last executing test programs: 10.895707s ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 10.202406785s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="6f16ee837f1c8199bcea5086b70bd2a4f366d758dcb2a0e6529cba6551ce2f71de00a8b97b9a1569975e86266705eee446525bbf96e6045a9b33b51b1b9d95472afaa1e2ed630c18b2b56019c4ab4993c5d4aa4f16371ad0efd5ef909b6e36dd1df05ecf9502a8aeee994673cb68efe4040a20e15217260b185b55a860322c8c7bf4d644cce9aa7cafac647f1883414ec79169553fb0fb876dabc7d7a56186a6a3c1348cfbbb294cc920c958a6cf734235fe44362707283f0000000000000006296cd6342d6be7dc877fdeb13d27c6e61cc1b224e1682bf3b443801cd229f2b35f673b723d1ba71227b75fd68556bc4fe795d477771519ed4665d7524348fa81b48bc94e4b", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 9.686625794s ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 8.380020913s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 7.491111248s ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 7.456997523s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 5.800057726s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 5.600029927s ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 3.87316337s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 3.54346408s ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 1.440410771s ago: executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x4, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='GPL\x00', 0x0, 0x9f, &(0x7f0000000740)=""/159, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000840)=[{0x4, 0x1, 0x5, 0xb}, {0x1, 0x5, 0x3, 0x2}, {0x3, 0x3, 0x3, 0x6}], 0x10, 0x27f191f5}, 0x90) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@o_path={&(0x7f00000009c0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xa987, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7f, '\x00', 0x0, r1, 0x2, 0x0, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_ext={0x1c, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="852000000100000085100000020000001837000003c997983700000000000000"], &(0x7f0000000100)='GPL\x00', 0x101, 0x0, 0x0, 0x41100, 0x36, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000540)={0x7}, 0x8, 0x10, 0x0, 0x0, 0xe2e9, r2, 0x4, &(0x7f0000000b40)=[r3, r4, r5, r6], &(0x7f0000000b80)=[{0x1, 0x2, 0xe, 0x4}, {0x5, 0x4, 0x10, 0x9}, {0x5, 0x5, 0x1, 0x5}, {0x1, 0x5, 0xb, 0xa}], 0x10, 0x6}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x50800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000048000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000840)='kmem_cache_free\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000380)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x4}}, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x21, 0x2080}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x1}, 0x90) write$cgroup_pid(r9, &(0x7f0000000c80), 0x12) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) 1.236766212s ago: executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61122400000000006113340000000000bf10000b0000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) write$cgroup_devices(r0, &(0x7f0000000280)={'b', ' *:* ', 'rwm\x00'}, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r4}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 1.149050775s ago: executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000580)="7581b8e61d300e8b7b12e409213218212fdfe100928d84c2a8b9e43a7cbba10c3ea39a52af87561663266970423eaec339c57b2d254280ac1f10b1ef91a365f5bccc1f41a9bee33890c20d24f33412db1f17f15cfe057766597903a4d17d72363096185d9441946fdcdcddf22683b228b2d3ff5a436ce08041b172", 0x7b}, {&(0x7f0000000600)="77f744e34531eb0097e9f89a0e16fe42d784863645866018df9c7191ed5c01445a5bcd2f13290a395e8a5ab548eec41ff293e618ad47514cdcf426d2a158cdcfb6ce16069c21132c2c5baf526c1b9bcfd9fea6b8cdf1782926f30a435ee9ddfbf139a823e51bba3974a402cfaf9008aef9", 0x71}, {&(0x7f00000006c0)="54ca6ca03a622257b12a56009059e41a2f6f98a28ec655796b8db33dabf68b33bc9cd0ad7a3917f93b95821ccbc3d5f2345ea6e4be81f6f99bc9b53f8277c75dddd4f27ae3a666608dc667b36502e8a85c4e4e4b696ab51865942f8976c629589b3096f1fab5cf4ce1666b385d4ef7b2c9f9e9c2f50d569d5947ceceabc932890339f6b0c38570b6e77786fdb84cb8fe2db644afc6fadeed6f80725d2d53811bf099f877ed552cd08aa272a6a7e30569bd03", 0xb2}], 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0506617, &(0x7f0000000040)=0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)}, 0x10) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff94}, 0x40000022) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000008c0)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="84491e02db6bc9ecb8b1acdee57caa88d8cc35ed49728619ff5af2b52b478710d63363e9887a579294ebdab170e27f5dac370348f7a82f776989503bf6f08940df7a33f2a63d2a8785cf01000080000000000d2a062a80e902a556c154fe3f7af704060b16ef053c96f330b99e7c118694fb32868b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.022938574s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2}) 877.100107ms ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id, @generic={0x0, 0x0, 0x0, 0x101}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 801.023608ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000004000000000000100ffec850000006d000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff002, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x8000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000007d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r3}, 0x10) bpf$PROG_LOAD(0x2, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48) 684.969566ms ago: executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=ANY=[], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x37}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [r3, r2]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 617.965446ms ago: executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x11, 0x0, 0x0, 0x200, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22fdb9"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x1}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0xc}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r6}, &(0x7f0000000600), &(0x7f0000000640)=r7}, 0x20) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0xa0}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 565.423684ms ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5b8582d9667e2d66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0x10, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000000480)=ANY=[@ANYRES64=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0xff9, &(0x7f0000002a00)=""/4089, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), ""/16, 0x0, 0x0, 0x0, 0x0, 0x20000000000001cb, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa3, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f0000000500), 0x8, 0x51, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000100), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000020000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000000c0)='ext4_unlink_enter\x00', r3}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0x4, 0x8, r4, 0xfffffffe}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYBLOB="2306a9887bc03e31c140fc0ec4dfdaebbda3b880eb10d8a128e1f792bf87679bc975ea4a00f3300e169d28a9aa71005b9ea64f941b0e65a8e4816396f93970fcccf163e1f8d0e4a2cd6893854ed400b07d0ed2feffd2b4a7c604bfd2ae617bc0f7491cba31bbdb21abf021bfa58ad4be8b", @ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x15) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000840)={r6, 0x0, &(0x7f00000007c0)=""/74}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 380.362762ms ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x10000}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0xfffffffc}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x5800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffff5f, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f00000002c0)=0x84005) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x1b, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000e1ffffff00000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018160000", @ANYRES32=r3, @ANYRES8=0x0, @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703008008000000b70400000100000085000000826b00009500000000000000"], 0x0, 0xbfd, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x5, 0x6, 0xffff0001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x0, 0x10, 0x4}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)='/proc/3\x00\xff\xff\xffat\x00QE\xf44.\xab%j'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x4000000) mkdirat$cgroup(r6, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x7fffffff, 0x1, 0xc898, 0x851, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xc}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000380)={0x2}, 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) mkdir(&(0x7f0000001000)='./cgroup/file0\x00', 0xb3bc3461c89e9469) 324.766961ms ago: executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001400)={0x0, 0x80, 0x8, 0x4, 0x7f, 0x1, 0x0, 0x1, 0x14004, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1}, 0x40, 0x9, 0xaa2c, 0x9, 0x7, 0x3, 0x2, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x1) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20040000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r1, &(0x7f00000001c0)='FROZEN\x00', 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xed, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1442}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1e1}}, @jmp={0x5, 0x0, 0x4, 0x8, 0xa, 0x0, 0xfffffffffffffff4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x4, 0x0, 0x0, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1c5e8, r2, 0x3, &(0x7f0000000c80)=[r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r1, r2], &(0x7f0000000cc0)=[{0x2}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000001810000200000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB='\x00'], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r6}, &(0x7f0000000700), &(0x7f0000000740)='%pi6 \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) sendmsg$tipc(r7, 0x0, 0x4080) 266.022699ms ago: executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x15}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e6eb010018000000000000000c0000000c000000020000000000000000000006040000000000"], 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f0000000040)}, 0x10) write$cgroup_subtree(r4, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x26, &(0x7f0000000040), 0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 166.353585ms ago: executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x7c3340, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'xfrm0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611063000000000007000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd63726558"], 0xfdef) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r4, 0x0, 0x0}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8930, &(0x7f0000000500)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x01\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x04.\x9aL\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x56) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/250, 0xfa}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x11, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000010000000000000035a01a181800000009000000000000000008000095000000000800000018000000800000000000000096000000184f0000080000000000000000000000184b0000f8ffffff0000000000000000850000007d00000085100000fbffff03000000000000000095000000000000009500"/136], &(0x7f0000001340)='GPL\x00', 0x2, 0xdf, &(0x7f0000001480)=""/223, 0x40e00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000015c0)={0x0, 0x5, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x2, 0x4, 0xb, 0x9}], 0x10, 0xff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001040)=@bpf_lsm={0x1d, 0x10, &(0x7f00000006c0)=ANY=[@ANYBLOB="0d000000f0ffffff18450000feffffff0000000000000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb50200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xa5, &(0x7f0000000380)=""/165, 0x40f00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x7, 0x4, 0x200}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001000)=[{0x2, 0x5, 0x10, 0x2}, {0x0, 0x4, 0x10, 0xa}], 0x10, 0x2}, 0x90) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0xd, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x2}, @ringbuf_query, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @generic={0x9, 0x3, 0x7, 0x5, 0xdd}, @generic={0x3f, 0xa, 0x4, 0x7, 0x8440ec1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='GPL\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0xb1bc77aff1e35844, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x4, 0x7, 0x100}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6], &(0x7f0000000800)=[{0x3, 0x2, 0x7, 0x1}, {0x0, 0x2, 0xc, 0xc}, {0x3, 0x1, 0xe, 0x1}, {0x3, 0x4, 0x3, 0x5}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@ifindex, 0x24, 0x1, 0x7, &(0x7f0000000200)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0]}, 0x40) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x90) 61.452411ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 27.117306ms ago: executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000080), &(0x7f0000000880)=r2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x14, &(0x7f0000000040)=ANY=[@ANYRESHEX=r5, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001340)=ANY=[@ANYBLOB="9feb0100183ba9f9cbb6471a1930f5413048e2e783010000001c0000000600000002000e580000000e0200000000000000020400000000020c0000000000005f303000b51486bff59401764f15c339e7c125590e28096f571b67bd8289f4731d23b645fe9c94cfd83d54503dca1687ebce601c7bbed63a360c09fec968d20d78ca9c4f266f7379232fd71a05634b7f6b40a76d6df99f26c7a9763a8f0a0fd67b8642add79766ba777bee541513b7b9a302146a3c2f0e3a7c8cf19429647850ad5bbcd603af9b038c0be3"], &(0x7f0000000040)=""/203, 0x3a, 0xcb, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='rxrpc_peer\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) unlink(0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x40a0}, 0x0, 0xffffffffffffffff, r8, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 5.911559ms ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) mkdir(&(0x7f0000000280)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700) 0s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8, 0x85, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="99eb010018000000000000003c0000003c000000030000000000000000000008000000000b0000000000000a03000000040000000000000b0300000001000000000000020500000004000000000000d22b0db7553d0300"], &(0x7f0000000540)=""/79, 0x57, 0x4f, 0x0, 0x100}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x0, 0xee, &(0x7f0000000340)=""/238}, 0x80) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, @generic={0x8, 0x9, 0x3, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x1ff, 0x0, 0x0, 0x1e00, 0x1, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x8, 0x4f}, 0x10, 0xffffffffffffffff, r5, 0x5, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000400)=[{}, {0x0, 0x2, 0x10, 0xa}, {0x4, 0x2, 0x4000, 0xa}, {0x1, 0x5, 0xe, 0x8}, {0x5, 0x3, 0x10, 0x8}]}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000000040)='FROZEN\x00', 0x7) r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) write$cgroup_freezer_state(r7, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x19, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000300)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x22, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x4, 0x9, 0x82d, 0x80000000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xc9}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400006c00000000000100000400ffe0f50500000001000000000000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040), 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc020660b, &(0x7f0000000040)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x2, 0xc4, &(0x7f00000002c0)=""/196}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x8, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000000240)=""/15, 0x28, 0xf, 0x0, 0xfffffff7}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. 2024/06/24 14:46:07 fuzzer started 2024/06/24 14:46:07 dialing manager at 10.128.0.163:30002 [ 21.101118][ T23] audit: type=1400 audit(1719240367.760:66): avc: denied { node_bind } for pid=344 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.121495][ T23] audit: type=1400 audit(1719240367.760:67): avc: denied { name_bind } for pid=344 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.175466][ T23] audit: type=1400 audit(1719240367.830:68): avc: denied { setattr } for pid=355 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.198912][ T23] audit: type=1400 audit(1719240367.830:69): avc: denied { mounton } for pid=356 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.225441][ T353] cgroup1: Unknown subsys name 'net' [ 21.230589][ T23] audit: type=1400 audit(1719240367.830:70): avc: denied { mount } for pid=356 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.248437][ T353] cgroup1: Unknown subsys name 'net_prio' [ 21.254942][ T23] audit: type=1400 audit(1719240367.890:71): avc: denied { mounton } for pid=353 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.260290][ T353] cgroup1: Unknown subsys name 'devices' [ 21.288127][ T362] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.288369][ T23] audit: type=1400 audit(1719240367.890:72): avc: denied { mount } for pid=353 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.318530][ T23] audit: type=1400 audit(1719240367.950:73): avc: denied { unmount } for pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.338075][ T23] audit: type=1400 audit(1719240367.950:74): avc: denied { relabelto } for pid=362 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.363239][ T23] audit: type=1400 audit(1719240367.950:75): avc: denied { write } for pid=362 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.396781][ T360] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.460876][ T353] cgroup1: Unknown subsys name 'hugetlb' [ 21.466545][ T353] cgroup1: Unknown subsys name 'rlimit' 2024/06/24 14:46:08 starting 5 executor processes [ 21.955775][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.962681][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.970088][ T370] device bridge_slave_0 entered promiscuous mode [ 21.986859][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.993730][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.001305][ T370] device bridge_slave_1 entered promiscuous mode [ 22.094453][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.101550][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.109021][ T373] device bridge_slave_0 entered promiscuous mode [ 22.128986][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.135819][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.143179][ T373] device bridge_slave_1 entered promiscuous mode [ 22.187812][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.194640][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.202166][ T371] device bridge_slave_0 entered promiscuous mode [ 22.219882][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.226707][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.234068][ T371] device bridge_slave_1 entered promiscuous mode [ 22.259633][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.266460][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.274004][ T374] device bridge_slave_0 entered promiscuous mode [ 22.284479][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.291421][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.298851][ T374] device bridge_slave_1 entered promiscuous mode [ 22.308686][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.315502][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.322919][ T372] device bridge_slave_0 entered promiscuous mode [ 22.329721][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.336556][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.344103][ T372] device bridge_slave_1 entered promiscuous mode [ 22.475735][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.482673][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.489814][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.496546][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.569605][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.576561][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.583698][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.590464][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.602586][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.609427][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.616524][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.623326][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.635329][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.642337][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.649343][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.656744][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.664335][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.671342][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.679142][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.686373][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.722218][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.730428][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.737241][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.745241][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.753229][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.760063][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.785414][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.793605][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.801487][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.848215][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.855693][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.864086][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.872277][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.880433][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.887242][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.894717][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.902702][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.909530][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.927758][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.935927][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.944527][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.951364][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.958709][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.966815][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.975291][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.982131][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.989332][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.996511][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.003850][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.012007][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.020056][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.026868][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.040800][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.048653][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.056677][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.064698][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.071547][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.082998][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.090397][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.109292][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.117209][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.125249][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.136411][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.144744][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.151582][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.159058][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.167142][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.175179][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.182000][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.189456][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.197300][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.205177][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.213032][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.221226][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.237930][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.245849][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.253857][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.262001][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.277875][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.285883][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.310695][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.318880][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.327262][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.335754][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.343798][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.351827][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.359797][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.367849][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.383314][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.391410][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.399684][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.407810][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.431194][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.439892][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.447604][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.456705][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.464903][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.472577][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.493641][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.502132][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.518055][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.526407][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.544902][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.554550][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.563496][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.584668][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.592994][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.600887][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.608655][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.616286][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.624624][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.632659][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.653018][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.661588][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.669581][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.677590][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.695147][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.703493][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.724011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.736825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.747563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.756113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.783104][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.791551][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.800902][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.811249][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.828590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.843591][ T403] [ 23.845862][ T403] ********************************************************** [ 23.854011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.882369][ T403] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 23.897328][ T403] ** ** [ 23.935538][ T403] ** trace_printk() being used. Allocating extra memory. ** [ 23.957674][ T410] [ 23.963482][ T410] ********************************************************** [ 23.964245][ T415] cgroup: syz-executor.4 (415) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.990855][ T403] ** ** [ 24.007878][ T410] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 24.009244][ C0] hrtimer: interrupt took 11115 ns [ 24.021842][ T410] ** ** [ 24.035895][ T415] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.043887][ T403] ** This means that this is a DEBUG kernel and it is ** [ 24.047751][ T407] device syzkaller0 entered promiscuous mode [ 24.061581][ T410] ** trace_printk() being used. Allocating extra memory. ** [ 24.072702][ T410] ** ** [ 24.085820][ T410] ** This means that this is a DEBUG kernel and it is ** [ 24.093109][ T410] ** unsafe for production use. ** [ 24.100372][ T410] ** ** [ 24.107629][ T410] ** If you see this message and you are not debugging ** [ 24.114890][ T410] ** the kernel, report this immediately to your vendor! ** [ 24.140225][ T410] ** ** [ 24.167793][ T410] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 24.175401][ T403] ** unsafe for production use. ** [ 24.194358][ T403] ** ** [ 24.202237][ T427] sock: process `syz-executor.4' is using obsolete setsockopt SO_BSDCOMPAT [ 24.210756][ T410] ********************************************************** [ 24.225706][ T403] ** If you see this message and you are not debugging ** [ 24.233312][ T427] syz-executor.4[427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.233360][ T427] syz-executor.4[427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.263080][ T403] ** the kernel, report this immediately to your vendor! ** [ 24.475709][ T403] ** ** [ 24.484401][ T403] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 24.491801][ T403] ********************************************************** [ 25.151863][ T451] device syzkaller0 entered promiscuous mode [ 25.468958][ T484] sock: process `syz-executor.2' is using obsolete setsockopt SO_BSDCOMPAT [ 25.589235][ T492] syz-executor.2[492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.589282][ T492] syz-executor.2[492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.563389][ T519] device syzkaller0 entered promiscuous mode [ 26.809530][ T536] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 3283 (only 8 groups) [ 26.914648][ T513] syz-executor.1 (513) used greatest stack depth: 20984 bytes left [ 27.004619][ T551] ------------[ cut here ]------------ [ 27.010399][ T551] perf buffer not large enough [ 27.010516][ T551] WARNING: CPU: 0 PID: 551 at kernel/trace/trace_event_perf.c:403 perf_trace_buf_alloc+0x229/0x2f0 [ 27.025580][ T551] Modules linked in: [ 27.029318][ T551] CPU: 0 PID: 551 Comm: syz-executor.2 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0 [ 27.039211][ T551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 27.049132][ T551] RIP: 0010:perf_trace_buf_alloc+0x229/0x2f0 [ 27.054924][ T551] Code: 48 89 e8 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa 11 fa ff c6 05 ec 6d df 04 01 48 c7 c7 c0 44 e0 84 e8 c7 c5 d0 ff <0f> 0b 31 ed eb d0 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 2e fe ff ff [ 27.074361][ T551] RSP: 0018:ffff8881eaf175e0 EFLAGS: 00010246 [ 27.080261][ T551] RAX: cca8e38410d70400 RBX: ffff8881eaf176a0 RCX: 0000000000040000 [ 27.088077][ T551] RDX: ffffc9000194a000 RSI: 000000000000b9dc RDI: 000000000000b9dd [ 27.095889][ T551] RBP: ffff8881eaf17710 R08: ffffffff814d4a22 R09: fffffbfff0dd7a0c [ 27.103693][ T551] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000001024 [ 27.111503][ T551] R13: ffffffff85f85a20 R14: ffff8881eaf17680 R15: dffffc0000000000 [ 27.119329][ T551] FS: 00007f4874c046c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 27.128079][ T551] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.134501][ T551] CR2: 0000000000000000 CR3: 00000001e8c3e000 CR4: 00000000003406b0 [ 27.142314][ T551] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.150126][ T551] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.157932][ T551] Call Trace: [ 27.161073][ T551] ? __warn+0x162/0x250 [ 27.165060][ T551] ? report_bug+0x3a1/0x4e0 [ 27.169396][ T551] ? perf_trace_buf_alloc+0x229/0x2f0 [ 27.174604][ T551] ? perf_trace_buf_alloc+0x229/0x2f0 [ 27.179810][ T551] ? do_invalid_op+0x6e/0x110 [ 27.184324][ T551] ? invalid_op+0x1e/0x30 [ 27.188491][ T551] ? vprintk_emit+0x192/0x3f0 [ 27.193000][ T551] ? perf_trace_buf_alloc+0x229/0x2f0 [ 27.198213][ T551] perf_trace_inodepath+0x204/0x4f0 [ 27.203248][ T551] ? trace_event_raw_event_inodepath+0x340/0x340 [ 27.209410][ T551] success_walk_trace+0x33f/0x3d0 [ 27.214265][ T551] ? trace_event_raw_event_inodepath+0x340/0x340 [ 27.220431][ T551] ? __nd_alloc_stack+0x110/0x110 [ 27.225288][ T551] ? walk_component+0x1a0/0x590 [ 27.229996][ T551] ? handle_lookup_down+0x5b0/0x5b0 [ 27.235009][ T551] ? path_init+0x8bd/0xee0 [ 27.239266][ T551] complete_walk+0x10b/0x240 [ 27.243689][ T551] path_lookupat+0x296/0x3f0 [ 27.248120][ T551] do_o_path+0x91/0x230 [ 27.252111][ T551] ? do_tmpfile+0x400/0x400 [ 27.256448][ T551] ? path_openat+0x173/0x34b0 [ 27.260963][ T551] ? path_openat+0x2eb3/0x34b0 [ 27.265561][ T551] path_openat+0x2ec5/0x34b0 [ 27.270009][ T551] ? __perf_event_task_sched_in+0x219/0x2a0 [ 27.275718][ T551] ? debug_smp_processor_id+0x20/0x20 [ 27.280929][ T551] ? switch_mm_irqs_off+0x6b5/0xab0 [ 27.285957][ T551] ? _raw_spin_unlock_irq+0x4a/0x60 [ 27.290999][ T551] ? __schedule+0xb0d/0x1320 [ 27.295457][ T551] ? do_filp_open+0x450/0x450 [ 27.299945][ T551] ? is_mmconf_reserved+0x430/0x430 [ 27.304965][ T551] ? _raw_write_unlock_bh+0x30/0x43 [ 27.310007][ T551] do_filp_open+0x20b/0x450 [ 27.314338][ T551] ? vfs_tmpfile+0x2c0/0x2c0 [ 27.318784][ T551] ? _raw_spin_unlock+0x49/0x60 [ 27.323451][ T551] ? __alloc_fd+0x4c1/0x560 [ 27.327806][ T551] do_sys_open+0x39c/0x810 [ 27.332054][ T551] ? file_open_root+0x490/0x490 [ 27.336738][ T551] ? switch_fpu_return+0x1d4/0x410 [ 27.341692][ T551] do_syscall_64+0xca/0x1c0 [ 27.346023][ T551] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 27.351760][ T551] RIP: 0033:0x7f487588a0a9 [ 27.356000][ T551] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 27.375437][ T551] RSP: 002b:00007f4874c040c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 27.383690][ T551] RAX: ffffffffffffffda RBX: 00007f48759c0f80 RCX: 00007f487588a0a9 [ 27.391497][ T551] RDX: 0000000000200002 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 27.399308][ T551] RBP: 00007f48758f9074 R08: 0000000000000000 R09: 0000000000000000 [ 27.407115][ T551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.414930][ T551] R13: 000000000000000b R14: 00007f48759c0f80 R15: 00007ffdb0ec2d98 [ 27.422746][ T551] ---[ end trace 44c1b02c0c034a68 ]--- [ 27.538078][ T23] kauditd_printk_skb: 36 callbacks suppressed [ 27.538109][ T23] audit: type=1400 audit(1719240374.200:112): avc: denied { create } for pid=556 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 27.979794][ T587] sock: process `syz-executor.1' is using obsolete setsockopt SO_BSDCOMPAT [ 27.999544][ T587] syz-executor.1[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.999597][ T587] syz-executor.1[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.271755][ T23] audit: type=1400 audit(1719240375.930:113): avc: denied { create } for pid=608 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 29.626092][ T638] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.634471][ T638] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.039001][ T658] device sit0 entered promiscuous mode [ 30.689483][ T697] device syzkaller0 entered promiscuous mode [ 30.747204][ T23] audit: type=1400 audit(1719240377.400:114): avc: denied { create } for pid=706 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 30.772126][ T23] audit: type=1400 audit(1719240377.400:115): avc: denied { create } for pid=706 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.137715][ T23] audit: type=1400 audit(1719240377.790:116): avc: denied { create } for pid=724 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 32.225786][ T769] syz-executor.2[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.225886][ T769] syz-executor.2[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.498974][ T23] audit: type=1400 audit(1719240379.150:117): avc: denied { create } for pid=792 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 33.258281][ T23] audit: type=1400 audit(1719240379.920:118): avc: denied { create } for pid=830 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 34.021069][ T23] audit: type=1400 audit(1719240380.680:119): avc: denied { create } for pid=866 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 34.052155][ T867] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.061454][ T867] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.083715][ T867] device bridge_slave_1 left promiscuous mode [ 34.091456][ T867] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.103696][ T867] device bridge_slave_0 left promiscuous mode [ 34.112147][ T867] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.365407][ T23] audit: type=1400 audit(1719240381.020:120): avc: denied { write } for pid=884 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.411249][ T23] audit: type=1400 audit(1719240381.060:121): avc: denied { create } for pid=883 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.460102][ T893] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.467177][ T893] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.508679][ T893] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.515763][ T893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.522905][ T893] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.529750][ T893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.567256][ T893] device bridge0 entered promiscuous mode [ 34.662885][ T23] audit: type=1400 audit(1719240381.320:122): avc: denied { create } for pid=910 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 34.716061][ T911] device syzkaller0 entered promiscuous mode [ 34.830171][ T921] device sit0 entered promiscuous mode [ 34.967112][ T930] device pim6reg1 entered promiscuous mode [ 34.981951][ T23] audit: type=1400 audit(1719240381.640:123): avc: denied { ioctl } for pid=919 comm="syz-executor.0" path="socket:[14644]" dev="sockfs" ino=14644 ioctlcmd=0x54d0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.433964][ T949] device syzkaller0 entered promiscuous mode [ 35.501803][ T23] audit: type=1400 audit(1719240382.160:124): avc: denied { create } for pid=951 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.731428][ T966] device pim6reg1 entered promiscuous mode [ 35.834692][ T978] EXT4-fs warning (device sda1): ext4_ioctl:888: Setting inode version is not supported with metadata_csum enabled. [ 37.008313][ T23] audit: type=1400 audit(1719240383.670:125): avc: denied { create } for pid=1008 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 37.232976][ T1035] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 37.332819][ T1025] device syzkaller0 entered promiscuous mode [ 37.821233][ T1047] device syzkaller0 entered promiscuous mode [ 37.841689][ T1029] syz-executor.0 (1029) used greatest stack depth: 20952 bytes left [ 40.511600][ T1128] device syzkaller0 entered promiscuous mode [ 41.286018][ T1159] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.292892][ T1159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.300053][ T1159] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.306877][ T1159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.339512][ T1159] device bridge0 entered promiscuous mode [ 41.444470][ T1171] device syzkaller0 entered promiscuous mode [ 41.587590][ T1181] device syzkaller0 entered promiscuous mode [ 42.198373][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 42.220506][ T23] audit: type=1400 audit(1719240388.880:126): avc: denied { create } for pid=1240 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 42.325799][ T1243] sock: sock_set_timeout: `syz-executor.3' (pid 1243) tries to set negative timeout [ 42.826445][ T1275] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.833943][ T1275] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.852562][ T1275] device bridge0 left promiscuous mode [ 43.104253][ T1295] device syzkaller0 entered promiscuous mode [ 44.191234][ T23] audit: type=1400 audit(1719240390.840:127): avc: denied { create } for pid=1326 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.333718][ T1346] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.340761][ T1346] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.465500][ T1354] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.776001][ T1374] device vxcan1 entered promiscuous mode [ 45.186517][ T23] audit: type=1400 audit(1719240391.840:128): avc: denied { create } for pid=1392 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 45.326688][ T1401] device lo entered promiscuous mode [ 45.707786][ T1422] device syzkaller0 entered promiscuous mode [ 45.937812][ T1394] syz-executor.3 (1394) used greatest stack depth: 20728 bytes left [ 46.205405][ T23] audit: type=1400 audit(1719240392.860:129): avc: denied { create } for pid=1465 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.839588][ T23] audit: type=1400 audit(1719240394.500:130): avc: denied { ioctl } for pid=1570 comm="syz-executor.1" path="net:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.436220][ T1621] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 5 (only 8 groups) [ 50.565762][ T23] audit: type=1400 audit(1719240397.220:131): avc: denied { create } for pid=1654 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 51.392479][ T23] audit: type=1400 audit(1719240398.040:132): avc: denied { create } for pid=1662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 51.635578][ T1689] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 59301 (only 8 groups) [ 51.658961][ T1692] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.688796][ T1692] device bridge0 left promiscuous mode [ 51.747618][ T1695] device bridge_slave_1 left promiscuous mode [ 51.767849][ T1695] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.807818][ T1695] device bridge_slave_0 left promiscuous mode [ 51.814370][ T1695] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.507445][ T1732] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.515671][ T1732] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.083520][ T1757] EXT4-fs warning (device sda1): ext4_group_extend:1835: need to use ext2online to resize further [ 53.698281][ T1776] device wg2 entered promiscuous mode [ 53.828394][ T1785] syz-executor.2[1785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.828554][ T1785] syz-executor.2[1785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.372955][ T1797] gretap0: refused to change device tx_queue_len [ 54.652069][ T1806] device wg2 entered promiscuous mode [ 54.684249][ T370] syz-executor.1 (370) used greatest stack depth: 19320 bytes left [ 54.816156][ T23] audit: type=1400 audit(1719240401.470:133): avc: denied { create } for pid=1815 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 54.923289][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.931386][ T1817] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.938857][ T1817] device bridge_slave_0 entered promiscuous mode [ 54.946396][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.953350][ T1817] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.960740][ T1817] device bridge_slave_1 entered promiscuous mode [ 55.154157][ T1833] gretap0: refused to change device tx_queue_len [ 55.766776][ T23] audit: type=1400 audit(1719240402.420:134): avc: denied { append } for pid=1849 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 55.852650][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.865936][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.916077][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.932260][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.998142][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.005002][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.083429][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.136587][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.185119][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.191993][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.297984][ T7] device bridge_slave_1 left promiscuous mode [ 56.304730][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.362840][ T7] device bridge_slave_0 left promiscuous mode [ 56.411840][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.599559][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.607141][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.665304][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.818459][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.826598][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.931906][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.968154][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.976557][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.058448][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.167086][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.197057][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.212343][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.230717][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.243224][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.251991][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.284610][ T23] audit: type=1400 audit(1719240403.940:135): avc: denied { mounton } for pid=1817 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=11595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 57.405226][ T1890] device syzkaller0 entered promiscuous mode [ 58.001341][ T1902] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.008356][ T1902] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.015936][ T1902] device bridge_slave_0 entered promiscuous mode [ 58.025882][ T1902] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.033847][ T1902] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.042055][ T1902] device bridge_slave_1 entered promiscuous mode [ 58.164659][ T1902] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.171611][ T1902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.178735][ T1902] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.185477][ T1902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.530094][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.558608][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.590152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.597522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.718838][ T1950] device syzkaller0 left promiscuous mode [ 58.725289][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.734038][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.740880][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.757958][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.766231][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.773069][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.838999][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.874518][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.884979][ T7] device bridge_slave_1 left promiscuous mode [ 58.892252][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.900202][ T7] device bridge_slave_0 left promiscuous mode [ 58.906252][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.039679][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.070728][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.080023][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.098064][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.106236][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.133071][ T1981] syz-executor.2[1981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.135005][ T1981] syz-executor.2[1981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.135418][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.176604][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.198979][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.215674][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.255133][ T1986] syz-executor.2[1986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.500100][ T1998] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.518571][ T1998] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.525927][ T1998] device bridge_slave_0 entered promiscuous mode [ 59.532949][ T1998] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.539873][ T1998] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.547214][ T1998] device bridge_slave_1 entered promiscuous mode [ 59.667604][ T1998] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.674607][ T1998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.681760][ T1998] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.688601][ T1998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.764473][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.772287][ T397] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.779689][ T397] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.802083][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.811165][ T433] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.818044][ T433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.826905][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.835752][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.842606][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.871266][ T23] audit: type=1400 audit(1719240406.530:136): avc: denied { create } for pid=2014 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 59.892751][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.917183][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.956401][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.988672][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.010672][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.053445][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.062261][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.078307][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.086440][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.207920][ T7] device bridge_slave_1 left promiscuous mode [ 60.214081][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.221562][ T7] device bridge_slave_0 left promiscuous mode [ 60.227541][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.528343][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.556830][ T2048] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.565263][ T2048] device bridge_slave_0 entered promiscuous mode [ 60.574394][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.581252][ T2048] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.596847][ T2048] device bridge_slave_1 entered promiscuous mode [ 60.786190][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.793141][ T2048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.800288][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.807130][ T2048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.926674][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.964471][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.046286][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.109180][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.176215][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.183088][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.495887][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.605790][ T23] audit: type=1400 audit(1719240408.260:137): avc: denied { create } for pid=2086 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 61.619697][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.632450][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.711560][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.725880][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.747737][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.764517][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.819319][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.863437][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.898762][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.907664][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.925817][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.934336][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.948695][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.956718][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.965011][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.973773][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.314736][ T23] audit: type=1400 audit(1719240408.970:138): avc: denied { create } for pid=2135 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 62.354347][ T2132] device syzkaller0 entered promiscuous mode [ 62.391964][ T7] device bridge_slave_1 left promiscuous mode [ 62.398025][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.405239][ T7] device bridge_slave_0 left promiscuous mode [ 62.411381][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.476758][ T2139] device wg2 left promiscuous mode [ 62.545167][ T2128] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.570730][ T2128] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.578216][ T2128] device bridge_slave_0 entered promiscuous mode [ 62.599974][ T2128] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.609154][ T2128] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.622349][ T2128] device bridge_slave_1 entered promiscuous mode [ 62.801851][ T2128] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.808714][ T2128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.815834][ T2128] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.822599][ T2128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.912426][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.932528][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.973977][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.999513][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.021729][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.028712][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.165636][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.229087][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.235951][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.358276][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.366223][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.413146][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.422977][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.514702][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 63.532935][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.606098][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 63.617315][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.645022][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.653532][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.670881][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.679263][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.687419][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.696684][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 64.193343][ T2217] device syzkaller0 entered promiscuous mode [ 64.356321][ T2225] Q6\bY4: renamed from lo [ 64.424922][ T23] audit: type=1400 audit(1719240411.080:139): avc: denied { create } for pid=2234 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 64.604959][ T2246] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.612282][ T2246] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.619705][ T2246] device bridge_slave_0 entered promiscuous mode [ 64.626861][ T2246] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.643934][ T2246] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.651508][ T2246] device bridge_slave_1 entered promiscuous mode [ 64.701831][ T7] device bridge_slave_1 left promiscuous mode [ 64.708044][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.727407][ T7] device bridge_slave_0 left promiscuous mode [ 64.733726][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.833871][ T2246] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.840917][ T2246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.848043][ T2246] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.854787][ T2246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.915453][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.932973][ T397] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.945785][ T397] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.988472][ T2278] device syzkaller0 entered promiscuous mode [ 64.995569][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.003960][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.010807][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.018625][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.026697][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.033544][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.071789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.090774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.127506][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.155104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.173372][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.189230][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.211547][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.368355][ T2307] gretap0: refused to change device tx_queue_len [ 65.630640][ T2325] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.637514][ T2325] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.648304][ T2325] device bridge_slave_0 entered promiscuous mode [ 65.664534][ T2325] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.671713][ T2325] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.679194][ T2325] device bridge_slave_1 entered promiscuous mode [ 65.797545][ T2325] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.804424][ T2325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.811540][ T2325] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.818287][ T2325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.887409][ T2343] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.894494][ T2343] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.902899][ T2343] device bridge_slave_0 entered promiscuous mode [ 65.912162][ T7] device bridge_slave_1 left promiscuous mode [ 65.918276][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.926023][ T7] device bridge_slave_0 left promiscuous mode [ 65.932121][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.998219][ T2343] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.005249][ T2343] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.012883][ T2343] device bridge_slave_1 entered promiscuous mode [ 66.045901][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.054648][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.061955][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.093045][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.106737][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.113621][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.137208][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.154044][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.160926][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.198093][ T74] cfg80211: failed to load regulatory.db [ 66.237595][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.258232][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.275769][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.322225][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.354672][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.390449][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.399373][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.522399][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.532390][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.568069][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.576407][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.585782][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.592641][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.646666][ T2364] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.653831][ T2364] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.664264][ T2364] device bridge_slave_0 entered promiscuous mode [ 66.683134][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.703403][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.717104][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.725369][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.732351][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.743757][ T2364] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.750684][ T2364] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.758103][ T2364] device bridge_slave_1 entered promiscuous mode [ 66.768149][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.777113][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.786910][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.795164][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.882935][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.896682][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.968844][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.985120][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.055763][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.067136][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.099412][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.107572][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.129472][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.137809][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.152616][ T2374] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.159867][ T2374] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.167181][ T2374] device bridge_slave_0 entered promiscuous mode [ 67.178121][ T2374] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.186687][ T2374] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.197502][ T2374] device bridge_slave_1 entered promiscuous mode [ 67.250218][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.258168][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.266176][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.273008][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.299144][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.308643][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.316674][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.323686][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.341383][ T2395] device bridge0 entered promiscuous mode [ 67.349142][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.395279][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.431407][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.441548][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.494316][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.502477][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.511415][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.519649][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.562667][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.573127][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.583771][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.593002][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.684403][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.692970][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.714323][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.722911][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.731645][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.738485][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.745974][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.762367][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.779189][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.786123][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.820751][ T7] device bridge_slave_1 left promiscuous mode [ 67.826701][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.867228][ T7] device bridge_slave_0 left promiscuous mode [ 67.890968][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.944211][ T7] device bridge_slave_1 left promiscuous mode [ 67.956840][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.964537][ T7] device bridge_slave_0 left promiscuous mode [ 67.977151][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.010652][ T7] device bridge_slave_1 left promiscuous mode [ 68.023130][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.033629][ T7] device bridge_slave_0 left promiscuous mode [ 68.041889][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.367845][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.375310][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.383211][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.392511][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.401719][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.447082][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.455330][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.494033][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.506135][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.514000][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.522423][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.539098][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.547591][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.556007][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.564577][ T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.022916][ T2441] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.030200][ T2441] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.037441][ T2441] device bridge_slave_0 entered promiscuous mode [ 69.050654][ T2441] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.057521][ T2441] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.064804][ T2441] device bridge_slave_1 entered promiscuous mode [ 69.071559][ T2440] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.078395][ T2440] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.085649][ T2440] device bridge_slave_0 entered promiscuous mode [ 69.097327][ T2440] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.104240][ T2440] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.111740][ T2440] device bridge_slave_1 entered promiscuous mode [ 69.147229][ T2444] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.154275][ T2444] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.161818][ T2444] device bridge_slave_0 entered promiscuous mode [ 69.172140][ T2444] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.179013][ T2444] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.186295][ T2444] device bridge_slave_1 entered promiscuous mode [ 69.302946][ T2440] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.309818][ T2440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.316929][ T2440] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.323692][ T2440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.340318][ T2441] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.347172][ T2441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.354301][ T2441] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.361065][ T2441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.415330][ T2444] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.422198][ T2444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.429273][ T2444] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.436064][ T2444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.448919][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.456090][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.463867][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.471274][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.478456][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.485419][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.514327][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.521600][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.538047][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.546137][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.554239][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.562591][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.570700][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.577548][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.584898][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.593075][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.601101][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.607926][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.618368][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.625668][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.652968][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.661449][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.669503][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.676335][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.683675][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.708396][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.716431][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.723280][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.730535][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.738781][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.746819][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.753664][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.830028][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.838928][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.847116][ T391] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.853981][ T391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.870778][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.879245][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.886978][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.895974][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.922802][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.931023][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.939149][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.947018][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.955314][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.963508][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.018123][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.026343][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.034634][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.042891][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.051078][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.059706][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.113021][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.122423][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.131575][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.139799][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.148103][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.156370][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.192331][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.200901][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.209231][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.216974][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.226712][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.234989][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.243556][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.251720][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.259825][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.267934][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.305531][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.314720][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.324271][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.332646][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.341272][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.349871][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.371525][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.381056][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.414528][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.424897][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.462935][ T2482] device syzkaller0 entered promiscuous mode [ 70.690183][ T2489] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.697020][ T2489] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.714642][ T2489] device bridge_slave_0 entered promiscuous mode [ 70.730847][ T2489] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.746566][ T2489] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.763090][ T2489] device bridge_slave_1 entered promiscuous mode [ 70.835259][ T7] device bridge_slave_1 left promiscuous mode [ 70.841942][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.851342][ T7] device bridge_slave_0 left promiscuous mode [ 70.872046][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.897312][ T7] device bridge_slave_1 left promiscuous mode [ 70.915072][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.932249][ T7] device bridge_slave_0 left promiscuous mode [ 70.947974][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.968694][ T7] device bridge_slave_1 left promiscuous mode [ 70.974681][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.988016][ T7] device bridge_slave_0 left promiscuous mode [ 70.994004][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.453254][ T2504] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.460180][ T2504] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.467558][ T2504] device bridge_slave_0 entered promiscuous mode [ 71.481502][ T2504] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.489318][ T2504] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.496805][ T2504] device bridge_slave_1 entered promiscuous mode [ 71.551199][ T2489] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.558189][ T2489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.565279][ T2489] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.572075][ T2489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.595318][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.602505][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.693930][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.701878][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.728923][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.737386][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.745447][ T466] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.752278][ T466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.760453][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.768752][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.776822][ T466] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.783654][ T466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.813081][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.821672][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.829861][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.838517][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.872567][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.886825][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.898014][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.906005][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.947631][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.957373][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.966510][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.974857][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.983550][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.991867][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.015194][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.024407][ T23] audit: type=1400 audit(1719240418.690:140): avc: denied { create } for pid=2552 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 72.055712][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.064133][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.089319][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.105101][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.111959][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.149126][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.156803][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.168693][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.176846][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.183690][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.215704][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.239758][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.264047][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.307141][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.365064][ T2561] device wg2 entered promiscuous mode [ 72.387373][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.417904][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.425992][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.446353][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.464970][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.687200][ T2576] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.694683][ T2576] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.707998][ T2576] device bridge_slave_0 entered promiscuous mode [ 72.715293][ T2576] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.722188][ T2576] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.741202][ T2576] device bridge_slave_1 entered promiscuous mode [ 72.990369][ T2576] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.997250][ T2576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.004374][ T2576] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.011134][ T2576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.217750][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.227551][ T2566] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.234888][ C0] ------------[ cut here ]------------ [ 73.240144][ C0] General protection fault in user access. Non-canonical address? [ 73.240209][ C0] WARNING: CPU: 0 PID: 10 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0x9b/0xc0 [ 73.256894][ C0] Modules linked in: [ 73.260656][ C0] CPU: 0 PID: 10 Comm: ksoftirqd/0 Tainted: G W 5.4.274-syzkaller-00002-g6f97bd951d82 #0 [ 73.271567][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 73.281478][ C0] RIP: 0010:ex_handler_uaccess+0x9b/0xc0 [ 73.286957][ C0] Code: f7 e8 e9 a3 63 00 49 89 2e b0 01 5b 41 5e 41 5f 5d c3 e8 48 be 33 00 c6 05 52 1a 19 05 01 48 c7 c7 e0 d1 a6 84 e8 65 72 0a 00 <0f> 0b eb 9a 89 d9 80 e1 07 80 c1 03 38 c1 7c ac 48 89 df e8 1d a3 [ 73.306378][ C0] RSP: 0018:ffff8881f5ddf650 EFLAGS: 00010046 [ 73.312271][ C0] RAX: 63a3f2b450244300 RBX: ffffffff8480788c RCX: ffff8881f5dc9f80 [ 73.320086][ C0] RDX: 0000000080000103 RSI: 000000000000061a RDI: 0000000000000001 [ 73.327893][ C0] RBP: 000000000000000d R08: ffffffff814d4a22 R09: fffffbfff0dd7a10 [ 73.335711][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 73.343643][ C0] R13: ffff8881f5ddf778 R14: ffff8881f5ddf778 R15: ffffffff84807894 [ 73.351447][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 73.360220][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.366638][ C0] CR2: 0000001b32b25000 CR3: 00000001d7bdc000 CR4: 00000000003406b0 [ 73.374465][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 73.382256][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 73.390067][ C0] Call Trace: [ 73.393200][ C0] ? __warn+0x162/0x250 [ 73.397190][ C0] ? report_bug+0x3a1/0x4e0 [ 73.401528][ C0] ? ex_handler_uaccess+0x9b/0xc0 [ 73.406390][ C0] ? ex_handler_uaccess+0x9b/0xc0 [ 73.411253][ C0] ? do_invalid_op+0x6e/0x110 [ 73.415764][ C0] ? invalid_op+0x1e/0x30 [ 73.419926][ C0] ? __start___ex_table+0x5864/0x5ebc [ 73.425133][ C0] ? __start___ex_table+0x585c/0x5ebc [ 73.430344][ C0] ? vprintk_emit+0x192/0x3f0 [ 73.434858][ C0] ? ex_handler_uaccess+0x9b/0xc0 [ 73.439725][ C0] ? ex_handler_fprestore+0xe0/0xe0 [ 73.444750][ C0] ? __start___ex_table+0x5864/0x5ebc [ 73.449963][ C0] ? __start___ex_table+0x585c/0x5ebc [ 73.455163][ C0] fixup_exception+0x93/0xd0 [ 73.459594][ C0] do_general_protection+0x1a3/0x3c0 [ 73.464713][ C0] ? do_trap+0x340/0x340 [ 73.468801][ C0] ? stack_trace_save+0x118/0x1c0 [ 73.473665][ C0] ? stack_trace_snprint+0x170/0x170 [ 73.478778][ C0] general_protection+0x28/0x30 [ 73.483464][ C0] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0 [ 73.489621][ C0] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 01 ca c3 66 66 [ 73.509060][ C0] RSP: 0018:ffff8881f5ddf820 EFLAGS: 00050002 [ 73.514975][ C0] RAX: ffffffff819965d7 RBX: ffff8881f5dca9d8 RCX: 0000000000000002 [ 73.522776][ C0] RDX: 0000000000000002 RSI: fc1a000000000000 RDI: ffff8881f5ddf8c8 [ 73.530590][ C0] RBP: 1ffff1103ebb953b R08: 0000000000000005 R09: ffffffff819965c0 [ 73.538570][ C0] R10: ffff8881f5dc9f80 R11: 0000000000000003 R12: ffff8881f5ddf8c8 [ 73.546372][ C0] R13: ffff8881f5dc9f80 R14: 1ffff1103ebb9563 R15: 0000000000000002 [ 73.554198][ C0] ? __check_object_size+0x70/0x3a0 [ 73.559222][ C0] ? __check_object_size+0x87/0x3a0 [ 73.564259][ C0] __probe_kernel_read+0xd9/0x190 [ 73.569119][ C0] bpf_probe_read+0x3f/0x80 [ 73.573454][ C0] bpf_prog_661afe553e78869a+0xf08/0x1000 [ 73.579009][ C0] bpf_trace_run3+0x128/0x2f0 [ 73.583522][ C0] ? bpf_trace_run2+0x2d0/0x2d0 [ 73.588210][ C0] ? pcpu_chunk_relocate+0xdc/0x3a0 [ 73.593242][ C0] ? __bpf_trace_percpu_alloc_percpu+0x50/0x50 [ 73.599246][ C0] free_percpu+0x5af/0x910 [ 73.603502][ C0] fib_nh_common_release+0x89/0x210 [ 73.608522][ C0] ? free_fib_info+0x90/0x90 [ 73.612945][ C0] free_fib_info_rcu+0x90/0x170 [ 73.617632][ C0] ? free_fib_info+0x90/0x90 [ 73.622058][ C0] rcu_do_batch+0x492/0xa00 [ 73.626401][ C0] ? local_bh_enable+0x20/0x20 [ 73.631002][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 73.636292][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 73.640986][ C0] rcu_core+0x4c8/0xcb0 [ 73.644973][ C0] ? check_preemption_disabled+0x9f/0x320 [ 73.650531][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 73.655560][ C0] ? sched_clock_cpu+0x18/0x3a0 [ 73.660274][ C0] ? debug_smp_processor_id+0x20/0x20 [ 73.665469][ C0] ? irqtime_account_irq+0x6d/0x1b0 [ 73.670494][ C0] __do_softirq+0x23b/0x6b7 [ 73.674850][ C0] ? ksoftirqd_should_run+0x20/0x20 [ 73.679865][ C0] run_ksoftirqd+0x1f/0x30 [ 73.684117][ C0] smpboot_thread_fn+0x545/0x930 [ 73.688898][ C0] ? cpu_report_death+0x180/0x180 [ 73.693752][ C0] ? schedule+0x143/0x1d0 [ 73.697916][ C0] ? __kthread_parkme+0x177/0x1b0 [ 73.702776][ C0] kthread+0x2da/0x360 [ 73.706683][ C0] ? cpu_report_death+0x180/0x180 [ 73.711542][ C0] ? kthread_blkcg+0xd0/0xd0 [ 73.715988][ C0] ret_from_fork+0x1f/0x30 [ 73.720224][ C0] ---[ end trace 44c1b02c0c034a69 ]--- [ 73.730878][ T2566] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.775008][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.784590][ T2566] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.791454][ T2566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.799644][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.807775][ T2566] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.814618][ T2566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.844469][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.854225][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.749510][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.765305][ T466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.801209][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 74.811238][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.834598][ T2622] bridge0: port 3(veth0_to_batadv) entered blocking state [ 74.843103][ T2622] bridge0: port 3(veth0_to_batadv) entered disabled state [ 74.853089][ T2622] device veth0_to_batadv entered promiscuous mode [ 74.860286][ T2622] bridge0: port 3(veth0_to_batadv) entered blocking state [ 74.867237][ T2622] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 74.876544][ T2622] device veth0_to_batadv left promiscuous mode [ 74.883338][ T2622] bridge0: port 3(veth0_to_batadv) entered disabled state [ 74.925607][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 74.934608][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.974288][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.982751][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.035127][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.043616][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.052892][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.061290][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.073574][ T2591] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.080997][ T2591] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.088426][ T2591] device bridge_slave_0 entered promiscuous mode [ 75.101327][ T2591] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.108297][ T2591] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.115556][ T2591] device bridge_slave_1 entered promiscuous mode [ 75.193824][ T2591] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.200797][ T2591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.207920][ T2591] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.214656][ T2591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.245369][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.254171][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.261811][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.281663][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.289913][ T391] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.296867][ T391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.304491][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.313395][ T391] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.320259][ T391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.345266][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.359868][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.409338][ T7] device bridge_slave_1 left promiscuous mode [ 75.415789][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.457053][ T7] device bridge_slave_0 left promiscuous mode [ 75.474046][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.490787][ T7] device bridge_slave_1 left promiscuous mode [ 75.496803][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.510248][ T7] device bridge_slave_0 left promiscuous mode [ 75.518789][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.539089][ T7] device bridge_slave_1 left promiscuous mode [ 75.545032][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.552762][ T7] device bridge_slave_0 left promiscuous mode [ 75.559123][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.792680][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.814649][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.823405][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.855589][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.864077][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.911590][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.920250][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.954575][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.972386][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.998228][ T23] audit: type=1400 audit(1719240422.650:141): avc: denied { write } for pid=2668 comm="syz-executor.4" name="cgroup.subtree_control" dev="cgroup2" ino=333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 76.038001][ T23] audit: type=1400 audit(1719240422.660:142): avc: denied { open } for pid=2668 comm="syz-executor.4" path="" dev="cgroup2" ino=333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 76.067464][ T2676] device xfrm0 entered promiscuous mode [ 76.076074][ T2651] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.083186][ T2651] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.091332][ T2651] device bridge_slave_0 entered promiscuous mode [ 76.099758][ T2651] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.106994][ T2651] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.114774][ T2651] device bridge_slave_1 entered promiscuous mode 2024/06/24 14:47:02 SYZFATAL: executor 1 failed 11 times: executor 1: failed to write control pipe: write |1: broken pipe SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67