$inet(r10, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) 2.57438019s ago: executing program 1 (id=1950): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x500, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0xff, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(r0, &(0x7f0000000000)={'c', ' *:* ', 'm\x00'}, 0x8) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000f40)={@cgroup=r3, 0xb, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.217969639s ago: executing program 1 (id=1951): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bfa2005d055e1240f1cd2100f8ffffffb703000008000000b704001f0000000085000000030000009500000000000000007f000000000000cacd000000000000ea01c81b26fa4d2cf8a157a2e440c8fb8ab234fac049c27d44d9e0d3964ee79fc6af35a576af079d21918ef9f69de838442b8339368c9f616784532d0199ecae0500356bdf2218010d082f7a72f7588434e2ee7d6e021e3171"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.110001797s ago: executing program 0 (id=1371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="f59a00000000000018100020", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000240)=""/218, 0x32, 0xda, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200fff78500000086000000850000007d000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000009e00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x19, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r9}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf82}}, @map_val={0x18, 0xb, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}], &(0x7f0000000580)='GPL\x00', 0xa, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x10, '\x00', r11, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x5}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x4, 0x1, 0x8}, {0x1, 0x1, 0x7, 0xb}, {0x2, 0x3, 0x9}, {0x3, 0x3, 0x8, 0x1}], 0x10, 0x3}, 0x94) 7.579428ms ago: executing program 1 (id=1952): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x2, 0x4, 0x9}, 0x50) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x2, [@enum={0x1, 0x7, 0x0, 0x6, 0x4, [{0x1, 0x101}, {0x0, 0x8}, {0x9, 0x10001}, {0x6, 0xffffffff}, {0x2}, {0x6}, {0x5, 0x3}]}]}}, &(0x7f00000003c0)=""/198, 0x5e, 0xc6, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000002000000850000002300000c95"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000002000000850000002300000c95"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r3, 0x0, 0x0) (async) write$cgroup_devices(r3, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x3, 0x4, 0x4, 0x6, 0x244c1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000004000000040000000000010000000000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000403000000e6ffffffffff4bb6e5b382128316000000000000"], 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000004000000040000000000010000000000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000403000000e6ffffffffff4bb6e5b382128316000000000000"], 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001c40)={r8, 0x58, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x12, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1d78, 0x0, 0x0, 0x0, 0x80000001}, [@ldst={0x3, 0x1, 0x1, 0x2, 0x3, 0xf6, 0xffffffffffffffff}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x3, 0x1, 0x0, r7}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x4}]}, &(0x7f0000000840)='GPL\x00', 0x3, 0x6c, &(0x7f0000000880)=""/108, 0x41100, 0x69, '\x00', r9, 0x25, r3, 0x8, &(0x7f0000000900)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x5, 0xd, 0x3000, 0x40}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000980)=[{0x4, 0x4, 0x3, 0x5}, {0x3, 0x2, 0x3, 0x2}], 0x10, 0x2}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x12, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1d78, 0x0, 0x0, 0x0, 0x80000001}, [@ldst={0x3, 0x1, 0x1, 0x2, 0x3, 0xf6, 0xffffffffffffffff}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x3, 0x1, 0x0, r7}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x4}]}, &(0x7f0000000840)='GPL\x00', 0x3, 0x6c, &(0x7f0000000880)=""/108, 0x41100, 0x69, '\x00', r9, 0x25, r3, 0x8, &(0x7f0000000900)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x5, 0xd, 0x3000, 0x40}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000980)=[{0x4, 0x4, 0x3, 0x5}, {0x3, 0x2, 0x3, 0x2}], 0x10, 0x2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x4, '\x00', r9, 0xffffffffffffffff, 0x5, 0x3, 0x3}, 0x50) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x9, 0x0}, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x40be, '\x00', 0x0, r3, 0x3, 0x1}, 0x50) (async) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x40be, '\x00', 0x0, r3, 0x3, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0x26, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xaa}, @ldst={0x2, 0x2, 0x1, 0x8, 0x8, 0xc, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}, @exit, @generic={0x7, 0xc, 0x5, 0x6, 0x4}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffe00}}, @jmp={0x5, 0x1, 0x6, 0x5, 0x5, 0x404e8182364439bf}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}]}, &(0x7f0000000280)='GPL\x00', 0x10000, 0xa8, &(0x7f00000002c0)=""/168, 0x40f00, 0x4, '\x00', r9, @xdp, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5, 0x0, 0x3, 0x2}, 0x10, r11, r3, 0x4, &(0x7f0000000580)=[r5, r3, r3, r3, r3, r4, r12], &(0x7f00000005c0)=[{0x3, 0x5, 0x7, 0x3}, {0x4, 0x5, 0x9, 0xb}, {0x2, 0x3, 0x9, 0xa}, {0x4, 0x3, 0x2, 0xa}], 0x10, 0x1}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0x26, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xaa}, @ldst={0x2, 0x2, 0x1, 0x8, 0x8, 0xc, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}, @exit, @generic={0x7, 0xc, 0x5, 0x6, 0x4}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffe00}}, @jmp={0x5, 0x1, 0x6, 0x5, 0x5, 0x404e8182364439bf}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}]}, &(0x7f0000000280)='GPL\x00', 0x10000, 0xa8, &(0x7f00000002c0)=""/168, 0x40f00, 0x4, '\x00', r9, @xdp, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5, 0x0, 0x3, 0x2}, 0x10, r11, r3, 0x4, &(0x7f0000000580)=[r5, r3, r3, r3, r3, r4, r12], &(0x7f00000005c0)=[{0x3, 0x5, 0x7, 0x3}, {0x4, 0x5, 0x9, 0xb}, {0x2, 0x3, 0x9, 0xa}, {0x4, 0x3, 0x2, 0xa}], 0x10, 0x1}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0c0000000500000009000000bf090000d8080000", @ANYRES32=r0, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="02000000010000000300"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3514}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x1000, 0xd5, &(0x7f0000000280)=""/213, 0x41000, 0x60, '\x00', r9, 0x25, r1, 0x8, &(0x7f0000000380)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0xc, 0x4, 0xb}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r0, r0, r0, r0, r0, r2, r13, r0], &(0x7f0000000600), 0x10, 0x8}, 0x94) 6.800008ms ago: executing program 2 (id=1953): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x24900, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000200)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0x6, 0x10}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x900c}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1cb5}, @ldst={0x2, 0x1, 0x4, 0x0, 0x5, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0xd6, &(0x7f0000000300)=""/214, 0x41100, 0x0, '\x00', r4, 0x1b, r5, 0x8, &(0x7f0000000740)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000007c0)=[r1, r1, r1, r6, r1], &(0x7f0000000800)=[{0x4, 0x2, 0xb}, {0x1, 0x1, 0xf, 0x2}, {0x0, 0x4, 0x6, 0x9}], 0x10, 0xc437}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) r7 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000400)={'pimreg\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@ifindex=r4, 0x2e, 0x0, 0xd962, &(0x7f0000000900)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000940)=[0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40) r10 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8010, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40042409, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) 2.352669ms ago: executing program 3 (id=1954): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0x19, 0x4, 0x8, 0x2}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0x19, 0x4, 0x8, 0x2}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001000)=ANY=[@ANYBLOB="0302ff000000000000000000000000000000e605"]) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001000)=ANY=[@ANYBLOB="0302ff000000000000000000000000000000e605"]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8941, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 0s ago: executing program 4 (id=1955): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x1}]}, {0x0, [0x61, 0x2e]}}, &(0x7f00000003c0)=""/208, 0x28, 0xd0, 0x1}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000007495"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r0, 0x58, &(0x7f0000000700)}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.118' (ED25519) to the list of known hosts. [ 23.487134][ T28] audit: type=1400 audit(1776026145.376:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.491255][ T275] cgroup: Unknown subsys name 'net' [ 23.515073][ T28] audit: type=1400 audit(1776026145.376:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.537709][ T28] audit: type=1400 audit(1776026145.436:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.538222][ T275] cgroup: Unknown subsys name 'devices' [ 23.647302][ T275] cgroup: Unknown subsys name 'hugetlb' [ 23.652950][ T275] cgroup: Unknown subsys name 'rlimit' [ 23.787970][ T28] audit: type=1400 audit(1776026145.676:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.811190][ T28] audit: type=1400 audit(1776026145.676:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.836022][ T28] audit: type=1400 audit(1776026145.676:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.860959][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.869826][ T28] audit: type=1400 audit(1776026145.766:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.895222][ T28] audit: type=1400 audit(1776026145.766:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.951144][ T28] audit: type=1400 audit(1776026145.836:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.976857][ T28] audit: type=1400 audit(1776026145.836:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.976895][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.757857][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.764925][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.772406][ T283] device bridge_slave_0 entered promiscuous mode [ 24.779467][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.786641][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.794122][ T283] device bridge_slave_1 entered promiscuous mode [ 24.840732][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.847843][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.855645][ T285] device bridge_slave_0 entered promiscuous mode [ 24.864087][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.871201][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.878608][ T285] device bridge_slave_1 entered promiscuous mode [ 24.885291][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.892345][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.899809][ T284] device bridge_slave_0 entered promiscuous mode [ 24.908216][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.915361][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.922708][ T284] device bridge_slave_1 entered promiscuous mode [ 25.029296][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.036444][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.043878][ T286] device bridge_slave_0 entered promiscuous mode [ 25.052363][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.059459][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.066917][ T286] device bridge_slave_1 entered promiscuous mode [ 25.093900][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.100998][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.108486][ T287] device bridge_slave_0 entered promiscuous mode [ 25.115541][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.122587][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.130105][ T287] device bridge_slave_1 entered promiscuous mode [ 25.256444][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.263515][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.270858][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.277911][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.287550][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.294603][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.322345][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.329453][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.336758][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.343812][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.373363][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.380797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.388519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.397568][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.404835][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.412413][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.446616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.454790][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.461838][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.470036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.478142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.485674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.493979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.502279][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.509320][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.516787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.524936][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.532022][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.539517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.566019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.574237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.582343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.603246][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.610837][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.624792][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.641329][ T283] device veth0_vlan entered promiscuous mode [ 25.667386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.676236][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.684949][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.693870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.701589][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.710519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.718799][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.725837][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.733356][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.741789][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.748867][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.756380][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.764524][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.771577][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.779062][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.787313][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.794336][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.801828][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.810147][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.817230][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.824597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.832929][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.839989][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.847359][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.855379][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.863752][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.871589][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.891863][ T283] device veth1_macvtap entered promiscuous mode [ 25.900783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.908998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.917201][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.925997][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.933924][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.942112][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.950114][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.958338][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.966670][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.974264][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.982227][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.990416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.998008][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.005626][ T284] device veth0_vlan entered promiscuous mode [ 26.020312][ T286] device veth0_vlan entered promiscuous mode [ 26.027540][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.035948][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.043971][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.052933][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.061401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.070098][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.078600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.086997][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.095386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.103246][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.111540][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.119378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.139729][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.148192][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.156882][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 26.164285][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.175992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.204004][ T286] device veth1_macvtap entered promiscuous mode [ 26.213477][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.221501][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.230820][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.238154][ C1] hrtimer: interrupt took 68552 ns [ 26.248526][ T287] device veth0_vlan entered promiscuous mode [ 26.254817][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.263088][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.272351][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.281175][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.291114][ T284] device veth1_macvtap entered promiscuous mode [ 26.304590][ T285] device veth0_vlan entered promiscuous mode [ 26.354240][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.362202][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.369736][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.377296][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.385503][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.393628][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.401362][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.416172][ T306] pimreg: tun_chr_ioctl cmd 1074025692 [ 26.435527][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.444060][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.453347][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.462895][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.471819][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.480836][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.489263][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.498013][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.506672][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.514916][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.525104][ T287] device veth1_macvtap entered promiscuous mode [ 26.533091][ T285] device veth1_macvtap entered promiscuous mode [ 26.540539][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.548602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.556401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.564654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.584298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.592961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.624941][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.643371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.653080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.662868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.671444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.680563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.214980][ C1] sched: RT throttling activated [ 30.356066][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 30.356082][ T28] audit: type=1400 audit(1776026152.246:107): avc: denied { setopt } for pid=340 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.388960][ T355] device syzkaller0 entered promiscuous mode [ 33.398693][ T28] audit: type=1400 audit(1776026155.286:108): avc: denied { relabelfrom } for pid=361 comm="syz.2.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.418626][ T28] audit: type=1400 audit(1776026155.286:109): avc: denied { relabelto } for pid=361 comm="syz.2.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.630200][ T28] audit: type=1400 audit(1776026155.516:110): avc: denied { create } for pid=366 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 33.977022][ T379] device syzkaller0 entered promiscuous mode [ 34.130917][ T385] device syzkaller0 entered promiscuous mode [ 34.160207][ T28] audit: type=1400 audit(1776026156.046:111): avc: denied { cpu } for pid=386 comm="syz.3.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.189741][ T28] audit: type=1400 audit(1776026156.066:112): avc: denied { create } for pid=391 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 34.322061][ T403] Illegal XDP return value 4294967274 on prog (id 90) dev N/A, expect packet loss! [ 34.333268][ T399] device syzkaller0 entered promiscuous mode [ 35.713389][ T413] device syzkaller0 entered promiscuous mode [ 38.268721][ T28] audit: type=1400 audit(1776026160.156:113): avc: denied { read } for pid=417 comm="syz.4.29" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.291748][ T28] audit: type=1400 audit(1776026160.156:114): avc: denied { open } for pid=417 comm="syz.4.29" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.314928][ T28] audit: type=1400 audit(1776026160.156:115): avc: denied { ioctl } for pid=417 comm="syz.4.29" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 43.336236][ T28] audit: type=1400 audit(1776026165.226:116): avc: denied { create } for pid=451 comm="syz.4.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 43.611298][ T479] device syzkaller0 entered promiscuous mode [ 43.678551][ T489] device syzkaller0 entered promiscuous mode [ 43.772976][ T28] audit: type=1400 audit(1776026165.656:117): avc: denied { read } for pid=494 comm="syz.2.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.018320][ T503] device syzkaller0 entered promiscuous mode [ 44.258893][ T511] tap0: tun_chr_ioctl cmd 2147767521 [ 44.589442][ T28] audit: type=1400 audit(1776026166.476:118): avc: denied { create } for pid=554 comm="syz.3.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 44.720267][ T28] audit: type=1400 audit(1776026166.606:119): avc: denied { tracepoint } for pid=581 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 44.760847][ T586] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.768124][ T586] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.784129][ T585] device bridge_slave_1 left promiscuous mode [ 44.791725][ T585] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.800008][ T585] device bridge_slave_0 left promiscuous mode [ 44.815642][ T585] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.101749][ T612] syzkaller1: tun_chr_ioctl cmd 1074025678 [ 45.121084][ T612] syzkaller1: group set to 1 [ 45.166682][ T612] syzkaller1: tun_chr_ioctl cmd 1074025678 [ 45.239363][ T612] syzkaller1: group set to 1 [ 45.276484][ T632] syzkaller1: tun_chr_ioctl cmd 1074025673 [ 45.624416][ T650] device veth1_macvtap left promiscuous mode [ 45.727810][ T28] audit: type=1400 audit(1776026167.616:120): avc: denied { ioctl } for pid=649 comm="syz.2.100" path="socket:[16850]" dev="sockfs" ino=16850 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.332546][ T681] device syzkaller0 entered promiscuous mode [ 49.489453][ T28] audit: type=1400 audit(1776026171.376:121): avc: denied { create } for pid=689 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 49.790104][ T729] pimreg: tun_chr_ioctl cmd 1074025681 [ 49.875778][ T752] IPv6: õš: Disabled Multicast RS [ 49.957185][ T759] device bridge0 entered promiscuous mode [ 50.507113][ T28] audit: type=1400 audit(1776026172.396:122): avc: denied { create } for pid=806 comm="syz.4.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 51.098402][ T847] device syzkaller0 entered promiscuous mode [ 52.742117][ T28] audit: type=1400 audit(1776026174.626:123): avc: denied { create } for pid=892 comm="syz.4.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 53.593094][ T939] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.600380][ T939] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.679102][ T939] device bridge0 left promiscuous mode [ 53.802575][ T939] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.809996][ T939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.820390][ T939] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.827656][ T939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.839431][ T939] device bridge0 entered promiscuous mode [ 54.003651][ T977] device syzkaller0 entered promiscuous mode [ 54.755076][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.611321][ T28] audit: type=1400 audit(1776026177.496:124): avc: denied { create } for pid=1058 comm="syz.2.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 56.647069][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.115771][ T1125] device syzkaller0 entered promiscuous mode [ 60.437288][ T1195] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 60.444009][ T1195] syzkaller0: linktype set to 768 [ 60.511188][ T28] audit: type=1400 audit(1776026182.396:125): avc: denied { create } for pid=1197 comm="syz.3.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 60.749186][ T1212] device syzkaller0 entered promiscuous mode [ 61.181333][ T1175] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 61.181389][ T16] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 62.658309][ T1265] device syzkaller0 entered promiscuous mode [ 62.819541][ T1272] pimreg: tun_chr_ioctl cmd 1074025692 [ 62.966036][ T28] audit: type=1400 audit(1776026184.856:126): avc: denied { create } for pid=1277 comm="syz.4.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 62.988492][ T28] audit: type=1400 audit(1776026184.856:127): avc: denied { create } for pid=1277 comm="syz.4.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 63.016084][ T28] audit: type=1400 audit(1776026184.876:128): avc: denied { create } for pid=1274 comm="syz.3.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.352480][ T28] audit: type=1400 audit(1776026185.236:129): avc: denied { append } for pid=1289 comm="syz.2.286" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 63.998444][ T1318] device syzkaller0 entered promiscuous mode [ 64.145175][ T1320] cgroup: fork rejected by pids controller in /syz3 [ 65.932051][ T1419] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.943807][ T1419] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.962645][ T1419] device bridge_slave_0 entered promiscuous mode [ 66.044319][ T28] audit: type=1400 audit(1776026187.926:130): avc: denied { create } for pid=1441 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.078641][ T1427] device syzkaller0 entered promiscuous mode [ 66.097658][ T1419] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.104765][ T1419] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.125382][ T1419] device bridge_slave_1 entered promiscuous mode [ 66.238250][ T1444] pimreg1: tun_chr_ioctl cmd 1074025677 [ 66.243930][ T1444] pimreg1: linktype set to 774 [ 66.292352][ T8] device bridge_slave_1 left promiscuous mode [ 66.302207][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.319137][ T8] device bridge_slave_0 left promiscuous mode [ 66.335083][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.355379][ T8] device veth1_macvtap left promiscuous mode [ 66.631960][ T28] audit: type=1400 audit(1776026188.516:131): avc: denied { create } for pid=1419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.674106][ T1419] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.681225][ T1419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.688576][ T1419] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.695655][ T1419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.715025][ T28] audit: type=1400 audit(1776026188.546:132): avc: denied { write } for pid=1419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.755188][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.766297][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.769477][ T28] audit: type=1400 audit(1776026188.546:133): avc: denied { read } for pid=1419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.826414][ T1485] tap0: tun_chr_ioctl cmd 1074025677 [ 66.831879][ T1485] tap0: linktype set to 778 [ 66.865862][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.875418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.888489][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.905522][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.913919][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.921010][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.955218][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.996506][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.004924][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.012064][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.104797][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.113754][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.222333][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.320140][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.434952][ T1495] device syzkaller0 entered promiscuous mode [ 67.480184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.514831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.993938][ T1419] device veth0_vlan entered promiscuous mode [ 68.037702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.046058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.065290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.084868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.134826][ T1516] syz_tun: refused to change device tx_queue_len [ 68.152692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.166670][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.202311][ T1419] device veth1_macvtap entered promiscuous mode [ 68.238772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.251453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.286000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.309421][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.339590][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.539025][ T1542] device wg2 entered promiscuous mode [ 69.350493][ T1585] device syzkaller0 entered promiscuous mode [ 69.449010][ T1601] device syzkaller0 entered promiscuous mode [ 70.372255][ T1676] device veth0_vlan left promiscuous mode [ 70.387632][ T1676] device veth0_vlan entered promiscuous mode [ 70.524615][ T28] audit: type=1400 audit(1776026192.406:134): avc: denied { create } for pid=1679 comm="syz.3.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 70.566165][ T1689] device veth1_macvtap entered promiscuous mode [ 70.579939][ T1689] device macsec0 entered promiscuous mode [ 70.673765][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.693744][ T1702] device veth1_macvtap left promiscuous mode [ 70.701987][ T1702] device macsec0 left promiscuous mode [ 70.851332][ T1687] device syzkaller0 entered promiscuous mode [ 71.239196][ T1724] device syzkaller0 entered promiscuous mode [ 71.370517][ T1740] syz.3.405 uses obsolete (PF_INET,SOCK_PACKET) [ 71.379249][ T28] audit: type=1400 audit(1776026193.266:135): avc: denied { create } for pid=1736 comm="syz.4.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 71.462226][ T28] audit: type=1400 audit(1776026193.346:136): avc: denied { create } for pid=1742 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 71.508692][ T1743] device veth1_macvtap left promiscuous mode [ 71.585585][ T1758] device veth1_macvtap entered promiscuous mode [ 71.599560][ T1758] device macsec0 entered promiscuous mode [ 71.786946][ T1757] device syzkaller0 entered promiscuous mode [ 75.799382][ T1861] device syzkaller0 entered promiscuous mode [ 79.058430][ T1956] device syzkaller0 entered promiscuous mode [ 80.337713][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.337792][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.368847][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.380254][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.405379][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.426055][ T2021] syz.2.481[2021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.447618][ T2022] syz.2.481[2022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.896701][ T2054] device syzkaller0 entered promiscuous mode [ 81.517932][ T2068] device syzkaller0 entered promiscuous mode [ 84.527693][ T28] audit: type=1400 audit(1776026206.416:137): avc: denied { write } for pid=2104 comm="syz.1.502" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.581325][ T2111] device syzkaller0 entered promiscuous mode [ 84.986541][ T2119] ªªªªªª: renamed from vlan0 [ 86.206627][ T2187] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 86.221838][ T2187] syzkaller0: linktype set to 823 [ 86.730064][ T2192] device syzkaller0 entered promiscuous mode [ 87.025970][ T2192] device syz_tun entered promiscuous mode [ 90.642690][ T2320] device syzkaller0 entered promiscuous mode [ 90.650752][ T28] audit: type=1400 audit(1776026212.536:138): avc: denied { create } for pid=2322 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 92.109341][ T28] audit: type=1400 audit(1776026213.996:139): avc: denied { create } for pid=2364 comm="syz.1.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 93.114040][ T28] audit: type=1400 audit(1776026214.996:140): avc: denied { ioctl } for pid=2412 comm="syz.2.583" path="pid:[4026532454]" dev="nsfs" ino=4026532454 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 95.931574][ T28] audit: type=1400 audit(1776026217.816:141): avc: denied { create } for pid=2484 comm="syz.2.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.233368][ T28] audit: type=1400 audit(1776026218.116:142): avc: denied { create } for pid=2497 comm="syz.2.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.828998][ T2503] sock: sock_timestamping_bind_phc: sock not bind to device [ 100.413167][ T2536] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.425268][ T2536] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.436811][ T2536] device bridge0 left promiscuous mode [ 100.833344][ T28] audit: type=1400 audit(1776026222.716:143): avc: denied { create } for pid=2560 comm="syz.1.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.995494][ T2583] device wg2 entered promiscuous mode [ 102.244052][ T28] audit: type=1400 audit(1776026224.126:144): avc: denied { create } for pid=2626 comm="syz.3.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 102.748909][ T2687] syz_tun: refused to change device tx_queue_len [ 102.775363][ T2690] device syzkaller0 entered promiscuous mode [ 103.598428][ T2749] device syzkaller0 entered promiscuous mode [ 104.322665][ T2789] device syzkaller0 entered promiscuous mode [ 104.413558][ T2794] ÿ: renamed from bond_slave_0 [ 104.979172][ T2794] device veth1_macvtap left promiscuous mode [ 105.170759][ T1603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.662766][ T2855] device syzkaller0 entered promiscuous mode [ 106.488935][ T2926] pim6reg: tun_chr_ioctl cmd 1074025692 [ 106.499599][ T2926] pim6reg: tun_chr_ioctl cmd 35108 [ 108.171518][ T2956] device syzkaller0 entered promiscuous mode [ 108.198320][ T2967] device wg2 entered promiscuous mode [ 108.428052][ T2986] @0Ù: renamed from bond_slave_1 [ 108.502741][ T3002] device syzkaller0 entered promiscuous mode [ 109.553935][ T3068] device bridge0 entered promiscuous mode [ 112.586824][ T28] audit: type=1400 audit(1776026234.466:145): avc: denied { create } for pid=3158 comm="syz.4.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 113.424980][ T3186] device syzkaller0 entered promiscuous mode [ 113.625574][ T28] audit: type=1400 audit(1776026235.506:146): avc: denied { read } for pid=3202 comm="syz.2.812" dev="nsfs" ino=4026532640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 113.648574][ T28] audit: type=1400 audit(1776026235.506:147): avc: denied { open } for pid=3202 comm="syz.2.812" path="net:[4026532640]" dev="nsfs" ino=4026532640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.296572][ T3240] device syzkaller0 entered promiscuous mode [ 114.488336][ T28] audit: type=1400 audit(1776026236.376:148): avc: denied { create } for pid=3250 comm="syz.1.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 116.548969][ T3350] device syzkaller0 entered promiscuous mode [ 117.364797][ T3373] IPv6: …: Disabled Multicast RS [ 117.645165][ T3394] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 117.689597][ T3394] device syzkaller0 entered promiscuous mode [ 118.071843][ T3407] device syzkaller0 entered promiscuous mode [ 118.899454][ T28] audit: type=1400 audit(1776026240.786:149): avc: denied { create } for pid=3428 comm="syz.2.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 121.083895][ T3514] ±ÿ: renamed from team_slave_1 [ 121.536022][ T3535] device sit0 entered promiscuous mode [ 122.113293][ T3552] device macsec0 entered promiscuous mode [ 124.371542][ T3633] device syzkaller0 entered promiscuous mode [ 124.720239][ T3658] device syzkaller0 entered promiscuous mode [ 124.750358][ T3660] bridge0: port 3(ip6gretap0) entered blocking state [ 124.765041][ T3660] bridge0: port 3(ip6gretap0) entered disabled state [ 124.803581][ T3660] device ip6gretap0 entered promiscuous mode [ 124.833990][ T3660] bridge0: port 3(ip6gretap0) entered blocking state [ 124.841284][ T3660] bridge0: port 3(ip6gretap0) entered forwarding state [ 124.872407][ T3666] device ip6gretap0 left promiscuous mode [ 124.887102][ T3666] bridge0: port 3(ip6gretap0) entered disabled state [ 125.639139][ T3687] device veth0_vlan left promiscuous mode [ 125.689905][ T3687] device veth0_vlan entered promiscuous mode [ 125.805523][ T1608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.831043][ T1608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.899105][ T1608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.145855][ T3700] device bridge_slave_1 left promiscuous mode [ 126.166381][ T3700] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.267982][ T3700] device bridge_slave_0 left promiscuous mode [ 126.306980][ T3700] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.446409][ T28] audit: type=1400 audit(1776026248.336:150): avc: denied { getattr } for pid=3728 comm="syz.2.959" path="net:[4026532640]" dev="nsfs" ino=4026532640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 126.585223][ T3737] device syzkaller0 entered promiscuous mode [ 126.610742][ T3736] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 126.622400][ T3736] syzkaller0: linktype set to 1 [ 127.437977][ T3769] device syzkaller0 entered promiscuous mode [ 127.715732][ T3797] tap0: tun_chr_ioctl cmd 2148553947 [ 127.747398][ T3797] tap0: tun_chr_ioctl cmd 35111 [ 127.774824][ T3801] device syzkaller0 entered promiscuous mode [ 128.394452][ T3844] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.401751][ T3844] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.505999][ T3844] device bridge0 left promiscuous mode [ 128.786133][ T3871] device syzkaller0 entered promiscuous mode [ 128.971127][ T3887] device xfrm0 entered promiscuous mode [ 129.871942][ T3929] syz.4.1016[3929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.872038][ T3929] syz.4.1016[3929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.564212][ T28] audit: type=1400 audit(1776026253.446:151): avc: denied { create } for pid=4004 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 131.808325][ T4017] syz.3.1042[4017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.808405][ T4017] syz.3.1042[4017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.936123][ T4019] device syzkaller0 entered promiscuous mode [ 132.719135][ T4048] device macsec0 left promiscuous mode [ 132.807387][ T4048] device macsec0 entered promiscuous mode [ 132.903602][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.221831][ T28] audit: type=1400 audit(1776026255.106:152): avc: denied { ioctl } for pid=4062 comm="syz.1.1054" path="pid:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 134.091131][ T4118] syz_tun: refused to change device tx_queue_len [ 135.212352][ T4131] device veth1_macvtap left promiscuous mode [ 135.263675][ T4157] device veth1_macvtap entered promiscuous mode [ 135.371455][ T4152] device wg2 left promiscuous mode [ 135.398340][ T4147] device wg2 entered promiscuous mode [ 136.167464][ T4227] syz.4.1101[4227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.167545][ T4227] syz.4.1101[4227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.987812][ T4303] device syzkaller0 entered promiscuous mode [ 139.673751][ T4338] device syzkaller0 entered promiscuous mode [ 140.538970][ T4422] syz_tun: refused to change device tx_queue_len [ 141.988077][ T4497] device syzkaller0 entered promiscuous mode [ 148.881727][ T4638] ref_ctr_offset mismatch. inode: 0x4d1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 152.691658][ T4724] device syzkaller0 entered promiscuous mode [ 152.716826][ T4724] b‹¡Y­4`Ò˜: renamed from lo [ 152.950241][ T4730] device veth1_macvtap left promiscuous mode [ 152.956447][ T4730] device macsec0 left promiscuous mode [ 152.978214][ T4730] device veth1_macvtap entered promiscuous mode [ 152.994743][ T4730] device macsec0 entered promiscuous mode [ 153.054586][ T4730] device syzkaller0 entered promiscuous mode [ 153.151191][ T4731] device wg2 left promiscuous mode [ 153.170494][ T4734] device wg2 entered promiscuous mode [ 153.945728][ T4779] device syzkaller0 entered promiscuous mode [ 154.715949][ T4823] device sit0 entered promiscuous mode [ 155.380389][ T4899] device syzkaller0 entered promiscuous mode [ 156.184824][ T4943] device syzkaller0 entered promiscuous mode [ 156.574800][ T4974] device syzkaller0 entered promiscuous mode [ 157.995515][ T4983] device wg2 left promiscuous mode [ 158.003565][ T4983] device wg2 entered promiscuous mode [ 158.346341][ T5007] device syzkaller0 entered promiscuous mode [ 158.675241][ T5026] device syzkaller0 entered promiscuous mode [ 158.935779][ T5053] device syzkaller0 entered promiscuous mode [ 159.002073][ T5050] device bridge0 entered promiscuous mode [ 159.211267][ T5071] device syzkaller0 entered promiscuous mode [ 159.378716][ T5081] device syzkaller0 entered promiscuous mode [ 159.448511][ T5086] pim6reg1: tun_chr_ioctl cmd 1074025677 [ 159.454242][ T5086] pim6reg1: linktype set to 773 [ 159.610021][ T5091] device syzkaller0 entered promiscuous mode [ 159.913491][ T5098] device syzkaller0 entered promiscuous mode [ 160.409045][ T5136] À: port 1(macsec0) entered blocking state [ 160.429017][ T5136] À: port 1(macsec0) entered disabled state [ 160.442335][ T5136] device macsec0 entered promiscuous mode [ 162.647053][ T5189] device syzkaller0 entered promiscuous mode [ 162.697779][ T5176] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.707817][ T5176] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.737299][ T5176] device bridge_slave_0 entered promiscuous mode [ 162.745889][ T5176] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.755665][ T5176] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.765980][ T5176] device bridge_slave_1 entered promiscuous mode [ 162.978476][ T674] device bridge_slave_1 left promiscuous mode [ 162.989134][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.013922][ T674] device bridge_slave_0 left promiscuous mode [ 163.062803][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.113017][ T674] device veth1_macvtap left promiscuous mode [ 163.143090][ T674] device veth0_vlan left promiscuous mode [ 163.594808][ T5231] device syzkaller0 entered promiscuous mode [ 163.990587][ T5246] device syzkaller0 entered promiscuous mode [ 164.025653][ T5253] device lo entered promiscuous mode [ 164.033530][ T5246] pimreg: tun_chr_ioctl cmd 1074025681 [ 164.072142][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.084139][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.135368][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.162746][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.189277][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.196375][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.205176][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.231104][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.240336][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.247430][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.325024][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.335491][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.364112][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.408554][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.434694][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.602218][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.619082][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.730503][ T5277] bridge0: port 3(ip6gretap0) entered blocking state [ 164.737756][ T5277] bridge0: port 3(ip6gretap0) entered disabled state [ 164.749373][ T5277] device ip6gretap0 entered promiscuous mode [ 164.758011][ T5277] bridge0: port 3(ip6gretap0) entered blocking state [ 164.764725][ T5277] bridge0: port 3(ip6gretap0) entered forwarding state [ 165.241713][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.267505][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.290170][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.307684][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.351161][ T5176] device veth0_vlan entered promiscuous mode [ 165.499083][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.507869][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.520229][ T5176] device veth1_macvtap entered promiscuous mode [ 165.531586][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.545297][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.556339][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.564760][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.573707][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.162236][ T5311] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.169416][ T5311] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.177330][ T5311] device bridge_slave_0 entered promiscuous mode [ 166.184876][ T5311] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.192285][ T5311] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.201320][ T5311] device bridge_slave_1 entered promiscuous mode [ 166.348255][ T5311] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.355359][ T5311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.362677][ T5311] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.369751][ T5311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.258389][ T5322] device wg2 left promiscuous mode [ 171.277258][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.284850][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.299754][ T5323] device wg2 entered promiscuous mode [ 171.365182][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.373449][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.515738][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.525427][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.534832][ T3726] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.541928][ T3726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.590967][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.599854][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.608377][ T3726] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.615481][ T3726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.640972][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.649482][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.657826][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.666561][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.697722][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.706641][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.720276][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.729309][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.740133][ T5311] device veth0_vlan entered promiscuous mode [ 171.751293][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.759179][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.788714][ T5339] device syzkaller0 entered promiscuous mode [ 171.806611][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.815139][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.826606][ T5311] device veth1_macvtap entered promiscuous mode [ 171.866219][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.880042][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.896617][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.932165][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.943558][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.057361][ T674] device bridge_slave_1 left promiscuous mode [ 172.063547][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.106644][ T674] device bridge_slave_0 left promiscuous mode [ 172.113165][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.145905][ T674] device veth1_macvtap left promiscuous mode [ 172.153598][ T674] device veth0_vlan left promiscuous mode [ 172.816192][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.856082][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.863764][ T5367] device bridge_slave_0 entered promiscuous mode [ 172.871579][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.879203][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.886977][ T5367] device bridge_slave_1 entered promiscuous mode [ 173.017425][ T5373] device syzkaller0 entered promiscuous mode [ 173.279805][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.286917][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.294243][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.301312][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.487667][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.515583][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.617902][ T5416] ÿ: renamed from bond_slave_0 [ 173.654472][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.688551][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.713030][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.725258][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.743648][ T3726] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.750747][ T3726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.269791][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.278955][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.289039][ T1641] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.296157][ T1641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.304865][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.313531][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.322445][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.333307][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.379701][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.388766][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.418223][ T5367] device veth0_vlan entered promiscuous mode [ 177.435320][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.443441][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.468504][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.485541][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.503021][ T5367] device veth1_macvtap entered promiscuous mode [ 177.517710][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.526554][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.534784][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.547862][ T5445] device macsec0 left promiscuous mode [ 177.570078][ T5445] device macsec0 entered promiscuous mode [ 177.592775][ T674] device bridge_slave_1 left promiscuous mode [ 177.604454][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.620257][ T674] device bridge_slave_0 left promiscuous mode [ 177.627588][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.640337][ T674] device veth1_macvtap left promiscuous mode [ 177.648783][ T674] device veth0_vlan left promiscuous mode [ 177.768454][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.776988][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.806262][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.815132][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.482501][ T28] audit: type=1400 audit(1776026300.366:153): avc: denied { create } for pid=5472 comm="syz.1.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 179.072945][ T674] device bridge_slave_1 left promiscuous mode [ 179.080709][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.089506][ T674] device bridge_slave_0 left promiscuous mode [ 179.095803][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.104442][ T674] device veth1_macvtap left promiscuous mode [ 179.110769][ T674] device veth0_vlan left promiscuous mode [ 179.316136][ T5486] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.323391][ T5486] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.331023][ T5486] device bridge_slave_0 entered promiscuous mode [ 179.486861][ T5486] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.493974][ T5486] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.501533][ T5486] device bridge_slave_1 entered promiscuous mode [ 179.552273][ T5543] device syzkaller0 entered promiscuous mode [ 179.671757][ T28] audit: type=1400 audit(1776026301.556:154): avc: denied { attach_queue } for pid=5544 comm="syz.1.1476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 179.783644][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.814270][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.849576][ T5486] device veth0_vlan entered promiscuous mode [ 179.880768][ T5486] device veth1_macvtap entered promiscuous mode [ 179.904898][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.913439][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.923467][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.931411][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.939521][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.948131][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.957096][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.965720][ T1620] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.972779][ T1620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.981009][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.989728][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.998348][ T1620] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.005424][ T1620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.013032][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.021396][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.029699][ T1620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.075291][ T5555] device wg2 entered promiscuous mode [ 180.117744][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.133936][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.065940][ T5614] -1: renamed from syzkaller0 [ 181.124887][ T5613] device ip6gretap0 left promiscuous mode [ 181.145042][ T5613] bridge0: port 3(ip6gretap0) entered disabled state [ 181.425431][ T5634] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.432627][ T5634] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.442078][ T674] device bridge_slave_1 left promiscuous mode [ 181.453807][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.463394][ T674] device bridge_slave_0 left promiscuous mode [ 181.475017][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.483375][ T674] device veth1_macvtap left promiscuous mode [ 181.489824][ T674] device veth0_vlan left promiscuous mode [ 181.689752][ T5620] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.722013][ T5620] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.755572][ T5620] device bridge_slave_0 entered promiscuous mode [ 181.785677][ T5620] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.792751][ T5620] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.830132][ T5620] device bridge_slave_1 entered promiscuous mode [ 182.156885][ T5645] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.164149][ T5645] bridge0: port 2(bridge_slave_1) entered listening state [ 182.172767][ T5645] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.180220][ T5645] bridge0: port 1(bridge_slave_0) entered listening state [ 182.221786][ T5645] device bridge0 entered promiscuous mode [ 182.320153][ T5620] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.327280][ T5620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.427638][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.470318][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.479265][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.487005][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.495902][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.504213][ T1641] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.511292][ T1641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.555721][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.570385][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.588553][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.608337][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.620662][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.628594][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.647775][ T5620] device veth0_vlan entered promiscuous mode [ 182.690372][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.698996][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.712830][ T5620] device veth1_macvtap entered promiscuous mode [ 182.739254][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 182.752855][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.765420][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.802476][ T5686] device veth1_macvtap entered promiscuous mode [ 182.844789][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.896305][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.922169][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.795773][ T674] device bridge_slave_1 left promiscuous mode [ 183.802014][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.809546][ T674] device bridge_slave_0 left promiscuous mode [ 183.815834][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.823964][ T674] device veth1_macvtap left promiscuous mode [ 183.830107][ T674] device veth0_vlan left promiscuous mode [ 184.300806][ T5737] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.310923][ T5737] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.319255][ T5737] device bridge_slave_0 entered promiscuous mode [ 184.370862][ T5737] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.402981][ T5737] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.438125][ T5737] device bridge_slave_1 entered promiscuous mode [ 184.741374][ T5777] device syzkaller0 entered promiscuous mode [ 185.026626][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.042190][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.305155][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.348206][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.370542][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.377685][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.419876][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.432899][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.459457][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.466594][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.489194][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.497164][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.535910][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.553555][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.589335][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.659553][ T5737] device veth0_vlan entered promiscuous mode [ 185.678696][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.713482][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.741051][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.758271][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.793904][ T5737] device veth1_macvtap entered promiscuous mode [ 185.819640][ T5823] device syzkaller0 entered promiscuous mode [ 185.827463][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.838517][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.859658][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.869465][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.960466][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.980566][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.989942][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.999483][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.708386][ T5876] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.733660][ T5876] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.743268][ T5876] device bridge_slave_0 entered promiscuous mode [ 187.750605][ T5876] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.757979][ T5876] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.765721][ T5876] device bridge_slave_1 entered promiscuous mode [ 188.198766][ T3726] device bridge_slave_1 left promiscuous mode [ 188.208900][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.227432][ T3726] device bridge_slave_0 left promiscuous mode [ 188.237358][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.289412][ T3726] device veth1_macvtap left promiscuous mode [ 188.320272][ T3726] device veth0_vlan left promiscuous mode [ 188.543770][ T5919] tun0: tun_chr_ioctl cmd 1074812117 [ 188.564021][ T5919] device wg2 left promiscuous mode [ 188.585193][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.593033][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.614760][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.623299][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.631776][ T1641] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.638885][ T1641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.646590][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.658924][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.667389][ T1641] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.674470][ T1641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.682157][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.695143][ T5928] device wg2 entered promiscuous mode [ 188.708588][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.817058][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.836773][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.871119][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.883964][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.899421][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.915641][ T5938] bridge0: port 3(ip6gretap0) entered blocking state [ 188.923213][ T5938] bridge0: port 3(ip6gretap0) entered disabled state [ 188.931400][ T5938] device ip6gretap0 entered promiscuous mode [ 188.938051][ T5938] bridge0: port 3(ip6gretap0) entered blocking state [ 188.944780][ T5938] bridge0: port 3(ip6gretap0) entered listening state [ 188.952697][ T5941] device ip6gretap0 left promiscuous mode [ 188.958607][ T5941] bridge0: port 3(ip6gretap0) entered disabled state [ 188.972327][ T5876] device veth0_vlan entered promiscuous mode [ 188.994432][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.018755][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.046780][ T5876] device veth1_macvtap entered promiscuous mode [ 189.072995][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.081195][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.090347][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.208755][ T5952] device syzkaller0 entered promiscuous mode [ 189.220624][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.230994][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.638772][ T3726] device bridge_slave_1 left promiscuous mode [ 190.645063][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.652730][ T3726] device bridge_slave_0 left promiscuous mode [ 190.665423][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.702978][ T3726] device veth1_macvtap left promiscuous mode [ 190.709319][ T3726] device veth0_vlan left promiscuous mode [ 191.004508][ T6001] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.012216][ T6001] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.021693][ T6001] device bridge_slave_0 entered promiscuous mode [ 191.045083][ T6033] device syzkaller0 entered promiscuous mode [ 191.084816][ T6001] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.092231][ T6001] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.099889][ T6001] device bridge_slave_1 entered promiscuous mode [ 191.453406][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.461010][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.481578][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.490044][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.498618][ T1591] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.505711][ T1591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.513436][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.523485][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.533136][ T1591] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.540224][ T1591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.571157][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.587195][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.605589][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.796552][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.822930][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.887490][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.942955][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.313457][ T6001] device veth0_vlan entered promiscuous mode [ 192.363000][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.372029][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.399536][ T6001] device veth1_macvtap entered promiscuous mode [ 192.459337][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.489571][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.542826][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.566425][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.575062][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.703818][ T28] audit: type=1400 audit(1776026314.586:155): avc: denied { create } for pid=6089 comm="syz.2.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 195.045962][ T3726] device bridge_slave_1 left promiscuous mode [ 195.052186][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.059867][ T3726] device bridge_slave_0 left promiscuous mode [ 195.066102][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.074156][ T3726] device veth1_macvtap left promiscuous mode [ 195.080467][ T3726] device veth0_vlan left promiscuous mode [ 195.611534][ T6132] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.638014][ T6132] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.650491][ T6132] device bridge_slave_0 entered promiscuous mode [ 195.657778][ T6132] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.664843][ T6132] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.672492][ T6132] device bridge_slave_1 entered promiscuous mode [ 195.899020][ T6158] device syzkaller0 entered promiscuous mode [ 195.938795][ T6164] device syzkaller0 entered promiscuous mode [ 196.028003][ T6132] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.035129][ T6132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.042435][ T6132] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.049526][ T6132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.092821][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.102837][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.145421][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.265565][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.273659][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.265070][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.278889][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.287716][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.297078][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.305513][ T6132] device veth0_vlan entered promiscuous mode [ 199.377522][ T6132] device veth1_macvtap entered promiscuous mode [ 199.445508][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.465752][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.495990][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.547746][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.585750][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.661254][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.727896][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.915741][ T3726] device bridge_slave_1 left promiscuous mode [ 200.921896][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.929596][ T3726] device bridge_slave_0 left promiscuous mode [ 200.935947][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.943977][ T3726] device veth1_macvtap left promiscuous mode [ 200.950081][ T3726] device veth0_vlan left promiscuous mode [ 201.553120][ T6248] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.673921][ T6248] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.745954][ T6248] device bridge_slave_0 entered promiscuous mode [ 201.768667][ T6248] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.797659][ T6248] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.832155][ T6248] device bridge_slave_1 entered promiscuous mode [ 202.629258][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.645099][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.657119][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.711984][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.775381][ T674] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.782480][ T674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.855247][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.893238][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.935170][ T674] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.942278][ T674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.003443][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.042714][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.091339][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.120195][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.144791][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.209831][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.219638][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.269753][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.281624][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.411785][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.425630][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.438823][ T6248] device veth0_vlan entered promiscuous mode [ 203.477913][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.515527][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.565780][ T6248] device veth1_macvtap entered promiscuous mode [ 203.674041][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.686011][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.726152][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.760809][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.798367][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.877192][ T6319] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 203.971902][ T6319] device syzkaller0 entered promiscuous mode [ 204.629079][ T316] device bridge_slave_1 left promiscuous mode [ 204.641457][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.674470][ T316] device bridge_slave_0 left promiscuous mode [ 204.681181][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.696815][ T316] device veth1_macvtap left promiscuous mode [ 204.702892][ T316] device veth0_vlan left promiscuous mode [ 205.952535][ T6378] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.959696][ T6378] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.967527][ T6378] device bridge_slave_0 entered promiscuous mode [ 205.979488][ T6378] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.992169][ T6378] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.024199][ T6378] device bridge_slave_1 entered promiscuous mode [ 206.153298][ T6378] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.160406][ T6378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.167726][ T6378] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.174782][ T6378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.245211][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.260889][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.268723][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.301585][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.320502][ T674] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.327594][ T674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.363251][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.382901][ T674] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.390011][ T674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.425322][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.436533][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.463017][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.489075][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.497471][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.505022][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.513930][ T6378] device veth0_vlan entered promiscuous mode [ 206.537981][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.552031][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.576374][ T6378] device veth1_macvtap entered promiscuous mode [ 206.609632][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.617882][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.626676][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.648682][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.663654][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.575907][ T316] device bridge_slave_1 left promiscuous mode [ 207.582055][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.589607][ T316] device bridge_slave_0 left promiscuous mode [ 207.595855][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.603719][ T316] device veth1_macvtap left promiscuous mode [ 207.609843][ T316] device veth0_vlan left promiscuous mode [ 208.088106][ T6435] device syzkaller0 entered promiscuous mode [ 208.168069][ T6439] device syzkaller0 entered promiscuous mode [ 208.187355][ T28] audit: type=1400 audit(1776026330.076:156): avc: denied { create } for pid=6432 comm="syz.1.1719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 208.424977][ T6466] ªªªªªª: renamed from vlan0 [ 208.520906][ T6453] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.538192][ T6453] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.569364][ T6453] device bridge_slave_0 entered promiscuous mode [ 208.595582][ T6453] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.626088][ T6453] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.643689][ T6453] device bridge_slave_1 entered promiscuous mode [ 208.891475][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.905268][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.944693][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.966269][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.992166][ T1591] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.999283][ T1591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.025083][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.084733][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.095929][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.113535][ T1591] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.120659][ T1591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.138277][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.150025][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.168894][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.252672][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.265867][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.283747][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.328658][ T6453] device veth0_vlan entered promiscuous mode [ 209.368860][ T6453] device veth1_macvtap entered promiscuous mode [ 209.430083][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.457484][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.478559][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.465796][ T316] device bridge_slave_1 left promiscuous mode [ 210.471987][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.479833][ T316] device bridge_slave_0 left promiscuous mode [ 210.486159][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.494458][ T316] device veth1_macvtap left promiscuous mode [ 210.500949][ T316] device veth0_vlan left promiscuous mode [ 211.143382][ T28] audit: type=1400 audit(1776026333.026:157): avc: denied { setattr } for pid=6560 comm="syz.1.1754" path="/net/tun" dev="devtmpfs" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 211.526788][ T6579] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.533981][ T6579] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.565451][ T6579] device bridge_slave_0 entered promiscuous mode [ 211.577915][ T6579] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.592036][ T6579] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.608409][ T6579] device bridge_slave_1 entered promiscuous mode [ 211.632249][ T6594] device syzkaller0 entered promiscuous mode [ 211.783830][ T6598] device sit0 left promiscuous mode [ 211.938834][ T6602] device sit0 entered promiscuous mode [ 212.397486][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.405349][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.435750][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.444272][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.476301][ T1641] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.483407][ T1641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.508456][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.547459][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.590236][ T1641] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.597355][ T1641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.604694][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 212.611866][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 212.619791][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.627885][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.636463][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.701680][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.712497][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.807368][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.824584][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.877824][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.924072][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.970745][ T6579] device veth0_vlan entered promiscuous mode [ 212.982734][ T6667] device syzkaller0 entered promiscuous mode [ 213.021229][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.057087][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.090588][ T6579] device veth1_macvtap entered promiscuous mode [ 213.161714][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.172867][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.182028][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.190820][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.199286][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.265584][ T674] device bridge_slave_1 left promiscuous mode [ 214.271758][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.279409][ T674] device bridge_slave_0 left promiscuous mode [ 214.285633][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.293557][ T674] device veth1_macvtap left promiscuous mode [ 214.299733][ T674] device veth0_vlan left promiscuous mode [ 215.020034][ T28] audit: type=1400 audit(1776026336.906:158): avc: denied { associate } for pid=6693 comm="syz.4.1794" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 215.571979][ T6701] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.581323][ T6701] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.594040][ T6701] device bridge_slave_0 entered promiscuous mode [ 215.603981][ T6701] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.611434][ T6701] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.619007][ T6701] device bridge_slave_1 entered promiscuous mode [ 215.702154][ T6712] device syzkaller0 entered promiscuous mode [ 215.909594][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.917309][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.985393][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.012811][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.057357][ T3726] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.064444][ T3726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.072131][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.080703][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.089062][ T3726] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.096162][ T3726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.103664][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.112382][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.120549][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.128787][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.139309][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.187785][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.210969][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.257205][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.272307][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.295736][ T6701] device veth0_vlan entered promiscuous mode [ 216.322132][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.343277][ T6701] device veth1_macvtap entered promiscuous mode [ 216.358859][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.385509][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.406250][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.439023][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.519435][ T6767] device veth0_vlan left promiscuous mode [ 216.526914][ T6767] device veth0_vlan entered promiscuous mode [ 216.546172][ T6767] device sit0 left promiscuous mode [ 216.577397][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.598177][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 216.625772][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.643422][ T6767] device sit0 entered promiscuous mode [ 217.675694][ T674] device bridge_slave_1 left promiscuous mode [ 217.681950][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.689572][ T674] device bridge_slave_0 left promiscuous mode [ 217.695838][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.703760][ T674] device veth1_macvtap left promiscuous mode [ 217.709866][ T674] device veth0_vlan left promiscuous mode [ 218.482346][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.797632][ T6828] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.834313][ T6828] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.844737][ T6828] device bridge_slave_0 entered promiscuous mode [ 218.852068][ T6828] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.859175][ T6828] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.866816][ T6828] device bridge_slave_1 entered promiscuous mode [ 218.891121][ T6855] device veth1_to_hsr entered promiscuous mode [ 219.129154][ T6860] device syzkaller0 entered promiscuous mode [ 219.346048][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.379623][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.393332][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.403100][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.412303][ T674] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.419400][ T674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.434558][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.446548][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.485762][ T674] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.492862][ T674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.526453][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.594471][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.603103][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.696477][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.744340][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.754319][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.762250][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.775125][ T6828] device veth0_vlan entered promiscuous mode [ 219.829720][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.847813][ T6828] device veth1_macvtap entered promiscuous mode [ 219.894414][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.915636][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.179118][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.187961][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.295507][ T316] device bridge_slave_1 left promiscuous mode [ 221.301655][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.309177][ T316] device bridge_slave_0 left promiscuous mode [ 221.315444][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.323446][ T316] device veth1_macvtap left promiscuous mode [ 221.329653][ T316] device veth0_vlan left promiscuous mode [ 222.347689][ T6948] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.354788][ T6948] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.362347][ T6948] device bridge_slave_0 entered promiscuous mode [ 222.370567][ T6965] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 222.390574][ T6948] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.397706][ T6948] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.405831][ T6948] device bridge_slave_1 entered promiscuous mode [ 222.580172][ T6948] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.587297][ T6948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.594608][ T6948] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.601676][ T6948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.692874][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.722947][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.773577][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.856338][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.880354][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.887449][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.910659][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.956928][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.964024][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.971529][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.052280][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.064568][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.220542][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.245409][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.332488][ T6948] device veth0_vlan entered promiscuous mode [ 223.360345][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 223.372862][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.405110][ T6948] device veth1_macvtap entered promiscuous mode [ 223.423305][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.435262][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.451994][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 223.473764][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.495508][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.533191][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.551912][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.579551][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.615136][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.295679][ T316] device bridge_slave_1 left promiscuous mode [ 224.301864][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.315428][ T316] device bridge_slave_0 left promiscuous mode [ 224.321720][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.336012][ T316] device veth1_macvtap left promiscuous mode [ 224.342111][ T316] device veth0_vlan left promiscuous mode [ 225.699763][ T7036] device syzkaller0 entered promiscuous mode [ 225.728279][ T7036] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 226.397585][ T7054] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.429428][ T7054] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.469567][ T7054] device bridge_slave_0 entered promiscuous mode [ 226.509066][ T7054] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.523040][ T7054] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.573119][ T7054] device bridge_slave_1 entered promiscuous mode [ 227.122708][ T7125] device syzkaller0 entered promiscuous mode [ 227.560477][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.571395][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.653388][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.665242][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.681015][ T1641] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.688211][ T1641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.706619][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.722607][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.733554][ T1641] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.740677][ T1641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.748429][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.789325][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.798274][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.833993][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.846815][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.864666][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.876555][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.921875][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.946633][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.970399][ T7054] device veth0_vlan entered promiscuous mode [ 227.985257][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.993124][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.020155][ T7054] device veth1_macvtap entered promiscuous mode [ 228.050857][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.083221][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.095798][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.120758][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.149705][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.164793][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.179849][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.465511][ T674] device bridge_slave_1 left promiscuous mode [ 229.471663][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.479213][ T674] device bridge_slave_0 left promiscuous mode [ 229.485433][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.493397][ T674] device veth1_macvtap left promiscuous mode [ 229.499513][ T674] device veth0_vlan left promiscuous mode [ 230.611457][ T7210] device syzkaller0 entered promiscuous mode [ 231.457226][ T7209] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.464387][ T7209] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.472018][ T7209] device bridge_slave_0 entered promiscuous mode [ 231.534340][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.541670][ T7209] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.549335][ T7209] device bridge_slave_1 entered promiscuous mode [ 231.815071][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.822159][ T7209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.931352][ T1641] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.939608][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.947482][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.986723][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.997786][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.008371][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.015465][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.023164][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.031453][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.038537][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.074124][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.082995][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.132902][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.167515][ T7209] device veth0_vlan entered promiscuous mode [ 232.238055][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.248743][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.257502][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.318775][ T7209] device veth1_macvtap entered promiscuous mode [ 232.331926][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.381429][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.407020][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.478329][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.498422][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.935796][ T674] device bridge_slave_1 left promiscuous mode [ 233.941932][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.949438][ T674] device bridge_slave_0 left promiscuous mode [ 233.956404][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.964208][ T674] device veth1_macvtap left promiscuous mode [ 233.970284][ T674] device veth0_vlan left promiscuous mode [ 234.813683][ C0] ================================================================== [ 234.821861][ C0] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 234.829813][ C0] Write of size 88 at addr ffff88811722d210 by task syz.2.1953/7286 [ 234.837829][ C0] [ 234.840205][ C0] CPU: 0 PID: 7286 Comm: syz.2.1953 Not tainted syzkaller #0 [ 234.847614][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 234.857728][ C0] Call Trace: [ 234.861034][ C0] [ 234.863999][ C0] __dump_stack+0x21/0x24 [ 234.868378][ C0] dump_stack_lvl+0x110/0x170 [ 234.873094][ C0] ? __cfi_dump_stack_lvl+0x8/0x8 [ 234.878158][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 234.883289][ C0] print_address_description+0x71/0x200 [ 234.888861][ C0] print_report+0x4a/0x60 [ 234.893215][ C0] kasan_report+0x122/0x150 [ 234.897746][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 234.902876][ C0] kasan_check_range+0x249/0x2a0 [ 234.907845][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 234.912970][ C0] memcpy+0x44/0x70 [ 234.916792][ C0] __bpf_get_stackid+0x6fa/0x960 [ 234.921742][ C0] bpf_get_stackid_pe+0x2ee/0x400 [ 234.926784][ C0] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 234.932267][ C0] bpf_overflow_handler+0x3d0/0x5e0 [ 234.937481][ C0] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 234.943238][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 234.948462][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 234.954162][ C0] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 234.960427][ C0] __perf_event_overflow+0x437/0x620 [ 234.965735][ C0] perf_swevent_hrtimer+0x400/0x5b0 [ 234.970957][ C0] ? check_preempt_wakeup+0x815/0xbe0 [ 234.976353][ C0] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 234.982104][ C0] ? timerqueue_add+0x20e/0x230 [ 234.987000][ C0] ? timerqueue_del+0xd3/0x120 [ 234.991802][ C0] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 234.997545][ C0] __hrtimer_run_queues+0x3bb/0x8e0 [ 235.002890][ C0] ? hrtimer_interrupt+0x8c0/0x8c0 [ 235.008026][ C0] ? ktime_get_update_offsets_now+0x30c/0x320 [ 235.014117][ C0] hrtimer_interrupt+0x3c7/0x8c0 [ 235.019098][ C0] __sysvec_apic_timer_interrupt+0x11e/0x440 [ 235.025101][ C0] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 235.030751][ C0] [ 235.033695][ C0] [ 235.036639][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 235.042637][ C0] RIP: 0010:plist_del+0x362/0x3f0 [ 235.047675][ C0] Code: c5 fc 4d 89 65 00 4c 89 e0 48 c1 e8 03 49 bd 00 00 00 00 00 fc ff df 42 80 3c 28 00 74 08 4c 89 e7 e8 12 84 c5 fc 49 89 1c 24 <48> 8b 5d c8 eb 05 e8 a3 26 80 fc 4c 89 f8 48 c1 e8 03 42 80 3c 28 [ 235.067307][ C0] RSP: 0018:ffffc90000f2fa88 EFLAGS: 00000246 [ 235.073383][ C0] RAX: 1ffff11021133521 RBX: ffff88810899a908 RCX: dffffc0000000000 [ 235.081368][ C0] RDX: ffffc900022bd000 RSI: 000000000000004f RDI: 0000000000000050 [ 235.089349][ C0] RBP: ffffc90000f2fae0 R08: ffff88810fe9146b R09: 1ffff11021fd228d [ 235.097330][ C0] R10: dffffc0000000000 R11: ffffed1021fd228e R12: ffff88810899a908 [ 235.105424][ C0] R13: dffffc0000000000 R14: ffffc90001027bf0 R15: ffffc90001027c08 [ 235.113411][ C0] ? plist_del+0x2dc/0x3f0 [ 235.117848][ C0] __futex_unqueue+0x76/0xb0 [ 235.122467][ C0] futex_wake_mark+0xec/0x160 [ 235.127157][ C0] futex_wake+0x3e5/0x8e0 [ 235.131512][ C0] ? __cfi_futex_wake+0x10/0x10 [ 235.136375][ C0] ? perf_ioctl+0x140e/0x1e70 [ 235.141064][ C0] ? ioctl_has_perm+0x40f/0x4f0 [ 235.145937][ C0] ? __cfi_perf_ioctl+0x10/0x10 [ 235.150810][ C0] ? __hrtimer_run_queues+0x87f/0x8e0 [ 235.156210][ C0] do_futex+0x2bf/0x430 [ 235.160378][ C0] ? __cfi_do_futex+0x10/0x10 [ 235.165072][ C0] __se_sys_futex+0x136/0x310 [ 235.169763][ C0] ? __x64_sys_futex+0x100/0x100 [ 235.174715][ C0] ? fput+0x154/0x1a0 [ 235.178713][ C0] __x64_sys_futex+0xe5/0x100 [ 235.183409][ C0] x64_sys_call+0x7ec/0x9a0 [ 235.187929][ C0] do_syscall_64+0x4c/0xa0 [ 235.192366][ C0] ? clear_bhb_loop+0x30/0x80 [ 235.197056][ C0] ? clear_bhb_loop+0x30/0x80 [ 235.201763][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.207666][ C0] RIP: 0033:0x7f66bdb9c819 [ 235.212097][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.231711][ C0] RSP: 002b:00007f66beaa20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 235.240137][ C0] RAX: ffffffffffffffda RBX: 00007f66bde15fa8 RCX: 00007f66bdb9c819 [ 235.248125][ C0] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f66bde15fac [ 235.256116][ C0] RBP: 00007f66bde15fa0 R08: 002df1b97f5b857a R09: 0000000000000000 [ 235.264622][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 235.272602][ C0] R13: 00007f66bde16038 R14: 00007fff0e4ffdb0 R15: 00007fff0e4ffe98 [ 235.280602][ C0] [ 235.283636][ C0] [ 235.285984][ C0] Allocated by task 7286: [ 235.290346][ C0] kasan_set_track+0x4b/0x70 [ 235.294962][ C0] kasan_save_alloc_info+0x25/0x30 [ 235.300094][ C0] __kasan_kmalloc+0x95/0xb0 [ 235.304710][ C0] __kmalloc_node+0xb2/0x1e0 [ 235.309327][ C0] bpf_map_area_alloc+0x4b/0xe0 [ 235.314279][ C0] prealloc_elems_and_freelist+0x8a/0x1e0 [ 235.320016][ C0] stack_map_alloc+0x3a7/0x530 [ 235.324810][ C0] map_create+0x49c/0xd80 [ 235.329150][ C0] __sys_bpf+0x34e/0x850 [ 235.333430][ C0] __x64_sys_bpf+0x7c/0x90 [ 235.337863][ C0] x64_sys_call+0x488/0x9a0 [ 235.342380][ C0] do_syscall_64+0x4c/0xa0 [ 235.346814][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.352727][ C0] [ 235.355063][ C0] The buggy address belongs to the object at ffff88811722d200 [ 235.355063][ C0] which belongs to the cache kmalloc-64 of size 64 [ 235.368957][ C0] The buggy address is located 16 bytes inside of [ 235.368957][ C0] 64-byte region [ffff88811722d200, ffff88811722d240) [ 235.382070][ C0] [ 235.384434][ C0] The buggy address belongs to the physical page: [ 235.390860][ C0] page:ffffea00045c8b40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11722d [ 235.401128][ C0] flags: 0x4000000000000200(slab|zone=1) [ 235.406815][ C0] raw: 4000000000000200 ffffea0004534380 dead000000000003 ffff888100042780 [ 235.415413][ C0] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 235.424103][ C0] page dumped because: kasan: bad access detected [ 235.430534][ C0] page_owner tracks the page as allocated [ 235.436266][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 1206, tgid 1202 (syz.4.258), ts 60621631076, free_ts 60621607617 [ 235.454298][ C0] post_alloc_hook+0x1f5/0x210 [ 235.459101][ C0] prep_new_page+0x1c/0x110 [ 235.463629][ C0] get_page_from_freelist+0x2d12/0x2d80 [ 235.469199][ C0] __alloc_pages+0x1fa/0x610 [ 235.473806][ C0] alloc_slab_page+0x6e/0xf0 [ 235.478422][ C0] new_slab+0x98/0x3d0 [ 235.482526][ C0] ___slab_alloc+0x6bd/0xb20 [ 235.487179][ C0] __slab_alloc+0x5e/0xa0 [ 235.491536][ C0] __kmem_cache_alloc_node+0x203/0x2c0 [ 235.497015][ C0] kmalloc_trace+0x29/0xb0 [ 235.501481][ C0] bpf_int_jit_compile+0x218/0xd0d0 [ 235.506699][ C0] bpf_prog_select_runtime+0x8a8/0xbb0 [ 235.512185][ C0] bpf_prog_load+0x111f/0x16a0 [ 235.516975][ C0] __sys_bpf+0x57b/0x850 [ 235.521250][ C0] __x64_sys_bpf+0x7c/0x90 [ 235.525790][ C0] x64_sys_call+0x488/0x9a0 [ 235.530321][ C0] page last free stack trace: [ 235.535098][ C0] free_unref_page_prepare+0x742/0x750 [ 235.540620][ C0] free_unref_page+0x95/0x540 [ 235.545334][ C0] __free_pages+0x67/0x100 [ 235.549776][ C0] __vunmap+0x9c0/0xb80 [ 235.553953][ C0] vfree+0x61/0x90 [ 235.557695][ C0] bpf_check+0xb212/0x10d10 [ 235.562221][ C0] bpf_prog_load+0x10f0/0x16a0 [ 235.566998][ C0] __sys_bpf+0x57b/0x850 [ 235.571258][ C0] __x64_sys_bpf+0x7c/0x90 [ 235.575693][ C0] x64_sys_call+0x488/0x9a0 [ 235.580223][ C0] do_syscall_64+0x4c/0xa0 [ 235.584702][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.590624][ C0] [ 235.593053][ C0] Memory state around the buggy address: [ 235.598752][ C0] ffff88811722d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 235.607024][ C0] ffff88811722d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 235.615107][ C0] >ffff88811722d200: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 235.623365][ C0] ^ [ 235.628790][ C0] ffff88811722d280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 235.636860][ C0] ffff88811722d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 235.644929][ C0] ================================================================== [ 235.653018][ C0] Disabling lock debugging due to kernel taint [ 235.768824][ T28] audit: type=1400 audit(1776026357.586:159): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 235.790988][ T28] audit: type=1400 audit(1776026357.586:160): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 235.812348][ T28] audit: type=1400 audit(1776026357.586:161): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 235.841036][ T28] audit: type=1400 audit(1776026357.586:162): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 235.926482][ T28] audit: type=1400 audit(1776026357.586:163): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 235.948327][ T28] audit: type=1400 audit(1776026357.586:164): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 235.971423][ T28] audit: type=1400 audit(1776026357.586:165): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 235.994217][ T28] audit: type=1400 audit(1776026357.596:166): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[11602]" dev="pipefs" ino=11602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 236.017630][ T28] audit: type=1400 audit(1776026357.646:167): avc: denied { mounton } for pid=7294 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 237.536446][ T1591] À: port 1(macsec0) entered disabled state [ 237.544543][ T1591] device bridge_slave_1 left promiscuous mode [ 237.550858][ T1591] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.558354][ T1591] device bridge_slave_0 left promiscuous mode [ 237.564485][ T1591] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.572635][ T1591] device bridge_slave_1 left promiscuous mode [ 237.579126][ T1591] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.586617][ T1591] device bridge_slave_0 left promiscuous mode [ 237.592753][ T1591] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.601609][ T1591] device veth0_vlan left promiscuous mode [ 237.607671][ T1591] device veth0_vlan left promiscuous mode