f, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x80086301, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:12 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:12 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000480)=""/250, 0xfa}, {&(0x7f0000000580)=""/73, 0x49}], 0x2, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xc8}, 0x40000142) mount$bpf(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x10, &(0x7f00000007c0)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x3}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, ':'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}, {@subj_user={'subj_user', 0x3d, '('}}, {@smackfshat={'smackfshat', 0x3d, 'threaded\x00'}}, {@dont_hash}, {@appraise}]}) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x8, 0xf1, 0x1, 0x1f, 0x0, 0x7fffffff, 0x22, 0xd, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x4010, 0x0, 0x2, 0x2, 0xe10, 0x84cd, 0x80, 0x0, 0x80000000, 0x0, 0x9}, r0, 0x9, 0xffffffffffffffff, 0x9) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001940)=""/122, 0x7a}, {&(0x7f00000019c0)=""/174, 0xae}, {&(0x7f0000001a80)=""/75, 0x4b}, {&(0x7f0000001bc0)=""/255, 0xff}, {0x0}], 0x5, &(0x7f0000001e40)=""/222, 0xde}, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2, 0x40, 0x3, 0x0, 0x0, 0x3ae, 0x1000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0xb98ea3b8a7a6f5d7, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x7fff, 0x480000, 0x7, 0xdd30, 0x7, 0xae4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) close(0xffffffffffffffff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x9) perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:11:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xe, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:12 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {0x0}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x80086601, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:12 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x3, &(0x7f00000003c0)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @exit], &(0x7f0000000400)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x14, 0x5, 0x1000, 0x400}, 0x10, 0xffffffffffffffff, r2}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000080)=@raw=[@ldst={0x1, 0x1, 0x2, 0x2, 0x8, 0x8}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], &(0x7f0000000180)='GPL\x00', 0x10000, 0x2d, &(0x7f00000001c0)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000340)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0xc, 0xb0, 0x4}, 0x10, 0x12e72, r5}, 0x78) 14:11:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x13, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:13 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {0x0}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x801054db, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:13 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x14, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x801c581f, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:13 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f00000008c0)}], 0x1, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:13 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r2, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x0, 0x6fe0}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xb898}], 0x1, 0x0, 0x0, 0x500}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x8, 0x40, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x40) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r4, 0x6, r3, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r5, &(0x7f00000001c0)=r4, 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x80, 0x4, 0x9, 0x8, 0x0, 0xf578, 0x800, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x48000, 0xe56, 0x6, 0x0, 0x1ff, 0xda45, 0x7, 0x0, 0xff, 0x0, 0x3}, r4, 0x8, r6, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0xffffffffffffffff, r1}) 14:11:13 executing program 2: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000010c0)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x8, &(0x7f0000001100)=ANY=[], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0xc1}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)=0x1) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x7, 0x9, 0x1, 0x0, 0x5, 0x100, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0xcda4, 0x100000000}, 0x600439191c29838d, 0x6, 0xc000, 0x6, 0x3, 0x7fffffff, 0x9, 0x0, 0x3ff, 0x0, 0x5}, 0xffffffffffffffff, 0x2, r0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0xfa, 0x7, 0x7f, 0x0, 0x0, 0x7, 0x41110, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000400), 0x5}, 0x4241, 0xc7, 0x5, 0x1, 0x6b93, 0x2, 0x5, 0x0, 0x81, 0x0, 0x5}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x15}, 0x10) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0x5, 0x6, 0x0, 0x0, 0x0, 0x80891, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x14400, 0x800, 0x8, 0x0, 0x0, 0x0, 0x47, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) 14:11:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xc0, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:13 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 415.294015][T29096] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 14:11:13 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f00000008c0)}], 0x1, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 415.424443][T29096] team0: Device ipvlan0 failed to register rx_handler 14:11:14 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:14 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f00000008c0)}], 0x1, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:14 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:14 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0xc0045878, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:14 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 416.208755][T29099] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 416.233411][T29099] team0: Device ipvlan0 failed to register rx_handler 14:11:14 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffec4}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:11:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x24008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000580)=@alg, 0x80, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000000400)=""/23, 0x17}, 0x80000001) r2 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r2, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000013c0)=']//:*@\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2) syz_open_procfs$namespace(r1, &(0x7f0000000900)='ns/user\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x0, 0x6, 0x4, 0x0, 0x4, 0xc020, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x2}, 0x49442, 0x4, 0x4, 0x7, 0xb7, 0x2, 0x0, 0x0, 0x90, 0x0, 0x100000000}, r1, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x9, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x8800, 0x18, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x7335b5c2f272f326}, 0x0, 0xb3, 0x6, 0x1, 0x2368, 0x8, 0x4, 0x0, 0x65fe, 0x0, 0xb40f}, r1, 0x4, 0xffffffffffffffff, 0xb) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/uts\x00') syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\a') getpid() 14:11:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}) 14:11:14 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0xc0045878, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:15 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 2: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1b, 0x6, 0x80000000, 0x9, 0x2, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x40) perf_event_open(0x0, 0x0, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuacct.usage_percpu\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086607, &(0x7f0000000080)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x3, 0x3, 0x2, 0x5, 0x5, 0x1, 0x8}, @jmp={0x5, 0x0, 0xd, 0xb, 0x9, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0xa8, &(0x7f0000000640)=""/168, 0x40f00, 0x1b, '\x00', 0x0, 0x6, r2, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x40c, 0xffff, 0x2}, 0x10, r3, r1}, 0x78) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000600), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 14:11:15 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000011fc0)={0x18, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="180000e9ff000000000000004000"/24], &(0x7f0000002100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:11:15 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f00000002c0)=@tipc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/75, 0x4b}], 0x2, &(0x7f00000004c0)=""/54, 0x36}, 0x40010040) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r4, 0x1d, 0x0, 0x1f47, &(0x7f0000000100)=[0x0], 0x1}, 0x20) write$cgroup_subtree(r1, &(0x7f0000001400)=ANY=[], 0xda00) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={&(0x7f0000000540)="c21a7e4f419ec4fc9d2203b7151b30fcfd64b90b8360fd7399538d37be6ef261e31b065a788ed5fbeabd80204d47e3c62f9297e17af53619fe9831bee7363ff9d2f17772b8285b32391b0d6d34354d215542f5f9a687771ee54528e2516fa3ead3bd4dbbc493f6ae877210f621c31d64df37bb547d8db7ce282fe17bdacd2c753750bace991109aa4c7df91bf5a595", &(0x7f0000000640)=""/69, &(0x7f00000006c0), &(0x7f0000000700)="80edac49a0164e57d8557142456029a98a51a34c791d919335902e46de33dbfeb2ab540ef5f661f6e685fe2153c56a2dc4e34e3e703d193ea5d1c3568716cd63c6eeaa7ce5865d6ee65b3b3afba2e2a0e57f3164b192a59a2ae0d92b209c65a44f1f58c7f92a609cbd1bccd1d2ccfef120e105fee74c86b5a28b0218ca7620e7943d4c2079645a786f34f19939230d36213534897842bc1fb6604e8671d334d9ddd02b5aa6774e55a6a98e13e5a2dfdaf030008fa448e669499493e6648450d33a4f60d6a1ece9cb0c65a965c7876a", 0x2, r0, 0x4}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x839e, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xf7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) 14:11:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x13, 0xa, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x6d}, @call={0x85, 0x0, 0x0, 0x99}, @jmp={0x5, 0x0, 0x0, 0x5, 0x9, 0x40, 0x8}]}, &(0x7f0000000200)='syzkaller\x00', 0x4c, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x9, 0x3, 0xfe}, 0x10, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, r2, 0x6, '\x00', r3, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xd3, &(0x7f0000000080)=""/211, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 14:11:15 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 14:11:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0xc0189436, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002a00)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001600)={&(0x7f0000000080), 0x6e, &(0x7f0000001480)=[{&(0x7f0000000140)=""/124, 0x7c}, {&(0x7f00000001c0)=""/71, 0x47}, {&(0x7f0000000240)=""/243, 0xf3}, {&(0x7f0000000340)=""/186, 0xfffffffffffffe28}, {&(0x7f0000000400)=""/90, 0x5a}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x6, &(0x7f0000001500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x2000) ioctl$TUNSETLINK(r2, 0x8912, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x313) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000010008108040f9becdb4cb92e0a48b1370f00000069bd6efb2503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0) 14:11:15 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x7, 0x80000000, 0x10000, 0x2f5, 0xffffffffffffffff, 0x6, '\x00', 0x0, r1, 0x2, 0x5, 0x3}, 0x40) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010004080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000001c0)={'veth1_to_hsr\x00'}) 14:11:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="850000000800000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6d847ef6943a143669ef5fc545ab7ffef72f52ca305f38601040000000000000b00001731859eba975d4a1809acbc7b716441ef6bac34d0c99d62456cc766be4825548e085c7866d7ac33165a2178a513e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea0000524aee59481786de00019efc0060c9e1263ca5507f633b5ba73407d9303a0aca0402ffa95af08a0a12a63c2f85ae241f51f7ff22745696f1ffe2ca9ed269048d3dc024e21264fb2dfc777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b711f4b6746dce71c1ce34d7d5241435b5ddc91e9e99ad6b9cbe09e294f5b1e5dc8f1c7b2dd1dfccabeee003ba07ce35f90f0c58a9c98d678d7e258d5d74a133278866780ddac5fe771e6ae67da6e2df4a560436fa3cb7598f923c0716bb7c31f8e867014a5a66f0465d7183fc05c0d804ac7197a87f64cf635feb88254e9ded8cb00c1276b1aaffb3cf86fb92efc518639edea01662abbc567a9db53997aa9abd409b5c06"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x8, 0xfff, 0x8000}, &(0x7f0000000180)=0x80000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xf3f}}, 0x10) recvmsg$unix(r1, &(0x7f00000009c0)={&(0x7f0000000680)=@abs, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000700)=""/92, 0x5c}, {&(0x7f0000000780)=""/211, 0xd3}], 0x2, &(0x7f00000008c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}, 0x20000000) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0xac, 0x7, 0x9, 0x0, 0x0, 0x7, 0x1044, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x79330061dc7e71b9, @perf_config_ext={0xae, 0xfd4}, 0x8000, 0x3, 0xfffff3c1, 0x5, 0xb96, 0xad7, 0xffff, 0x0, 0x0, 0x0, 0x9}, r3, 0x8, 0xffffffffffffffff, 0x1) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) 14:11:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4}, {0x6}]}) 14:11:16 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002f000519d25a0700000000000100fc60120003400c000200022a020037000000000001802e8e3f00d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@tipc=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="aa8986516a4df293310db191865041fe275a0843dd5e64ed19fa83c48932c41a703bc7a162cdd11521bda502f1c0b8a70e4da16e23a4f984450e3b187fff5e001a11d8008f27721238fcccdc8c1bd7d94a411e896ed9ac1c3eb3a6292707dbd4ae61bca1b7d861c3533f9483428a0baa026e2fff5c7f01b1bb8d2d5dd0c1249209cb7d2df9c42bc92ab4a5e7a9167fa9694453e1599d91d2a6bcf97e8c2bbbac69c52dcab425", 0xa6}], 0x1, &(0x7f0000000140)}, 0x80) 14:11:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0xc020660b, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:16 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x8c, 0x0, 0x1, 0x9, 0x0, 0x7, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x4}, 0x20, 0x2, 0x101, 0x5, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0xe, r1, 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r4, 0x6, r3, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r5, &(0x7f00000001c0)=r4, 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x40, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x3ff, 0x180000000000000}, 0x20, 0xfc, 0x7b, 0x5, 0x8, 0x80000001, 0x9, 0x0, 0x9, 0x0, 0x4}, r4, 0xd, r2, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:11:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}) 14:11:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000d40)='cpuacct.usage_percpu_sys\x00') socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000600), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000680)=""/219, 0xdb}], 0x1, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESHEX=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001cae4b1d168d9771a3cdebaf64c711000007e6f5ffff0000e8ff0100000039d5eb0b2bd3fc5b3cd0cef44b60b1b0844b39527ea9425d44d19d603b2e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fffffff3637529c17ab8b76ea1b37f8ccb62ddcebfc4e5ac6d4030fafa464bd86c8b2c14f65b43518cf5ed06d898f931e9627bfd81a000b42265cdc515022ef9bba250a879c9e39dd3e1d05354bb17da01f900fa03c6f1d8eecceaaaa5f46bf36978a7853f0b8284"], 0xd8}, 0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000008c0)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000780)=@in={0x2, 0x4e21, @empty}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000900)="fa3e344fec7bf0cd1f9963879c9c5178ec7078e2266ffef04642e1d8a2d37f3511ceb3070561b6c7b6e9b2721655fe69e03a9501c17c779313d7a5d96b3c515e7df4367b1b5c55d6928d639fe6e999d270adf6f92ce04d779b5dd36318e92c72e1c18435f6534f0b70639a6178ebee6d80e9d1dd146571032361ddec81560fe8d23193b650859a5450c22b14041ab0cd341b67cd8eda204d33f9e1d02d9753ed", 0xa0}, {&(0x7f0000000800)="83d0f3d3cbd3ad6e7727dcfd3002c7583dfbd72e13b3b1aae32dc648c35ce1c4f64c1ddfcf476781b559406af325bb73b01a889a6e56e6a3542e0927637338a2aaf2abd1bcf7b7", 0x47}, {&(0x7f00000009c0)="4f073517dd2e27b30eaa495c6ecb591c5ca1eb4bb70bcf4b6b4a637feac61bfd4099017da5fe89fac56d8eea45ee3a26410a2be406ad", 0x36}, {&(0x7f0000000b80)="638823c621ab86940fa511fb03ab477b424c8f590ec6897f2086ebb8bae3e26800b0dc8c1945ce431f57e69be8df1f25af6837648cce53f5122cee3bc89a541dc8286641413da104455003bd5e059d1ccdcb05981641f97788407fea444e29fbca618c88602381020e3bf5ed2e69c090d0269c912556fa79e4f5aec773007fbf9423e696666fdcefeeb1c048c2355f2d7400f6dab6f2933733f800fcce0603d7d97a71e7", 0xa4}, {&(0x7f0000000c40)="d1c8bea3a31443d728558842037855a237e4125eafcd1f278c7eda4bda38a2919c52f935c5434adf19c7b9c90c504409586c11ae95d2f27f771d072dcdf1b45c43fe6f9986f1378ef2b7e980d45147ce59ec851be54585e4fbc1e54e4bb5ecb8", 0x60}, {&(0x7f0000000d80)="042daba8c936e2e4bbaabc895da39fc519e1b9cc5a3d7c7d1ac1b6d2d7afa93cc2c826b065b672638126cc711023e41a951bebd45a10f3ce019aec286aa46dfe9c671eee0a520e0e6a471ae4112039571fb6c4636653e484b4b80b2d96f8e1697b15ec05caa18fdd383162cb60d3608c2f2c6849c5156763b4ff310c40934c54a2a4c1a0e0cd372f80baf97e590961cf72447eb888ae39e463913b2fdd81a4b4e2d1d9e26c74dafddc4fd3474870b99bef375a65c9727ca54b6d177c6f5205192ec67d5cf947d9b2d42caa653ae489ff857d49133eb3e59b663883782007896fd806d3cd", 0xe4}, {&(0x7f0000000e80)="d0b9d8b01e7aa4065b505e7d3e556ec1ff51028aab87384c11408e965f0e7f6a17ccf29fe3f5df0f7b1ca7d89e549af3d99cdd76f2d965d8b6a247096cdb0586d8ece61bd22e789bf5f3ce98711bb019f24e4841c9b1a92562bf94a4e59ac79fde13f0d4126a75d051054a911c926dda32d58cf3a07820c64b5222610bdfa89f73ddc27e94acb77ecd21", 0x8a}], 0x7, &(0x7f0000001640)=[{0x90, 0x119, 0x1, "2a4728180b886f757e9ec741ce840152c03b906a3f15bda8f69d71c2f89b829e5a658dd0491bd456793f7d7ad234a766c1239f261f03de36d667853d72544957abaf881da11af59a99193770c412f65347b3e1a1c6fd1b8d6bc0483a9b87552895494848b2a840b2b4db751d2a17af5400896ba60dd6a4a328fcb77fca10ef"}, {0x108, 0x107, 0x1, "0402c9572ce26c4babc10eaebdec8c59b5f10594318048d9454060f2b7b71c54bde5ec22804b4676874c743989e4f80cb4a6dd9a77152de8347be5052663d3999ac6a08f10239d2e4047051a89e15baded2ac9dd8cbe7159d57fb1f35b53755195dd9115504417e5df2c0cefbc495c26b9359494554456f3419647e55e85e02ed39236c38755f49ac06313ec659863448038b36a38286e515da2ae594968ccb761e48ba709bbbcf6791b5234b06eb9db2df788a7692c88d03c398c2ceaa46d140f99e808d227aae3dbdbf06766305dfd4e19687c04a642a8ea58a241a6cb53bcec7b42b8f490b7f8088ec6003b577a96186cb04d0898"}, {0x1010, 0x10f, 0x43b3, "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"}, {0x38, 0x107, 0x9, "8e10cdaf4f671c6cb980052c5a6f72ac4512abf65c6306b8adfafa3d1df8c452cf9a6764ed0187"}, {0x40, 0x116, 0x0, "483c60c5d5fb400c0b649343de6e4f02f6fbf24ed00c819964d317c8972a30cbeef35125fd1cc0e6e874"}, {0x60, 0x10b, 0x3, "031f68870855abc059983120a2f10ad8c54ad71c6c3a132f7d23fb008f0138e89de8132f483c067e161dd60f3101a88eb36b4b166d031d409df0a2b03dad9f1af618c873211fcd46f956c6c1312b"}, {0x1010, 0x112, 0x5, "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"}, {0xc8, 0x84, 0x3, "226c24f20c8e5037b3f8704a2e8152bbb4eb460678e058775c102725e069098e2cb9dbb2dcbcdfec0abb647842ba2eaf9005300924ef341c75bfcb5026dfb7d32f1abb8b0d64cc5e9979596cdfa9ed4b67d437a43f4180c0928af2c7471acd9ca34fb5e88d233e32204985bfc8f7ef17d533d837a7abaa69a33489fd3c5649c21bbdd7670ac8245e4e9fb2373547c22f54f04111165d1d6b3801a4399a36738713b2537196854caf38f2fa23942851e708bf4d613c6ba07e"}], 0x2358}, 0x8000) r5 = getpid() perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x1, 0x1, 0x6, 0xf8, 0x0, 0x40, 0x8000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0xeda1}, 0x0, 0x5, 0x8, 0x7, 0xd2, 0x51beaa81, 0x1, 0x0, 0x7fffffff, 0x0, 0x6}, r5, 0x5, r0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000054c0)=""/102400, 0x19000, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x2, 0x0, 0x4, 0x7, 0x0, 0x8, 0x20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x4, 0x1000, 0x0, 0x4b, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0xc) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d302b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x6fffebaf}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x41) 14:11:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:16 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x8c, 0x0, 0x1, 0x9, 0x0, 0x7, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x4}, 0x20, 0x2, 0x101, 0x5, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0xe, r1, 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r4, 0x6, r3, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r5, &(0x7f00000001c0)=r4, 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x40, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x3ff, 0x180000000000000}, 0x20, 0xfc, 0x7b, 0x5, 0x8, 0x80000001, 0x9, 0x0, 0x9, 0x0, 0x4}, r4, 0xd, r2, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:11:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x6}, {0x6}]}) 14:11:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x4, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:16 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:16 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x7}, {0x6}]}) 14:11:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x5, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400014) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)) 14:11:17 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:17 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES32], 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000680)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000700)}], 0x1}, 0x20000815) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000500)=@l2tp={0x2, 0x0, @empty, 0x4}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)="6e1e869628ee19db365a3a6786317877dbd6e997f5693465235f921f8d1f", 0x1e}, {&(0x7f0000000580)="acac898b932c2778d5c34fce92b26f75aab6cca2a6e87c7998a929", 0x1b}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x340}, 0xc016) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x14400, 0x800, 0x8, 0x0, 0x4, 0x0, 0x47}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 14:11:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xc}, {0x6}]}) 14:11:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:17 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:17 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x7, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:17 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x14}, {0x6}]}) 14:11:18 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x29, 0x7f, 0x6, 0x32, 0x0, 0xff, 0x40000, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x5, @perf_config_ext={0x9, 0x7}, 0x4401, 0x8, 0x400, 0x9, 0x92b, 0x8, 0x3, 0x0, 0x7ff, 0x0, 0x26b}, r0, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x1f, 0x7e, 0x5, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xffffffffffffffc0, 0x4}, 0x48010, 0x100000001, 0x10000, 0x1, 0x5, 0x3, 0x9aef, 0x0, 0x800, 0x0, 0x93aa}, 0x0, 0x6, r1, 0x1) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r2, 0x12) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x7f, 0x1d, 0x0, 0x80, 0x0, 0x0, 0x2284, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4ac, 0x1, @perf_config_ext={0x5, 0x6}, 0x8000, 0xffff, 0x8001, 0xd, 0x2, 0x80000001, 0x6, 0x0, 0x10001, 0x0, 0x100000000}, r2, 0x5, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x80, 0xc0, 0x7, 0x0, 0x40, 0x20808, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xc3, 0x0, @perf_config_ext={0x8f9, 0x5}, 0x1000, 0x0, 0x5, 0x3, 0xfff, 0x4, 0x8, 0x0, 0x3, 0x0, 0x177e}, r0, 0x2, r4, 0x1) r5 = perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x80, 0x75, 0x49, 0x1, 0x0, 0x0, 0x2, 0x4, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x7fff, 0x3}, 0x880, 0x1e, 0x20, 0x9, 0x101, 0x2, 0xfff, 0x0, 0x1, 0x0, 0x2}, r3, 0x5, r1, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000380)={0x4, 0x80, 0x0, 0x3f, 0x0, 0xae, 0x0, 0x1f, 0x40688, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x3f, 0x9}, 0x80, 0x0, 0x31, 0x5, 0x1ee49340, 0x3, 0xc6a, 0x0, 0x40, 0x0, 0xea7}) openat$cgroup(r3, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x5, 0x80, 0xff, 0x0, 0x9, 0xf8, 0x0, 0xff, 0x10, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x10, 0x0, 0x8843, 0x0, 0x0, 0x101, 0x83, 0x0, 0x400, 0x0, 0x7fff}, r3, 0x10, 0xffffffffffffffff, 0xe) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x1c, 0x7f, 0x1, 0x8, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff}, 0x40000, 0x3, 0x9, 0x4, 0x1, 0x3f, 0x1, 0x0, 0x2, 0x0, 0x7}, r2, 0x2, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) perf_event_open$cgroup(&(0x7f00000005c0)={0x1, 0x80, 0x1, 0xad, 0x3, 0x7f, 0x0, 0xffff, 0x40008, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000580), 0x3}, 0x2844d334a0f90e28, 0x1, 0xacfb, 0x2, 0x2, 0x4, 0xd938, 0x0, 0x10000, 0x0, 0x37}, 0xffffffffffffffff, 0xa, r4, 0xd) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x3f, 0x0, 0x3, 0x6, 0x0, 0x5, 0x8, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x1}, 0x4800, 0x2, 0xfff, 0x6, 0x1, 0x4, 0x7fff, 0x0, 0x800, 0x0, 0xd8e}, r2, 0x4, r6, 0x8) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000740)=0x9) 14:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES32], 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000680)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000700)}], 0x1}, 0x20000815) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000500)=@l2tp={0x2, 0x0, @empty, 0x4}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)="6e1e869628ee19db365a3a6786317877dbd6e997f5693465235f921f8d1f", 0x1e}, {&(0x7f0000000580)="acac898b932c2778d5c34fce92b26f75aab6cca2a6e87c7998a929", 0x1b}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="e00000000000000005010000060000000f90f4397cd3c74fbd175d7992d022eb6fceedfd74ded8fe3ccf48a5c97d8c41013f2e81d8aa845755e06b744e4e733aef9381a3c66a14e363a6d377d3746544f68c144372fff093402e13189fc2e668909dca75117d9ac1fb20eeb19df5e40ba8ed8be15302bdfdbcff00ca30c9e1eb4f6a29a51f5040fc6517b6bd1eb93628293fd428d9f53c4dec0d7412de4cdfc8ae13b777855b78d8b8cfa9365869eed27f8dc9668a34c08c73d1eeff74198df0935f8d6c46a7df6bf416972b38339e1a650cfcde549f337bfd9a000008010000000000000101000080030000804fd04ebb21eeb42a3fe0beb46a5bdbeaf4a6d35394cdc039bba837b5f4b5bc2db878e63d03b1cacea1b885e7aecef260f30f49b2ff8588a1834ab4b7b60bfd400ce35aba4013322a4010d572c589f85b8281a67c7cc966481662e473dd4d12188ea475b94940f3e81b4e3917121f5acf0133f767be31a30b0835f919b657c66e91b9c3d85f8dc4518f9f6af654dbc2a3d038e14ccf97fe04ec915be52fd50ecb130449be1d2ca7ebb14793db6d3e550000daaa44917f9e7eea5d57422b732786f68291d7b5932d4945d3c26e1400b0faabf9d2f131e6ce3203a0d49a318605fde8eca10cd9405a6d564ecac8ffdea7fbc14ae5000000000801000000000000020100007f00000068336b005f0781744efe1a2464415a5c2a0c57f4c8db6f6c7ec3abdde4e349bcada0658c66fbf3c75cd1bdc995ab4ea5a125ad3ffd0805e1810cc027a46d45f7e079ce46a3ec660cba19fb268aa04d0066757106ba4d60a0518f5a2c821f4e148b88aafa7c3fcc98f9fb85d78e29aaf0b8010b1e0e6372aaa7820d297d06b0ad81d1300106f8b26b20dfcf84b63113d1593eb3a533a74c8b382f679e63b882728c205d7ae38cfd18d6ae70e8b0c69b4a5c19873f39529ecf6d55c52af78140b52875651fa1d0a6c2117edbf097703e8bc648dceb22757f083ec7e094be8f03b203d945aa70e616f1771f8f82279dee83c2fce8b7d200000050000000000000000501000003000000da0d127707046a3f9aa15aa96ca0e25370e175a87edface64a2362b592a9bfba3315fab58d4d32c942eb0c8c126718a4d52f7e8f65008089e35bbb5e2a0f3d8b"], 0x340}, 0xc016) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x14400, 0x800, 0x8, 0x0, 0x4, 0x0, 0x47}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 14:11:18 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:18 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x8, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:18 executing program 2: r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000013c0)=']//:*@\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/153, 0x99}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f0000000480)=""/6, 0x6}, {&(0x7f00000004c0)=""/252, 0xfc}], 0x4, &(0x7f0000000600)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x40) recvmsg$unix(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000780)=""/189, 0xbd}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000900)=""/146, 0x92}], 0x4, &(0x7f0000000a00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x40000002) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x7, 0x0, 0x7, 0x0, 0x0, 0x3f, 0x328, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000006c0), 0xc}, 0x544c, 0x10001, 0x1000, 0x5, 0x0, 0x1, 0x5, 0x0, 0x7, 0x0, 0x80eb}, 0xffffffffffffffff, 0x1, r4, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x40, 0x7f, 0x0, 0x0, 0x1, 0x11012, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6904, 0x4, @perf_config_ext={0x9, 0x4}, 0x21, 0x6a, 0x81, 0x2, 0x1827, 0x7, 0x40, 0x0, 0x3, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x5, r3, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x3, &(0x7f0000000000)=@raw=[@generic={0xf7, 0x1, 0x0, 0x7, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x1, 0x2, 0x2, 0x9, 0x20, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x362, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x1, 0xc, 0x4, 0x3f}, 0x10}, 0x78) socket$kcm(0x10, 0x2, 0x0) 14:11:18 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 14:11:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xc0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x9, 0x3, 0x0, 0x0, 0x3, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7ff) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000020000511d25a80648c63940d0235fc6010000b400c0003000200000037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000100)=0x13a) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x55, &(0x7f0000000240)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001a00)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x24000) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) sendmsg$kcm(r6, &(0x7f0000002c80)={&(0x7f0000001980)=@l2={0x1f, 0x1, @none, 0x9b, 0x2}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000002cc0)}, {&(0x7f0000001c00)="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", 0x151}], 0x2, &(0x7f0000001bc0)=ANY=[@ANYRESOCT=r5], 0x10b0}, 0x40040) r7 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r7, 0x0, 0xffffffffffffffff, 0x0) 14:11:18 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xa, &(0x7f0000000000)=[{0x80}, {0x6}]}) [ 420.445719][T29513] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 420.458584][T29502] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:11:19 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, 0x0, &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 420.506735][T29513] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 420.543827][T29502] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 14:11:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="2c0305cbc574e7d9a8d7e5b56ed1f9e1a20d3b7aee231790a7d634b10d707fb6977ad9736cb4e3ddacb2072d7bb54eae8bf76e1a1613ddd7a79724aefe701555d7ddf7d393e0aa6830e05969bf9a93e0f1eac570b5508153823881c80fe6b8475feb4bfe2fb189ba86"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xde, 0xfffffffffffffffa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffd, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f0000000100)=[{&(0x7f0000001580)="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", 0xffe0}], 0x1, 0x0, 0x0, 0xa000a0}, 0x4000) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xfffffffffffffeb2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x0) 14:11:19 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 420.578133][T29502] bridge0: port 3(team0) entered blocking state [ 420.596722][T29502] bridge0: port 3(team0) entered disabled state [ 420.652824][T29502] device team0 entered promiscuous mode [ 420.665300][T29502] device team_slave_0 entered promiscuous mode [ 420.681243][T29502] device team_slave_1 entered promiscuous mode 14:11:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x16}, {0x6}]}) [ 420.752119][T29508] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 420.815837][T29508] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 420.824182][T29508] device team0 left promiscuous mode 14:11:19 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, 0x0, &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:19 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x7, 0x3, 0x1b, 0x0, 0x7, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x2, @perf_config_ext={0x5, 0x1b1}, 0x3080, 0x0, 0x7, 0x9, 0x7, 0x4, 0x8, 0x0, 0x2, 0x0, 0x91d5}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x80, 0x20, 0xff, 0x0, 0x4, 0x0, 0xffffffffffffffa5, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x3, 0x4, 0x0, 0x4, 0x1, @perf_bp, 0x4008, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x22, 0x40, 0x0, 0xf8, 0x0, 0x2000080000000, 0x80119, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0x218, 0xffff8001, 0x7, 0x0, @perf_bp, 0x40020, 0x0, 0x0, 0x0, 0x3, 0x3}, r3, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xe43) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000380), 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) [ 420.893031][T29508] device team_slave_0 left promiscuous mode [ 420.922899][T29508] device team_slave_1 left promiscuous mode [ 420.943031][T29508] bridge0: port 3(team0) entered disabled state [ 420.953747][T29508] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 420.965753][T29537] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 420.980807][T29537] bridge0: port 3(team0) entered blocking state [ 421.018507][T29537] bridge0: port 3(team0) entered disabled state [ 421.048178][T29537] device team0 entered promiscuous mode 14:11:19 executing program 2: close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\\\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x0, 0x3, 0x0, &(0x7f0000000040)="e1865d", 0x0, 0x1a7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x8, 0x9, 0x2, 0x0, 0x2, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x1, 0x6, 0x0, 0x40, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x514e}, 0x0, 0x1000000000, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x20, 0x20, 0x0, 0x0, 0xa63, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x8}, 0x8920, 0xc0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, r1, 0xffffffffffffffff, r2, 0x3) write$cgroup_int(r5, &(0x7f0000000200)=0x10, 0x43408) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x200001, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x336) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x9) [ 421.070721][T29537] device team_slave_0 entered promiscuous mode [ 421.077641][T29537] device team_slave_1 entered promiscuous mode 14:11:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xc, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:19 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, 0x0, &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:19 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1c}, {0x6}]}) 14:11:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0xb8, 0x18}, 0xc) recvmsg(r0, &(0x7f0000011880)={&(0x7f00000104c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000011740)=[{&(0x7f0000010540)=""/82, 0x52}, {&(0x7f00000105c0)=""/146, 0x92}, {&(0x7f0000010680)=""/4096, 0x1000}, {&(0x7f0000011680)=""/92, 0x5c}, {&(0x7f0000011700)=""/44, 0x2c}], 0x5, &(0x7f00000117c0)=""/137, 0x89}, 0x10042) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000011940)={0x3, 0x0}, 0x8) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000011ac0)=@bpf_lsm={0x1d, 0xe, &(0x7f0000011980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, [@ldst={0x3, 0x2, 0x2, 0x8, 0xa, 0xffffffffffffffc0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x1, 0xa, 0x6, 0xfffffffffffffffc, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x602}, @map={0x18, 0x6, 0x1, 0x0, r0}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xe5cc}]}, &(0x7f0000011a00)='GPL\x00', 0x81, 0x0, 0x0, 0x41100, 0x16, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000011a40)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000011a80)={0x2, 0x0, 0x1}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000011b40)={0x13, 0x8, &(0x7f0000000240)=@raw=[@alu={0x7, 0x0, 0x9, 0xf, 0xb, 0x10, 0xfffffffffffffff0}, @generic={0x2, 0x2, 0xc, 0x6, 0xff}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x10000}, @generic={0x4f, 0x1, 0x8, 0x101, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x5, 0x6, 0x4, 0xdd8, 0x412}], &(0x7f0000000380)='GPL\x00', 0x9, 0x71, &(0x7f00000003c0)=""/113, 0x41000, 0x8, '\x00', r3, 0x24, r0, 0x8, &(0x7f00000118c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000011900)={0x3, 0x5, 0x80000001, 0x7f}, 0x10, r4, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r1}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000640)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb98281e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227e65aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbccbdde510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112899487b1bfeda7be5854c16b38b8c29a84e1c0176602d985430cea0162ab3fcf4591c926b3fb076719237c8d0e60b0eea24492a6f8fffffff5bcd3de3a83209da17a0faf60fd6ad91a56a5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea0441e1e0843f15824e1cdcef2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c00998fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c000800000000000016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711f8bf60c8464949ae40285ba585a4b2d02edc3e28dd271c8962496466d7952a37ed85b980680b6c4a000000002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac001002d9ba96ffffffd897ef3b7cda42013d53046da21b40216e14ba2d6af8656bfff17affff00005b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde4a594290c2a5ff8cfd9fcb32c8ed1dbd9000064c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe000061d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f71919772684fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906d9f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17884fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e4723f1e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe0befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a999de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4b9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e1009ee7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497c2bcc60c261c2c14324b5a0ef92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898bc98e0ddbb7d859270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294845319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de594530c2639e8898b940c84921c5af9c5426912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff8543568b490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2504bc7f41019645466ac96e0d4b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868c6da7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccbffffffff6331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e404875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0edaae79b6af6fbb869604d51de44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c00000000000000000000000000040000000000008f7dbcb3dec7799eb32500000000c72553967d9f8cf0a9e86b49882bb889bd6f4730bc78def4bf7d6013d20853be7553347c915acef82000000000000000000000f202f09cfa78ed74b2ee31c407d07d79bd2960939f1a36e3eead461a530d9b7343a17731b194dd6293e42f5273d43745199a58b04b4c28574ded2dad337be682e72b0a777b0bf8a74f036fe5c596e6b6d09f3441e85804a96bf429ee884edad6bd9d1243f701506f90d6bd416f592b61d08c5a7790a6a44e9de6b1df8b58eb0dadf6bb326ccd25bac08b64e6141d5c4c0166e61d198589dd344f76634f1078fa87dee97cc53ef05ffd5b38f00717c2cdf5a1e54e2ca99dbc2e8e1bb061290d1ef5ca358c14fe1847026437ad57fe4fe2bdb0ba2a92fdccc08bb54d0967189a6a4919a1a3874e406723a74821e08d1221c4c272f3998799fb8a3b1fef8f084f57cf7789ebf8b64e11c51d0ef8118c21e34a382d155105e6b31e3edadeb1c9c77f5e2c3899825a5d1c55b63b2e89ced316f400d5b30ddeff45cc14ac702bf65e186f3b3a8fcb1c23e04098120e2ae479353eb8b2b8e3bd574c3ca63d4a73458e41113ba6b4d06d067052d24c9a362c0342d68d26b26a11a79ee24b84afcb9f9b5e7a05143a6da195f198f2cae590af02079d9bbfa0fc0c08a3b4b3eb3aa442c264df5953c7791696d73ce613a064797e1f826e1482aac34eec15ac8bb2cd6570521ec91af7c1ab0c00114bee0b2bfb8b459c2a7350322eb0e71fbfe1d0487de3578cee9ec4ff461953c6ba811a27211dde0430939a19e99fbb2c59a56dbc1753f886b59506bf3fa8498e0db150476c2f35f81ad9affd3c56b9772b6e592c6941f07bf158e162980c1741d9e9de6da3cf0ebfcc5767dd3b0da632dc5cf9a2f6109b3eb8b8fe2bc03ad904bd75f71f98ccde64c540d3464c7164be2f0c854947b78fe98f6fe50fe669c521c06395d9c3d0d9dc2f1f41aea61fbc32f116f1868ece2b8d43aa1327f3d33dfce7a788126a6b87e17b9c70207800000000000000000000d3cb501bd397031a6941890d12cd3789c689520fe9578fc26dfdb2c5d27a35757c7a5af974c80f64c68ca5558fc90edebd33fe93f35d54858a8d1b15fb9598f80b2b9844c2306eafab647776efd9fb119e61ce04c479964560dfcd745a4f025590620cca88c99d2720fbc41a1940f27502093cbbe6fb4f55b47667eee81d889fce74077345200ec5eb4acec853b340e915c21bed831d456311891c5c1d68e0c6b8dfe1d20a7d7b339db71e77f104a047220623d83e63df068edf7acb40d067e11531bad92c0564674d63582903b7b813869c3aab8152e6ef47949f7ff4866449ec58c3b606be0d7edf47ad9f6e2e738f9cf9b7b78974c110c1961850c3a862eab2042b83a82a33e3c8b4063572bcdfd3f4d086833dbeac6c21ff03dc20294bcf6b2f26e77cd248418fb71f3fc9470f2054c2322bfcf87458e406a0683ffea43e4b5fb0851861cefb722dbd9e63173773fafe04715c85121ab4d8d5f9aee9f615a98a974a9e230f2f2e150fda104df29b31cd98944bf648ca271235e3d98538c95300"/3442], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x712}, 0x10, r1}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='ext4_ext_remove_space_done\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 14:11:19 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:19 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xe, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:20 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x11, 0x200000000000001, 0x300) recvmsg(r1, &(0x7f0000007500)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r2 = socket$kcm(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfffffffffffffc1b, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x5}, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x0, 0x6bb, 0x2}, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x6}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x5, 0xb, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf5}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @map={0x18, 0x9, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0xb}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x5ef64331611dda31, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x1, 0x64c, 0x5}, 0x10, r3}, 0x78) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="1c00000032000505d25a80bbf763940d01241c090000000004000000", 0x1c}], 0x1}, 0x0) 14:11:20 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000400)="89d9957ebe32906a92dd1c5e608ee74b96756f3d235ac6aab6fc88ca0396abee5da10145e8ce537ae8355701fd8f563288aad2b906d5694ee9ed4716d7270eab9cc37d45d9e453db920fb058b0fba1892ad1feeb710b20d0c2998c42e42f0efe1f29845b4e8b2de4968544989b3a469edfa82bacbc8b0fc34b7d8ef0250886a8c67a439ea0c64f33d60c7b", &(0x7f0000000600)=""/246}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000080)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={0xffffffffffffffff, 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4330}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000029000504d25a80648c63940d0124fc6004000f400a003d005a00000037153e370a00018003000000d1bd", 0x2e}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe6c, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 14:11:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1d}, {0x6}]}) 14:11:20 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'netdevsim0\x00', @random}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x3, 0x4, 0x3f, 0x200}, {0xfd7b, 0x1, 0x2, 0x73defa5}, {0x8001, 0x1, 0x44, 0x9}, {0x8001, 0x7, 0x4, 0x7f}, {0x5, 0x31, 0x0, 0xa223}, {0x1ff, 0x3f, 0x40, 0x2}]}) recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000180), 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f0000000380)=""/87, 0x57}, {&(0x7f0000000400)=""/34, 0x22}, {&(0x7f0000000440)=""/110, 0x6e}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="2800e676c014a1e065a972dc93654c34cd4e924a380e21d72f32eaf307cfc4782602a946470255137a63fd03e9f5244b233d8984e36bbfc5a656e3f0ad5d194f094c7379a1536396aeac7beac762b54075002c11f0ec480e6cb2ef4782bbdf58", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x28}, 0x21) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x5, 0x9, 0x2, 0x7, 0x0, 0x7f, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0xfbcc, 0x3}, 0x10000, 0x5, 0x3, 0x5, 0x2, 0x1000, 0x6, 0x0, 0x7, 0x0, 0x7}, r1, 0x4, r2, 0x2) socketpair(0x0, 0x0, 0x28, &(0x7f0000000340)) 14:11:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x10, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:20 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 421.839166][T29625] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 14:11:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000504d24380648c63940d0135fc60060012400c0002000300000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 14:11:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x21}, {0x6}]}) 14:11:20 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) close(0xffffffffffffffff) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$kcm(r0, &(0x7f0000001100)={&(0x7f0000000180)=@in={0x2, 0x4e22, @local}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000280)="bec719d01f67e6ba32009d57820274b1e0f75d6177ce16a91a8e43d6c401334fc65c7ee5a11ceacc18b791c4b25b2452a909b037ca0cf52ae55987dd35203dffea5a0b1cd5266a619b5dd84773bdde14f083460800b9418a5f9e79028008c67354ede8018bc49e4135955f567977759311faebfc7639b80b088b0d27bd47fb722227f131e82f75d3ed6221c515a1292343cbbb02d2f68baff32e98d67e192f3413ad91", 0xa3}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="05647facda519b5aea7b32b3fa018ad1542602c3d4ecec2c35bff6bc2e9638d65ba5ee024854ea933f718ce02856435e247fece3583ddf4ddb68092c599c179581a2b4fafb9ea6c14ff298313379e0289b910b6ec17e62f50cceb8feb1e2b18d3ee20aa98006a5096b011a9f6990a69ed0908c1c45fa7df397f7d723fcc33128a91c21f10bba96f7c9c54e15c44ce2c3d22349ee7e07d6be2df1988412dc64375946168c1357cc8162347f37a7f574eb309c82ed0230631ff88ef4dfb51316e13addc608ac1e9b57fe48e23840c8fbe9c1f70164e5d61b9550d0e975971971f20ae132f0f948a3d2985c3740f3012fee4d8b7f821e20db3e3a6233b1827e", 0xfe}, {&(0x7f0000000a80)="44145bfbb02a72082097ed91e39c6d66746b5973a4cbd31f6d", 0x19}, {&(0x7f0000000ac0)="3334112c72b3a22b9edf29b53c17a214a231629d42b02f32d948369703cadd5029e90add6c0878aa4ea7a07eb72dadad8d5362d1188b3f281696bfa5d5e458b64b73cda345722a7688ff7b7a55adb82c6f4ed73b29658c1cbc5da509a9a5e56420284103bac4bd90d8affe77f3e8c7badb0a87f213d8f535dabf63bbf2354f3fc0a266e3239e6edb2effdc76f60c93777ae5a42564100504b615939a3254e61d61277488871e8461b4115a7c5906c2f55f2ea52510a2c83cfbe4f7d6e3e9ff220ce1b37b86a95c8937802545889bf66ac1fe", 0xd2}, {&(0x7f0000000bc0)="16532ef832fedeb4325eab549c8dc795fe3c6033115f854263edf20cdda1691cc41d226f04175b0aac5b8cd21931ccbdede2cf06b6c5be1be46fbbdd3cbf1f5330fa9d9dc0061be6254718e890948363575259561c14f29ad6c169ff1c17a3b3ea21a7de615531d6fd2d68f88c59c651c46591c470803ad789de59401dc8f4a609471663b5353b7011dc4e6546a97d2a2bade106509c179689cd3ba87f4dc1f09e1dfb70258a6681204263d2718c2aa60ed494db9c0e56542469c81fe93ef8ee9260ec3e230caa2ef5be75290824872f0e910ba9c08195b5d1be76c400f80515a4637fdea7a952", 0xe7}], 0x6, &(0x7f0000000d40)=[{0x108, 0x107, 0xfffffff8, "adbc24f9ad4b05d0b4d7c47428645ff5ad16de0cadd2cff8581090732aaafa7995325debd9531f40cd294a82016dc35209ed7921180109ee187f3024703bbdc6025f3e42ed2487bbda29ce22d2b8ea9b0696a8917b882cd047a052442943416f58625227184848d6dd1f02e5767335945777264c59406cf0365bb70fe6d1d1516a76c9c38e110466f3cd32aa370a5c978fee70db5c128d52493ba74834e6f58d6a715312267f80c7e3eb2e595e87293de7a0e273daf725b25cbac968496ca310a342942ecdcfb63442a4b5e636ea2b9b42e43aacdbb43cec8d846a1909e8ecb99d6158e7212dc301434decbc2a4d684fca2a3a"}, {0x40, 0x6, 0x10000, "dd1f9d3a1a38de91ae79eb9a3c37884236aea0f173386eee6cb3d875334f57643b6ba423718428b8741ebc219578"}, {0x90, 0x110, 0x4, "94c95548cfe4b67f1dce63f43c17782faf142821f8606c20b49ce6493d65f9063b3660d22aab0a3910e08e319efc3c87f7492eb7a57221763f4e0d95b1d26de5d69e731e3f46a984941a99da143e661e0e595220d43256d6e9ad7523244f612a3632b0bb14793ec02156abd2df96394e4d719c6ba2e6d1a7fba951"}, {0x98, 0x10f, 0x9, "b3b4a43e2f8176a3dcda143d5510a5ea1027cef8427a40c296c65c0ffb94691b77fa5babd61a6e19051bd104e0338eb22f6c9e22f50e73353686736d7f6d799a9d319e056660b408d7df5eecc7f452e7cea561b943a0bd7c7e0b4f1ed820fa6ed11325518c03c55b3c58582d64a26ad6208d7b70e69a99e1e7ad30dcfb4ecab3a1"}, {0x50, 0x10b, 0x3, "7499dff9ab4ec25e286f21e1f7c23fff07715b2acf7a335fce71c1dff7896ac9bb12fbd5fb8f0affe626bf9bdf71cc34df08daa2e1506d9b0b72ab"}, {0x30, 0x116, 0x9, "ac09fb8d8293bbf3154854368e8a769010ef1dd849ebb81049d71c055f01d28e"}, {0xa8, 0xff, 0x7fffffff, "eec3e194e52841005efc78afe373e5ec344d2dbaf4e849fbb556cdcfe449ca4a990d208cbce279396e0b3ecfd39b2c4fdd2d3ea025d492ea9a46f5ca2b936e1a3f887cc39825fa099348209ab4b64e5759adc7d722c76e85a548d38e00fc91bba7905d9b5371b605fcd8ce8b4c343f92c28e073159fcae6736c7afa00f7844e6b1cfbb73be0c4719d23f82bb0fabae742ae70af401"}], 0x398}, 0x11) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x108, 0x0, &(0x7f0000000380)="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", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x9, &(0x7f0000000140)="ea8281723b56ff0059a4cac5b6989b25ea34317492b48184", &(0x7f0000000040)="2d1af819e486f1bf84", 0x0, 0x85c}, 0x48) 14:11:20 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:20 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x13, &(0x7f0000000000)=[{0x80}, {0x6}]}) [ 422.130251][T29680] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 14:11:20 executing program 5: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff001, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x2, 0x6, 0x5, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x8184, 0x8, 0x6, 0xe, 0x9, 0x4, 0x200, 0x0, 0xfffffeff, 0x0, 0x8001}, 0xffffffffffffffff, 0x2, r0, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='\x00') perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x40, 0xba, 0x9, 0x93, 0x0, 0x7f, 0x104015, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x4}, 0x50240, 0x8, 0x2, 0x1, 0x2, 0x0, 0x3, 0x0, 0x1, 0x0, 0x80}, 0x0, 0x7, r0, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000200)={'rose0\x00', @remote}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) [ 422.171779][T29680] device Z0 entered promiscuous mode 14:11:20 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 422.214886][T29680] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 422.260694][T29680] device Z1 entered promiscuous mode 14:11:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x24}, {0x6}]}) 14:11:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xe003, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000080085100000000000009500000000000000af153ad8192da653b6b04718d5d426078c698c90b802cfe54decb8a2cd6f72cf46c6d3940ed7702a422d5eb676c3558f14c92a3c6796dc6d9bf894e7025d3f5766c3a140174127a5d44340019dfe0000000000004348bc19249d23bf3fdd2408c142035a55b5b6b0e29d2a1181bc4ceb959ffaef9fa91058c1b1f15e94002f3d5df4d85f1f"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x1000, &(0x7f00000025c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffcf0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='pwc_handler_exit\x00', r0}, 0x10) 14:11:20 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x14, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa278b25db4cb904e473730e55cff26d1b0e001d00090000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xff, 0x81, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x10840, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0xf7, 0x2, 0x3f, 0x0, 0x5, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x8000, 0x6}, 0x300, 0x6a, 0x1c90, 0x1, 0x61d, 0xfff, 0x70b2, 0x0, 0x6, 0x0, 0xff}, 0xffffffffffffffff, 0x7, r1, 0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x6, 0x90, 0x8, 0x4, 0x0, 0x5b24, 0x8002, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x7}, 0x11a0, 0x4, 0x3, 0x8, 0x4, 0x2e475066, 0x401, 0x0, 0x6, 0x0, 0xddbf}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000280)=0x7) socket$kcm(0x29, 0x0, 0x0) 14:11:21 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 14:11:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x804) setsockopt$sock_attach_bpf(r0, 0x10e, 0xc, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)="2e0000005a008108040f9becdb4cb92e0a48b13714000200ffff03002503eaff0d0004bde614dd00050005001201", 0x2e}], 0x1}, 0x0) 14:11:21 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 422.658581][T29738] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:11:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x13, 0x5ea, 0x60d, 0x2, 0x20, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x40) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f00000003c0)="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", &(0x7f0000000180)=""/65, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xe, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000040)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0x4, 0x0, 0x10000, 0x2}, 0x10}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, r2, 0x6, '\x00', r3, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x19, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x80000000}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x880a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x1ff}, @ldst={0x0, 0x0, 0x3, 0xb, 0x4, 0x1, 0xfffffffffffffff0}]}, &(0x7f0000000280)='syzkaller\x00', 0x4e, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000013c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001400)={0x0, 0x7, 0x7ff, 0x8}, 0x10, 0xffffffffffffffff, r4}, 0x78) [ 422.712730][T29738] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:11:21 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, &(0x7f0000000000)=ANY=[@ANYBLOB='/']) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0)=[{0x0}, {0x0}, {&(0x7f0000000640)=""/217, 0xd9}, {0x0}, {&(0x7f0000000900)=""/176, 0xb0}], 0x5, &(0x7f0000000a40)=""/167, 0xa7}, 0x40) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8002e, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xa0, 0x80, 0x59, 0x1, 0x0, 0x7fff, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4333, 0x1, @perf_config_ext={0x9, 0x9}, 0x8042, 0x20, 0x101, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5}, 0x0, 0x8, r0, 0xf) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000b80)=@nl=@unspec, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/117, 0x75}], 0x2, &(0x7f0000001cc0)=""/12, 0xc}, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000200), 0x1158e4, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xe897}}, {@mode={'mode', 0x3d, 0x6ae}}, {}, {@mode={'mode', 0x3d, 0x3607}}]}) 14:11:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x28}, {0x6}]}) 14:11:21 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0xc0, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:21 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:21 executing program 2: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007540)={&(0x7f00000071c0)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f00000072c0)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/108, 0x6c}], 0x4}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000007580)={0xd, 0x0, 0x6c15, 0x3f, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=""/241, 0xf1}, 0x20000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x9, 0x0, 0x2, 0x6d, 0x0, 0xfffffffffffffe00, 0x10006, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x1}, 0x20, 0x4, 0x2, 0x5, 0x3f, 0x1, 0x1, 0x0, 0x5, 0x0, 0xffffffffffffffd5}, 0xffffffffffffffff, 0x7, r3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x851) perf_event_open$cgroup(&(0x7f00000009c0)={0x4, 0x80, 0x79, 0x1, 0x1, 0x9, 0x0, 0x20000000000, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x68b, 0x2, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x400, 0x40, 0x2, 0x80000001, 0x6dbb, 0x9, 0x0, 0x9, 0x0, 0x1}, r1, 0x2, r3, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000004c0)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x1, 0x1, 0x7f, 0x0, 0x1, 0xa2, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff8, 0x2, @perf_config_ext={0x5, 0xfffffffffffffc01}, 0x120, 0x100000001, 0x3f, 0x5, 0x10000, 0x149, 0x3ff, 0x0, 0x4ced, 0x0, 0x6}, 0x0, 0x4, r4, 0xa) close(r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x1000, 0x4a, &(0x7f0000000ac0)="62136eef64d9b9cec21a3d2326215cd920a4480880ab1419eab159a6aad56a48e9028c3229e94bbac2a2cbfc7441e35431b10397b79b8a1d5db9f6b04d73cf119e2ff01d44a52639c3e652adb9258d6fc5a54ae12dc860de86455dd8e0bae0d72d15f2d801462907c099737fa6a1df75ef8fbe37a9a0329b1f6089b387aee6e778c97e74ad2284eab175bff34df83e1be949a3520151d746e7d9d17844f49297364b35d4981215c5671598c9e34c4c70ffc77c92b33c09f5892d29e7e2f1cd8c26aa752d34123233fb2c54a3d7113102e99f4c45723d001b3394d6341594dd7be66acaaabbb43ab23f26519bad0b77bcd449a707a923161ab2453e9293f5bb98e6dd2610d3a119d101fc2d3ec8ac42ae9061e89d2301e48fe42835b8b8fac5a0e0cfdb9bc91a54b514f61e7e0dc7d88be8328be3255cf92c92a190c42426a926857619260b7b11ac33aa15f2b0999067435673844d94d7bcd01b49946bfefe0662115bd035a69b9e59eb3f3159c95c226907b667542c1fc6f535834d672c922759f3ea4f069e5b4be937d7e45cc3d04b282655dc08b02ded88c7fae18b5b7c136e96f932df8cc6337c51f153af9ea01285d45833f385f8f8884c72e072deb2910373854606da61af2bc86c4772af5d24ff674b82d646815dfd7e6701600d13c82bd4644b9d64399e75ab00860c14c2c49cfb8d34d4d2bc36ce88049dfb37f03067611022fbbef54eb1a4be00225d6ad196d864daa22c128a01f714f0e7fc9c9b7afa9aef32f8bc0e873fa1955ca66a83fadf40f79c137693fd123ea1832040a1cb5e55e398ad27c27835b7e0fb0a3c81564cf380f3b12259ee5d86ae391dc8f27bb146d85d06629ad60d3f70b5c7d71faaab1adb7b49bf8550b392ea06c3114624f63adf50a0e6e169c132f88f4b81c4d95c8aa1eb90bbb804e0e825572bd46f7b184399822feaf1d3db75b30718cb41b8b87826fa3f6b4d79d92ad20e9075cd2778ad59791d8db992fbcc18815254a221c1ab2ee738768010b47cf4f65997d6ed7edbf8a45b3032d2bd71b5fa9f29fd11ce26669c74ab20774724447b9facf810d2d02647ea98234b6752e7e947a7f0f7e4f4c35f05b37f7cdb8ca0f2f0ea917c0b0698edd55f0eb6569aeb0218ff853bc7400c2c3314efa35e73b7293a2250eec48afbacd7c5b5b94eaeebadfadc15eb7265fe06afc7da07b6c84ad5b7a3225e7d5cc6210d8223561c9b4f5b7bcb5854644f69d9419546c30cc5f76a7a68b7ee8547e4f6d0fed47c6e329fb1de4ffa78b0d95f3b4acc7882f986561e3971063af283961dfd3dee621ad298bee89318c5ee9d912d5aebba0c1c6fe0b1051f2e531388adcd96dec439b90a839b6ab2ded5dee0018699e382ee154834451479ad950b11b2cc42835fb8e798d9b8c6a4bffc425be4a9d148b9facd9efd1077b297930a0006f363a82772699ad3e21bb232cc6805c3ab40e32070bd47c5c59cd9aa647d2bfa9ec0b4de48e922fe504f14e9f8c88dddde6e325d8c1e58fbf916e02a5aa012dd7165d1899ba3e480cbecfebe4c7cf85fce680d943ebdeca9239e2a4476fc9561bcfbfd797ec5b7eba8408939fbc258fff33497841b6a0c824bf7174653ee53826196501c8664a2229ed5fe62972f7de3f76d63fbe7ba10b5c0f2801a58cd93720d630d44ae39d982615bbac8522e73774740572c4ce9c80bb686da0fca0bc6fb978ff5c2c74b8c25a88824c9d96eef04f68d1c2e77cba31147adb0d7d510bd31a16c7a4c44200ed87fc6d8520a20acfc4288fb883fa00df0048d361fd840dbdd1493c21b946f80a616dcb86b4f0b31fb455eb021019c3ba86458e8daaa7ac27fe139f9751c3dd6c917193ffa6c10ac12331441c493c4dd1857e7260168d4c132380fa1051afed4529a2213f1f98106af521d8548d0c0e85f2078e50f911da2404a678b59fb90a4d5f1ca8e22296abff466707b79540a66a9db92d10545015b46d453424edab6560f9b4a7d520d94fb80b57686f37bfa1bcb5dc026ec26222b29bbbc221c4a95a5bdb09c076c8dbecc9a21d53d15fb7684af39057d1945aff59484ca64ad48e838248782df2f731975a03d2dd6b8ce8d43f7a01140134f2052e6d4f561989da96a55f096a82987af70f97c6de5fc45ca772d11f1cd12458db6cafa80775da21239cbd898a5fb0e75d10938ff4ece38045031ac350a0c7ed8b8fe912422e9da0c1fd7131637beb88b7b4818c4bbe88b65721cdd90c7d5057dc27955b774f9ac2c9d96dffca72244c3b96a0380c89bd2b9fbe4c94dbaa6fcfa87fa12fa44f7b26a93cb7ad2abb27797e14e802d88fc1743556a72ca75f3a054655eb51b4fc3637709b7f9ef7ccaced3df39b507b0cf6c32b150257c75d7f220716de687ff22975f7ae7b85b7f72681f81f991c95160da363fc95bdae17e68231f88951e4fbcdbb2612defc33e79dc9eaee8c91c4e7f18556b841b9ec8331ec79bd7368d4a5c1d71b0e1cd9e73d842cc04495337f04952ad5f2a4870b100f61b217d5c89b293361f4cd888ccb92041b805fd0a51adc3466b1ef052b3a76f07d57068982dc1161ac529f9bad1ffe37a6edcaf8bad529ab47d1d6685c3ed0cce75bd1cb492110008993df1e3b5e3d1f5b27a0401503fb49ab91ca223151b7f6220a1cdfec69c5d0b526012c182b809b12df5cc58c31c4694ed13f82363ac562c3a16c2877aa2a43aee0c6c84b1c5e1034c679873f6dfe287418f609e1ff1e49f8f051748560ccbcd40854c73386d6e58f9cfc48a6cd0cfe27fbe9a609d6b108f0a5fcc611d234cf17e0c3093eafd0be9281886f81198a3c7415b3dbfc1c8837b37e4833b0b6a29366e6406ce98f0d6c71a47514dbd81c556393d0da1f38a99fa6df6c00675543bdef86b0fc74fdd3fbfc2b542529a9fae0abbce86dd06e5ffcf364d8ac76efef5ab7f8fa57231e21a897d75ae966fe590a35dbdc90afbe44e04cc54b0a4ed46ef441fd30dfd2ded75bb3e6e398a998f57ca7fc74fe3b0c8285fab7d748578aee1c6d385f53bc81129f53329d9cd4d95d5615c840c47cb8f37e16a2b87f07badf652b3c5270f5b2164e1a7822f8643622d09ac0aeafd4b87cb5fc5c5bd4fe7f08c0e25d76f5d454135a859fa099811f2df85c9254f9a2dde6a68dff3e1bfcf64823a764b396d0b4fe2a77058e0f9e91a3a9046e97ffb09dd9d5f4e86cea147d4fc1bd0f8552c3c8c97565a70998aecdbd75ce8bf8a824370e2f639872dd84ddf1924d121f5692066f2b97c67878a57d62e721dc1c7eaa9ce4562de4b4b61a1577a606ce8be491c7fc19d7e1e16a616ee174b1603aa433b6400e12554ac3ce0cc0302543f8a677dd3271b0916a7e89536999da3491b7eaf2ee390dcbccbc33d2dc67617584f1b9cd009e064a987c5323cf54de5c3d7a8e23818fe659cc2078f63af9b8b553edd47af0aa5be19b735431662746f1a4aebfd68f0d99ec437c298436ac7479eed9fe01d7c7ed9cac70e8f9c8a462bc8fa8578c5a4564926f9cf346ffd32e5dbe6d2523790975dac4ca5db15f8704e6e6f9c19617b1cbe32df5a9c8e54289db36d31c1ebe0eac6e7f9c4812a5c3daa3197741e202b265c71b9f097b8a917e13532c2f0b2c8dcc6fd119aa91cc199e36c8192d431f5fd1849c9a5ada4c7ad7f4e55b1e8b4b76d7b65445cf9451ebcbca9a87f129ffaf882015a22103f2486b01dd24334112c1b2977a26abea5233c3f62e07ef117ce9512c91c1d3cd0159109b3106b5beeeda6461f0e6662eb3781449d3556019ca03f2eef71f5c428e774dc8b36098afdc29674143231ed20070d5854603ac296b3d7fa6ebda57b335a81477d1777d872232f48d84fd151ef0dea8e96819e68087c28fb4d4f3fbc71635ecb2004c396a2bad87f22f446640ad159b6f123b2618a19fbc3e59dc852d167ab35757dcabe7d43239fedb923bcca97013387b0b9b88d4aa6b08437e1b50d3882141a8eddb654c885216509cbe2773d723d31cf5fa15a1aa8d0a8bce1fe2b5737e41cd98de2b7d96655f843b2bfe7340e96fe4a5f8f861306f449068b30f560eeb511d6e40ca9f654691c8c47fde79b0c453aa016b3170865a2574fef49d7caf45d35cb01e4e4d14bfd995374f46b433353d09dba39a151ccf19180b0bddc4ca36a02e652d5c2391e5e449587e4db73fe7786ce716e8bdfe7ea215013fdf0225c4ce3bcdd0de9b1bdeda15652db14d1fdca63fbc7a5bb0300eb139b8cfe17652442deb11e6f71e9e1d28313827bb1be4821a3c9e6fcafa12074412983aa14a55caff5ce6b616b30d7157b1ae1deb445d6c67f607a32af57e2e7d6af52662791df9f212791d7350b24707792c67d3f53644b0f9f07a25aaa12ab1b343e3ae0a9224e2403229632f278551c4d98f6f69ba5a653b9f2ef5dd497993553df401410d2c204300c4a7070daedee0e87b68d330b204c86f40538d052c6220c24ffa6ff7d4177fd90c87bf3ce63b4f1f90c0b70ae61dfc7a033dae1e994c63f0118bc18c382a982866ef10fcc3135ed7af6db99084d1382f9f2d0bbbc20b966a5c70862241c49ca03829aa6085e8d8b0eb8202c61be2d62adf5dc7fc3860abf9323f0a6dab0dbce57b592624920fa79fe773699aac27834b3ba0fb118d04379d7aa63269ad357ad54e4be451634a77316a3b222feb00f2f900115432a45d320961438368d54ddf638ec56de9fba36a7014174121f7521bf8f99535e0771c0b74e37e09d1f854fd335a95d322a349f6199490b3a601472d665acaf2db65df2e4a0695da2d11a231d77703380738553580fa9d815445973bee8999516215f24d0c395ef0f4826ae2a3c49cebdf2b8d0edee9b3c193caf11d69eebe224c3761f95ef24644355ca3a6ca9580c4037e2d878ffe84dcaaec1cc08120c82f7041538c11e7056ca4e1a23f78ea2e82424d8ad00648d6314a75ebc607d1a8b004960ae7dd4e583158a968a2f4692c7287c5dda7eb3fe6724faab4e9608f9065e53daa0ab36dbc4da04aca9ca0a75f42d105c65cb5db31e629d21a2c91bdfc3a6303784ba7107c60e6ee26ced3d7ab3d230cb9c26fbabe63601f14fa59cf3f057cab356c3a619a79955fd273f2f018335308a85423200f529bfc34e35cfe44b7da76c5e230cadee67e956e3dd37d1dc86423178d4c354af3468507a9d5027c815684a34a5be373bb7b5658004951da4b98798f1eb4d02e9535a57c5b6cd97f3e0690dec0f28cf455f6761b2336dd0de5b79e0c3b88be6c00ae9a8842d5c072ca4da6c35b7b913f91f8db3f1d953827d5de4f223c077aca362ea9aa018fdc7733beb47e5d1ff0a8ce1561e5c4d28f90e5963fd51a78ae0563177695e2a622074b0bd439ddb976f162aa6a32dd404f908d29089c81ba11274cd27172fa2bcda30b04ec9c30b936515427ee7eba54cb586cc05bdc29273923428cc9c441ae31afa77593b8a3049ec51c0e7ddc0a75a2e563977c42d543bdcb2515bce32daf93eb29b0674035cec962690fd1770a21a8e2a61b14fdf75c6becfed18f98674de4c1407cc16510ee8fb8b3d884647b38aa60568d09ef235e732495a2dd725109ee87bab2b474f40232ea008d8aa2bfb5f2ac91e14086e86583309a674da3717e01dfe94b86cc46321e98891240dc6fc9e8f88a0292dc5456192293d790071da72e9999ebc09c2e65566bbeb8899c5dd61cb8465f4bb34d46d3c24c99067f5fa380b1dd1cf839241ccef24abfcb2d608836f61ab9395bc9cc4e53ac5ec72ac40e187f00c", &(0x7f0000000300)=""/74, 0x1f, 0x0, 0xbe, 0xf8, &(0x7f0000000400)="44a5ff5589fbc92798f77abda13b4769c0d7b6cf2cb43b9778f6a7bebf56cb8badaa4277d534b93d2fb1104b6c3573c8a0618da91418706330ffb6b6fd04983c50ed6cc2f86c3f60100af8c4b29fe08b82dd345a983609507c8ccc3ecf84e7c3ef921f45d2693c4db9cf318c2ed8ebe3a77bfdd01b2662984e8ecb9e5854165411221eac36b0898241195860cb27e0fae0aba7718a732b7b33479bf3fc57b76fe9bda441c5314087b8d11df1e19fab162366a5f0eb5dd3837c9c49dfa2fa", &(0x7f0000000500)="16a32037adf510e93eba16434e4f927455abed72e0cb5da3b39b8c2a439a63cb166697b1933b1e288cf90d5380e03210af133b18c94c75b0be04c778de4bffc25ee4d5ff0b88c2932f5ac75d88630b85b8e1ea9c6ecdc83224d8d0dcfd887062ce3019cd7e5cc677ce281e271d812dac215bffba720f51ad45dbb6ee9a0a77c1a9331d33dc331176a4ccdece2da65516809eba8cbc77d3c6264d77ac9d452c4108aa3a185ac97ce2b0b499da149fcadee90978805d9a863a0b8f1969ee804512fdb47595487b9d7501df276d8b2e1093c4bd2420390d761867a955773bc9fa890a0c59c069e9f2390334b3ec82cb96bcfdc47157173f2983", 0x0, 0x6}, 0x48) 14:11:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2c}, {0x6}]}) 14:11:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}) 14:11:21 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:21 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, 0x0) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12204}, 0x0, 0xbffffbffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xc9, 0x0, &(0x7f0000000700)="0d152f9ea409037151e03f637dad137dfbc8a686d7018b6f4fb242014006333ae3fd60f880c0c4d4d651a9f21b8460a4d78c6372758bb368b096a4597474edaf07a8ebd889e56f72c9c44faa8d613ac96f1966d17ea717774dc4dfea13850eb02586ece64cd229092d050e939427d23e1be3d07d264f57a06f0ec08a74dd4c0df196a8e7e5480934caeae22817cb0121da4e39fb4730b541a2777767e47783c425138335adc83576e12b858901b0e357c12970fa5756096c49d8a8bab91047cb7ca277ae468f7da7db", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r3 = getpid() perf_event_open(0x0, r3, 0x3, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7f, 0x3, 0x0, 0x5, 0x0, 0xaa, 0x10, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff2dd7, 0x1, @perf_bp={&(0x7f0000000100)}, 0x1404, 0x200, 0x21, 0x7, 0xfff, 0x8000, 0x7, 0x0, 0x0, 0x0, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x1d) getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, 0xffffffffffffffff, 0x6, '\x00', r5, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="180000005d0500000000000000000000d2907601000000183700000200009500"/47], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xff, &(0x7f0000000380)=""/255, 0x41100, 0x2, '\x00', r5, 0x0, r6, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x243b, 0x9}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') 14:11:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 14:11:22 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f4805ef3550bb546040677b0c5077da80fb982c1e9400e693146cea484a415b72966118b64f751a0f243e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4b955a682a081b554f58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c7120162198c8624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bcfd9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14be2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39f430c994366b44126efd1cf870ad7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969841595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335c57acf37331766e472391e358c30000327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964e4cbe024fd452277c3887d6116c6cc9d8046c216c1f995778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1065e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb813bdbade8477610c213905e9d931f0868afc4294859323e7a45319f18101288d176bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d069fc03aa188546b3ad2a182068e1e3a0e4e00000000000000466a4b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d4d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468fd8df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f744add8404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa27b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf24780abe0846ede333bda367bf10100000091a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70e8a02000000000000fdf9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378d713acebc5b014e61a543a5a194f9ac18d76b5440e99d2d6aa998a156bfa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb500000000000000000000000000000000010000000005c1e0ac342fc9a7b965eba2ec094d69c42335e73cc1fb29b006fe578abe4e82345794c7bd6c3d9c5e84ce07bba6be6487d16480606018f48b4841353a724776de880ab2a4c4c828be5b1df0ecffe3c51ce996c49ef7af2526c144805371fe9e09d710158d0d654e9158f02e8a4d679635bbe0c7f9299b01356c0012e6a76f51a6cae66072f173355c6886e687f3480c42788c9000000000000000565248ebc11c234fe99bb173d2941291776fbb543fcadb955ff31f25fd9d3885a48528868788d1623da8d56cb2c7b258079d0a7e0bd40206f55ec0594ee4b4e4169f3561eb3d1b8dc719e7dc84cdb66a7bdcd624be7c66a51e57a7de84799fbdad24290470a0671"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='ext4_journal_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, r2, 0x6, '\x00', r3, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000e80)={0x1, 0x0}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xe60}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f00000001c0)='syzkaller\x00', 0x8, 0xf7, &(0x7f0000000d80)=""/247, 0x40f00, 0x15, '\x00', r3, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x7, 0x6}, 0x10, r4, r5}, 0x78) 14:11:22 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, 0x0) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) 14:11:22 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:22 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1308, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) sendmsg$kcm(r3, &(0x7f0000000700)={&(0x7f00000004c0)=@ax25={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000540)="bae2cfb0413edc175cac96ceb21d40fb1eedb652ee89cde820a67ea7007af5bb271eb88d2a89597be048543b3fc29c567344a06da398a8aee04c541a51ff7427c40b1a0fce773ac19ded3c698f32b67a84e8a47b10f910be52b22cad012f4d0c67eb6be881eb7d8629cce99c715920a97d8e672ff404dc80c1c26a00a327b3d1b596e34fa558fcb5b2ae56e66cbc2430408263a606b61b63012b79fdb283c2fed5f838d75203", 0xa6}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="980000000000000011010000050000001c08a7e7a8f0495001cc3e0d35781c7f10a41d2cc0b30b596cccdae9b70610ddac233adbb942e282625e562c8552d930983239ad84f331165f9432f6505bf16c2b877cad484c93e840b47cee6437525f79d9eead312ac6ac56147b6c74c8379e466ffdd940e8d47ceea69bf4eaffb600c6f9c8cff832652c86c89d3ef3836fbda4651c8d2955b00c00000000000000"], 0x98}, 0x20048814) 14:11:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4}, {0x6}]}) [ 423.967028][T29778] EXT4-fs: error -4 creating inode table initialization thread [ 423.976677][T29778] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 423.984255][T29858] EXT4-fs: error -4 creating inode table initialization thread [ 423.999670][T29858] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 14:11:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30}, {0x6}]}) [ 424.171849][T29881] device wlan1 entered promiscuous mode [ 424.230869][T29898] device wlan1 left promiscuous mode 14:11:22 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, 0x0) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:22 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x1a0d2, 0x7fff, 0x4, 0x0, 0xfff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x9, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xe7, &(0x7f0000000380)=""/231, 0x41100, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000180)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x0, 0x0, 0x5}, 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x61, 0x7, 0x0, 0x0, 0x0, 0x8, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x10800, 0x400, 0x20, 0x0, 0x8001, 0x6, 0x800, 0x0, 0x7, 0x0, 0x67}, 0xffffffffffffffff, 0x2, r2, 0x1) socket$kcm(0x2, 0x0, 0x2) recvmsg(0xffffffffffffffff, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000007340)}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0xf, 0x8, &(0x7f0000001900)=ANY=[@ANYRES32, @ANYBLOB="080000000000000018210000e4b9ee2562f052234f797df96f8102a23f3f7d7df9d4bfb30923b4fa13ec98e5db35321ae7e50eb7cb3eedd3b5401db9bbafcd841aa99d5b56cf3a71cbaeab1407f819523a5862b7dbc5e7bcdba50914fdd4eddcfbe8c4cc98e4b7770e0f421e823bbefb152e67336eae5419503ae50c4c3ce8223a644398085a283887fe288d367200", @ANYRES32, @ANYBLOB="0000000007000000beca6114d64cd783"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000800)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000007480)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000074c0)={0x4, 0x7, 0x400, 0x7}, 0x10}, 0x78) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x7, @loopback, 0x189d}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000640)="80fe4a3140f8caf4e6c310c662f3bcf1f6b1c8ef6d926614f8df3519c69579befd7e63a84dd9f8f5d735207efb3b1156d59e63ef59fbfb20395d24a9063e10df88ea6515889a7b24954d27bf15a0e2454d22a2f1eb4b26dad5c20ee814e0f1a5106605ca4d70fac0b2d1d13cf5ce3ac4bc1a353fe7164016295db5300e0d64671f77d664d1abd5e928ff3986c70da29a29e530104b6074580f", 0x99}], 0x1}, 0x801) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000600)="3853dc14ebbc9e20675e20680334433d", 0x10}, {&(0x7f0000000640)}, {0x0}, {&(0x7f0000000840)="d748f068585cabfe733f5cc765a457275af67729fdd59700"/34, 0x22}, {&(0x7f0000000880)="c8304fa1a81d8ef25445f515e987530fca29b9e9ebff50043670b21dcd26fa4eb75a5f6ae095c75ba205c2d2aa3d446b5c084f42ed4e", 0x36}, {&(0x7f0000001800)="57c8292e81c4e0bc65fadc9fcd66f6e3420f3b74ed53e0b5840a7e9ca01d3c15c7578393ac3d3818eb694f6d0b4c61e6979395c3f5ace20c8e0684cdf8272a7de992c559165110e21702bda30b9c6c7dd8ab30adc4bab72da39c444566a9359fe971c9ac1778eae336b5c93a90f838db717a14b14a1664c15af335082850dd7509196f440fd5df95f546ac2f158c2fe5ce85baefecd59788a17f1db19ffc63b03931779109e6c0a6911236afd848efb27991a7350d15685f3fa7e6c837a40b1599c40e4161bfb495ae7204776a37498b48a6", 0xd2}], 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x188}, 0x48040) close(r1) [ 424.505055][T29899] device wlan1 entered promiscuous mode 14:11:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe86) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x3, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000580), 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x3, 0x4, 0x589}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="950000000000000044100400080000004cb53000f4ffffff183500000200"/40], &(0x7f0000000a00)='syzkaller\x00', 0x1ff, 0x21, &(0x7f0000000a40)=""/33, 0x41000, 0x1c, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x2, 0x5, 0x400}, 0x10}, 0x78) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x5002a, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, 0x8800, 0x3a, 0x0, 0x8, 0x401, 0x0, 0x2400, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, r1, 0xc, r2, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r4, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x18, 0x0, 0x0, &(0x7f0000000000)=[@mark], 0x9}, 0x4048041) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4, 0x2, 0x24, 0x3}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000003c0)="884677c7baebafc4de3c93a526cf8bbfd1151fc4839394a2efb3c63dd8b0ce2c1fd1d3493f14a3e84534097a3bff66d0bec6dcfc494b00655921679e5cd261d4ab40d8cb390029a2facf3532217b5fad4abc5eaaf503bf5efc487b955d1884dbdbf8c3a1b1350f972916efa2eb71edcb868c96c27afc1ab21ec9ec6019d2644b3119758eec6095706012af00d7367226f6674eef03f61c8c186c63621ff35f01ffba55a73f51b8d24c6442eb029024f11b4e624052a6fb4e955e01fadfe2acbc802ef586f2c237accf8d865b6be6cb90689f60c056e2", 0xd6}, {&(0x7f00000004c0)="150827878e2578a3f74229513f1cf601f84bc61166acf4c6a786f65ea8a96f6b0f3f510aaae8146699db88ae022998c2e102294ec1ea6d87ee93a247ca2d06ae47e00bd0d3758d8a6bdab54220817e3eb92a0ee733fc8365e28d110082da195ab423830172c74083ba0ab908913414b7a17a3dc5e15ccd9a0847fdf7627dc162f58454ed47523cf6bb39a6ffef7e0c47b3a8ec99590d2992d51641db4fe5cdd1bce5e815ee871f48504f28bea1b4cc85e4d8562365c58a39481fa7e84c9f6de127a4a97c10952c0806f41483e938f1e33c76d61a0a18370e07a396", 0xdb}, {&(0x7f00000005c0)="b183bcee3069d2a3fbe218626c25b860ce26fc7b0a8704dec1d9a6b7d696ea520a11b07c07d64a352f9d0a7f08e8db85a8b21998a81cfea35eebe1f1eb7181f937658a12001c925eb35003c5602e10c39204bbec98eb3ee5a8c69f5446fa9e8470942a81a0afc9eda3e755d881b6c236505c00df0789e6878f527ad23f1875fb6663c341279777995c34f7bb27d3380a6637c82a96ce5450b91caeed8bdc20e1a9c2ebbd34b202b7", 0xa8}, {&(0x7f0000000100)="cf02e9a6275bfdf69bab24790623511680bd", 0x12}, {&(0x7f0000000bc0)="6dc00df0809d67862dfa651e55557e382b01da3721e77bbe45e6244d9874be060eeeed833428853a71ca111358a712ef993d175ac58e336825dcbde0e867b0e918432735395fd1d3ef9fe6f330d2ac54cc6d8dd2c8735fd9a1569d2a8879dadc69406a7f97135d94dcec500fda4f34a3372c5ab31dc0b1537e48702b97ebfa82ff04679e15167cb89b7b00a3194088313d2a5446", 0x94}, {&(0x7f0000000740)="159040847a01b2441807295e58f106b6cc7b97fb66d7bc254709324a53fd1b85ed867a59564247162e63ddfc126664276795af5e2b8795a4247f346cfc5eaf8a528e436c6003bbee1acf7da7767676193441b768b653f8379c8e06b9a38ac5140bf59c703ed3a7b516cd17acd6a2dd026c7e990691", 0x75}, {&(0x7f00000007c0)="c2debb12d026ea1cd8b499eaec0f87771ed82f9892e0255e3993afbc4200f1de552aa8d3bdaf692a48158452d479120f0bbb24d4518fc16c480c7718b49b220db0d896508fe9e14b6a2dfcc879c8461383a4b13a5e8fae5b74c82976e67bd7a2997e1d0df0636f6980f9a2768958f9f61defd69a3cdac16a2d64147579328b007e6b37f64bda8bed97c2b3b30eaabdd6e527e5dbd7038bd8dfe8343c6692641f6ad068f885556c103ed05959d40c8e93bc325c3c5b0479635b37bba9f761c150fe09e986af2cfe0d446539", 0xcb}], 0x7}, 0x20008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_int(r6, &(0x7f0000000200), 0x24000) 14:11:23 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x34}, {0x6}]}) 14:11:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}) 14:11:23 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}) 14:11:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x6}, {0x6}]}) 14:11:23 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3c}, {0x6}]}) 14:11:23 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() sendmsg$sock(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x5, 0xc1, 0x0, 0x2, 0x0, 0x0, 0x81802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0x100000000, 0x8001, 0x81, 0x0, 0xd71, 0x0, 0x6}, 0x0, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x880}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$inet(r2, &(0x7f0000000640)={&(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000180)="9e77798782269ac3313c3bd4a9f2eaa9ef", 0x11}, {&(0x7f0000000280)="c6bf4df845ba1319856bc7a0321d328d9bb003d0d90476052aedd3501c3528603645572438afe6c7031faf98377fa4ec94e510252a37482541f4adf55c424a2e6756bebe95d8a1da4570f5f36f89b80c4aaca7da1f", 0x55}, {&(0x7f0000000300)="d880c211c701228908e258932a4559d5ee34d416871d42d4bfbe51b860a1c23e698562fd87a4ef3ec572a27ac1deaa6318420bf62fba7cea17a8f1cf9ab457a2435d4bb6cc5fd0929d959e27a6c71a35caf2f9ff18740cba335eeea425339f34ea63b23e8898b9851822", 0x6a}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="699fda4a54cd2ae4bb1b169d498efffb0d35ff820e8574a1cf3e6dfb4d438c087c50e813509a15a1685e8d4eebafa1a8fd90f361d6c7310bc29e785377da2cc7c7ed17d8852bcf585ef885e34b03012046f1f71fc1a0a6c9ff0ddd66befa213c339f082fa1fe4fed6cdb4e614764acfd94668666057c", 0x76}, {&(0x7f0000000440)="47361060dc7f0ddf779cc5d138a0b6e99a3943e788730ad853315554d26c55569ac1d18ae1c77c3aec611f10dce02122f3a5c1db5ec0c4f7b1f9e830886698354c8fe2979357d777ba61c3a4b6b2fed61e317abbe4c8ae3d8be5e06668dd662dcc3eab91520a982225d959e784a07db3d6feea0df59f83da7aedd23029a4c164c2d7cdcae7a57b19f1377512897c5130be3016f27906b08b10d157b5610261a2ad", 0xa1}, {&(0x7f0000000500)="e3040cdce2672f4e71b8fb2341cc4198ad735cacbea6396184742c07ee1f98f5a63cb0f92ad230312532d4d9d5d015677b965ac697ea4b565f49cc73fd836bcc722c5d308a54476d943d61465856177605d78ee2bd22e5f82dc45285d0afbc947082f49eb57724de7e03ca313c0a674c9cb12900c9208beab68e677637937ffefaa1f8769ff4647287600706596a9ad501e6f1690e3d7e54393c1766", 0x9c}], 0x7}, 0x20004000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 14:11:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)=0x80000) openat$cgroup_ro(r0, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) 14:11:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x7}, {0x6}]}) 14:11:24 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3d}, {0x6}]}) 14:11:24 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001000052bd25a80648c63940d0300fc00100002400200a06d053582c137153e370933018000f01700d1bd", 0x2e}], 0x1}, 0x0) 14:11:24 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x201, 0x21009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe993, 0x5}, 0x1104, 0x0, 0x0, 0x0, 0x9, 0x7fffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x84500, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x20, 0x0, 0x0, 0x4, 0x4, 0xffff, 0x0, 0x8, 0x0, 0xffff}, r0, 0x1, 0xffffffffffffffff, 0xe) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) close(r2) write$cgroup_type(r1, &(0x7f0000000040), 0x9) 14:11:24 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xc}, {0x6}]}) 14:11:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x2000000}, 0x40) close(r0) 14:11:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43408) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001e80)={r2, 0xd, 0x1, 0x1, &(0x7f0000001e40)=[0x0, 0x0, 0x0], 0x3}, 0x20) r3 = openat$cgroup_ro(r1, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80648c63940d0424fc60022802400a000a00053582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) sendmsg$kcm(r3, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001ec0)="4b5de57d40a86ed932ee9b3f3f23995c5205a226d6a19090f22298465fe53e2087430dd61a349683013846af4ba3a81420c3a571674ea59707279f902991ce7ef74617d49075649d60acaf064c053ae638e64eadb47c48e6dd3a6c2340eac13d2e4f92d1145439", 0x67}, {&(0x7f00000015c0)="b41f2ed72824648211042586bebb19d17a2678a4a90c67f6d04191cc97a03221cc994b9b415668194285712d93710b02cd102e851a53267fcea30cd14caf4e", 0x3f}], 0x2, &(0x7f0000001f80)=[{0xb0, 0x103, 0x6, "828da4cbf46738736633c6be6154a2075c357c5e7569a4d56b8dcfdd177510b69b4d5801ee49a34108cc7d9c8e226dc5ec5d7f0678c2bac6e6e602c9aad6c35e12bf9151bb0b8ac182d149e53175f85ac00142e21e4884fe5e36fc084670e034473adc7609f995550c6f58ba66b8d7c9c351ff3bf6d3c4a4a833742a2136ab4af722606661ad78d18778596a38f7a53273f5145b65cd950b6bff"}], 0xb0}, 0x40) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r5, &(0x7f0000001e00)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000001600)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001680)=""/189, 0xbd}, {&(0x7f0000001740)}], 0x2}, 0x0) sendmsg$kcm(r4, &(0x7f0000001580)={&(0x7f0000000240)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@default, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="1d9426e18c8835d64decd066fcbc99ba989190031ce959d8404896765cda3b9b74cff051890cfa2d48921a0e26e49b763b6a139dab766d4bd0d3b4892f6b3a969a7c81167fc6f32c5502727a01f2bd7c4fc5f985120b93fce120ac089fdeaa75e4a1af81fce3fa", 0x67}], 0x1, &(0x7f0000000380)=[{0xa0, 0x104, 0x8372, "ccb02785d2261d029419d0950ff64bb6abe88b7a4e4cc5681ddd77f617553f25d86106c514e2743c360ef37f4c436cf04124a790d003b5498722e22268d89a54a6e43143c932bd3c617b9606e4ff2519dd4703d683fcf0868bbf90b159e5b3a654e228659cc825fdb6184ed0bcb0fc98aec79f8e200baf383811e5c9989f6467fb5f663324a2aacf597c42"}, {0xe8, 0x113, 0x3, "3129c9ec37e6942fad395d31df3a9492170b4499e4baf375a3c09ee219ecc299919c5b6f5a01f9e984c3772c13c73329a1b54739ef63b6f6e234cf9af185535b20f9585f9dc657ba775053c59e1755c452013b421dbf4919a38eaee012c0ac8acd9b8fec7ac7c9812800f75bec81042a420a57d7f32b361d6da10e3efeefedef4bd5160d2e58a2823ef76395e9fef903b9fc0c99d6556838c2dbdf2de3b55161818a90c0e1231141d0df4c4103afd451a3ca5a4398aac251a62405e34df4bc983e69b4910d1a1730f30b3f3d7bc74591e01142d0f42a"}, {0x1010, 0x0, 0x4, "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"}, {0x58, 0x110, 0xfffffffb, "dee1d5547ba56eb2caac1bf1d7dceb2d13aa94e19a1572ae2ae759b018cf0657f7c47ccad031491f6ada9d61df7f06496d4b588ad1d5b44569ce3c1e2977dac48c"}], 0x11f0}, 0x1) recvmsg$kcm(r4, &(0x7f0000001dc0)={&(0x7f0000001800)=@caif=@dgm, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001880)=""/81, 0x51}, {&(0x7f0000001740)=""/15, 0xf}, {&(0x7f0000001900)=""/16, 0x10}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/43, 0x2b}, {&(0x7f00000019c0)=""/160, 0xa0}, {&(0x7f0000001a80)=""/117, 0x75}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/42, 0x2a}, {&(0x7f0000001b40)=""/243, 0xf3}], 0xa, &(0x7f0000001d00)=""/163, 0xa3}, 0x101) bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x15, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x7fff, 0x1000, &(0x7f0000000300)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001340)={0x1, 0x8, 0x800, 0xfffffff8}, 0x10}, 0x78) 14:11:24 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:24 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}) 14:11:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x14}, {0x6}]}) 14:11:24 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 426.325427][T30079] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 14:11:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) [ 426.391860][T30079] netlink: 202696 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:24 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:25 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000440)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000100)=[{0x20, 0x84, 0x8, "03e330e044443a3b06"}], 0x20, 0xfe80}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x240440d0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:11:25 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 14:11:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x4100, 0x0, 0x1000, 0x0, 0xfffffffffffff800, 0x10001, 0xfffe, 0x0, 0x5, 0x0, 0x57}, r4, 0x0, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r3, 0x0, 0x1, &(0x7f0000000240)='\x00'}, 0x30) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x3a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 14:11:25 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1000, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0xffffffffffffffff, 0x0, r2, 0x9) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x2, 0xa2, 0x80, 0xf0, 0x0, 0x2, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x9e5, 0x100000000}, 0x2000, 0x2, 0xff, 0x1, 0x7f, 0x3, 0x4, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, 0x0, 0xe, r0, 0x1) perf_event_open(0x0, 0x0, 0x0, r2, 0x2) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) 14:11:25 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x48}, {0x6}]}) 14:11:25 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x16}, {0x6}]}) 14:11:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4c}, {0x6}]}) 14:11:26 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xb, 0x7, &(0x7f0000001200)=ANY=[@ANYBLOB="180000000800000000000000800000003f67360004000000180000000400000000000000fff7ff7f850000008300000095000000000000003267614eb10a12007c5ff405ff74857c0f70016e31e3ab3580d86adadb0000000000"], &(0x7f0000000f00)='GPL\x00', 0xfffeffff, 0x7c, &(0x7f0000000f40)=""/124, 0x41100, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000fc0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x1, 0xb, 0x8, 0x7}, 0x10, 0xffffffffffffffff, r0}, 0x78) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x25, 0x4, 0x0, 0x7f, 0x0, 0xfffffffffffffffc, 0x2000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x101, 0x8}, 0x4000, 0x7f, 0x3, 0x9, 0x400, 0x0, 0x86d2, 0x0, 0xbb, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x28, 0x3, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x1, &(0x7f0000000040)=@raw=[@generic={0x9, 0x0, 0x3, 0x40, 0x1}], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f0000000dc0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x5, &(0x7f0000001140)=ANY=[@ANYBLOB="1838000005000000000000000000000018330000030000000000000000000000950000000000000010485954453a00708064c7b41aa2d5ff35fa523725db9edd97de35f6cbef1db68c317d4d361205b049bf0364d65345e90842d5c0f16f3d627f2f582af962c01b37df416e1dee8bab7a871da547c4a6b675ab9e7e07ad41a855f506b95790eedd6b15b1c724edb20f7eecd56fcc10b46b170742eeac62719c79c761e38ea9147a962c848f21db01892bc5461f79158d16cad87f303cefa554"], &(0x7f0000000ac0)='syzkaller\x00', 0x20, 0xe5, &(0x7f0000000bc0)=""/229, 0x41000, 0x2, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000cc0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x1, 0x1, 0x200, 0x10000}, 0x10}, 0x78) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x1, 0x61, 0x4, 0x8, 0x0, 0xce21, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x9f, 0x8}, 0x10001, 0x5, 0x8e3f, 0x7, 0x1, 0xffffff7f, 0x8, 0x0, 0x3ff, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$TUNATTACHFILTER(r2, 0x400454d1, &(0x7f0000000340)={0x3, &(0x7f00000000c0)=[{0x5}, {0xb1}, {0x6}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x6, 0x8, 0xe0, 0x0, 0x6, 0xa002a, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0x9}, 0x44210, 0x6, 0x100, 0x7, 0x400, 0x8000, 0x8, 0x0, 0x10001, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0xb) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r0}, 0x8) sendmsg$kcm(r3, &(0x7f0000000b00)={&(0x7f0000000380)=@llc={0x1a, 0x306, 0x1f, 0x4, 0x20, 0x1f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000400)="88dd7a252d6f7b33267bea050df95980b95293a9b5e43e07adb3116989e3ff967251897a21c9b4f2856030c2792144835ae654323dbba15295ca6a4c292ce28dde17ad4e8ca7021317c3a48ea4e3dd8bc6d8fcc296b9dbde3236", 0x5a}, {&(0x7f0000000480)="b06961e7b5af5ae59a33ea5381127107093b7cab8700ae4319e7914b4b381418cb0bcbec35ed7a2f5b822b36464172b52eee7ad7dc6f1cb7e0fe9e340bae5fcf44b19f369ec5ccae", 0x48}, {&(0x7f0000000680)="1cd0f9be12b18b331d69db419d2fe58ceed8cbcbf2407c7a49056e0c84af60b2c0e9f07b7fa1820e81501b4a0c0f55393dc065eba826d843dc6ea8bf973ddea4ea4497f087f07cfc5978e3bbe3cd5e1cd2c0d90603d7ab8f46706d1720288fd6d9daaa4df60bba14abe8f25ee556057271400d5c42ec76fea66245488415275cc667dd7d77d891af758a933ed1f35f4ee01d7199adfb17ea29299be20b010b69bb2d2cbcd5fd54b801", 0xa9}, {&(0x7f0000000840)="f4bde78c940e941f93ec6118b7f6750290dc40cb0af4759f0309aec06d1c65bef4f766fa4ef04b76b09a7f087c48e7f5fc38f0a4dc65f60f8c8635fb64651a36b93eb463b6dfb484f436e71e168e09fec92e48a6d4f1c3ead8bd2d04ceda09288f0c43e9ba11e844e08d95d070f8730234919e12d26ce996c48ae0975d30b8c2b8bb", 0x82}, {&(0x7f0000000900)="0a05eadadb7508ebdb9e8840f8602499f7d1ebefda1ece7eb38a796bab7f868afdeeeeb3cf639ae0be141d7bdbca36eefdd0db69fbddac16c85a507e067a3e33254ce8022356fd8f42a05d591b8671f89117c1b478f9b8f552dbe8baf3e5ed6e24d87f0d63a7442a86dedf5a7462a711ce7ea28d83329bf8452ee4efe2c0fd289b658171d057dc967bcf", 0x8a}, {&(0x7f0000000500)="f00d087f14a119ec6c1b6b4aa02be6cee3ee7e1c5dfe82039f2011f6968687a8eaeb5b7fb2c497f51edaefd07b24b19e8b866e47b21f3c6e13131212b4a6ddbc51cb275b6d5968d1c1adf61251a0b8a50c7bdcc25d0c9b411f15b97e35efc3c2f6966bcd82f04e1c09405770a6b71c", 0x6f}, {&(0x7f00000009c0)="5d0a810262cf55cdcc4baae81d3be697a5cc7dbb19c8554de55bf756683e9795304757a130a17a556c447f388fe3549b5784bb01a03f038104bb00b14d6167b90fbac8c21be57627b285d5de00dfb93a2823a0cc8a8531d74dab8cac6daf55c3315d7dbfe88cbcd5269d1273259898d03205145f6f895f01bd0e42c1adb9903567ebd4827a3913790c655d4e0c7fb89ad7d2e95c8d2ce403c588d9b45df7e2624d15db578e90ea137eb19224400e2aa9565b99d4d713b315aba535687ae7f7ca09cc1960bfaee047038bb38625bc0746b39b03871c902715bdec94a864c448e6dabb7b0145c9ea78a36c", 0xea}, {&(0x7f00000005c0)="f970176f5161611649018c311f3c29e72abd4587b643328ace2585893f66a3ef0cc0ff50531a0d8998caba33e7816426d29f9d76595072f100e66bdcef5ac084b1e56b86f3322f5f5ea5492f766d0f45d3cd0fad3fc89c8e3610737978bd3443eb733a26f9518c4cfc7dd3576a478e9a603e44452e0e7aa8ff8d1db2ec", 0x7d}], 0x8, &(0x7f0000000ac0)}, 0x4000080) 14:11:26 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1c}, {0x6}]}) [ 427.764588][ T134] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 14:11:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4d}, {0x6}]}) 14:11:26 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001240)={0xffffffffffffffff, 0x10, &(0x7f0000001200)={&(0x7f0000001100)=""/220, 0xdc, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x10, 0x7, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2}, @generic={0x20, 0x1, 0xd, 0x1ff, 0x9e2f}, @ldst={0x0, 0x3, 0x1, 0x0, 0x8, 0x6, 0x10}, @ldst={0x0, 0x0, 0x1, 0xe, 0x1, 0xfffffffffffffff8, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x2d88, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000010c0)={0x5, 0xa, 0x200, 0x57cb}, 0x10, r0}, 0x78) recvmsg(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002740)=""/201, 0xc9}, {&(0x7f0000002840)=""/170, 0xaa}], 0x2}, 0x100) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x18, 0x6, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80000000}, @generic={0x5, 0x7, 0x6, 0x8, 0x2}]}, &(0x7f0000001340)='syzkaller\x00', 0x2, 0x13, &(0x7f0000001380)=""/19, 0x41000, 0xc, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002980)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000029c0)={0x4, 0x2, 0x5, 0x4}, 0x10}, 0x78) socketpair(0x2b, 0x4, 0x5, &(0x7f0000003f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000004300)={&(0x7f0000003f80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @loopback}, 0x51, 0x3, 0x4, 0x4}}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000004000)="6ed6ad7d88b093ea9cfe6c96e26467f0969b875586a2f1775caffe0810d3d2f916ff64f420912e7a2f6d9029504994675bd12a04574528d28da78bef3774a8a4be76e4e380065fc3b4d3f5a49395341545b3580a9be4", 0x56}, {&(0x7f0000004080)="8ceba64cf5c6685a31df43fe9c57a8b4125ea5e62efb00467a84fe01aa351f24e13c710f7f31bdfbeabd80e6834ade59540e", 0x32}], 0x2, &(0x7f0000004100)=[{0xc8, 0x112, 0x7, "411828dbc2fa1112f85aeb3c82b95096396cc4f5ce1ecc4f3e9048452a46eb5468b9acc351de3ce8aeb835067bb9b3a5254962cb37674dd250dacda8a715c1aab3efc509b4a594d8a752e4a1753e84d958925e4dc1db5125e9d7a7ac8b1fe1b45fd8e9384626399131002c71301bf85f8670644c794e9073a1a8c71fdb372eb0827d1b493127b744f59645d04713844a81c4b0a54266308c4308711b51d4785550bb41e01696714870551c4f1e2612bf6f629e57a0bb1eda"}, {0x110, 0xf, 0x3, "1522e090c31c9b347a458863137876ba614f83068b4caeca1bdfb8bfc66829df5835a42365d8f377d1852d4e479331b4a3afc4aa4569591ed62fec36043010421d2e66dfb215694032a2d82dd8c42e6fc13a244ab12ca759f36b80fd5a7cb1036dbd0957ee1353665c3fb19cb412e68ae7b8adb491b6767ac5fdbc7007aa9355d8429cb2be6cb5d4e7642ab335bb0633cd65fbf1797add7d970a7f842e8eddbec89e5b678f0444147b3536d155b6e64f6f2c11cc6986b47e02719ae6404369d505d3c7ba5ae4bb6f2c2b1ec977887894e27c6839fe6b165efe4a2df22e9a041243eb32e0dbf4f93fb06d82f1a60cd52f5285bfc02f9faeb620cf89945e48"}], 0x1d8}, 0x800) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004380)={&(0x7f0000004340)='reclaim_retry_zone\x00', r1}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004400)={&(0x7f00000043c0)='./file0\x00', 0x0, 0x28}, 0x10) recvmsg$kcm(r4, &(0x7f000001f340)={&(0x7f000001f240)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000001f2c0), 0x0, &(0x7f000001f300)=""/43, 0x2b}, 0x40000040) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001f400)={0x18, 0x5, &(0x7f0000004440)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x4, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x1ff}, @call={0x85, 0x0, 0x0, 0xa1}], &(0x7f0000004480)='syzkaller\x00', 0x8, 0x1000, &(0x7f00000044c0)=""/4096, 0x40f00, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000001f380)={0x7, 0x4}, 0x8, 0x10, &(0x7f000001f3c0)={0x4, 0xc, 0x9, 0xffffffc0}, 0x10}, 0x78) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000001f480)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f000001f500)={&(0x7f000001f4c0)='xprtrdma_cb_setup\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001f780)={0x11, 0xb, &(0x7f000001f540)=@raw=[@generic={0x3, 0x0, 0x2, 0x81, 0x8}, @jmp={0x5, 0x0, 0x0, 0x2, 0x6, 0x1, 0xfffffffffffffffc}, @generic={0x1, 0x7, 0x1, 0x4, 0x80}, @exit, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x100, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x535}, @call={0x85, 0x0, 0x0, 0x69}, @jmp={0x5, 0x0, 0x7, 0x5, 0x4, 0x0, 0xfffffffffffffff0}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}], &(0x7f000001f5c0)='GPL\x00', 0x101, 0xdb, &(0x7f000001f600)=""/219, 0x41000, 0x5, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f000001f700)={0x7, 0x2}, 0x8, 0x10, &(0x7f000001f740)={0x4, 0xd, 0x9, 0x400}, 0x10}, 0x78) r11 = bpf$ITER_CREATE(0x21, &(0x7f000001f800)={r10}, 0x8) recvmsg(r11, &(0x7f000001fcc0)={&(0x7f000001f840)=@ethernet, 0x80, &(0x7f000001fb80)=[{&(0x7f000001f8c0)=""/165, 0xa5}, {&(0x7f000001f980)=""/196, 0xc4}, {&(0x7f000001fa80)=""/247, 0xf7}], 0x3, &(0x7f000001fbc0)=""/221, 0xdd}, 0x2) perf_event_open(&(0x7f000001fd40)={0x2, 0x80, 0x9, 0x5, 0x6, 0x2, 0x0, 0x5, 0x108, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f000001fd00)}, 0x100, 0x1000, 0x8, 0x8, 0x7c, 0x9c000000, 0x0, 0x0, 0x623c5ba4}, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0x9) openat$cgroup_int(r10, &(0x7f000001fdc0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000001ffc0)=@bpf_tracing={0x1a, 0x3, &(0x7f000001fe00)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x2, 0xa, 0x2, 0x80, 0x4}], &(0x7f000001fe40)='syzkaller\x00', 0x20, 0xb2, &(0x7f000001fe80)=""/178, 0x41100, 0x10, '\x00', r2, 0x18, 0xffffffffffffffff, 0x8, &(0x7f000001ff40)={0x1, 0x2}, 0x8, 0x10, &(0x7f000001ff80)={0x1, 0x10, 0xffffffff, 0x1}, 0x10, 0x235ef, r3}, 0x78) r12 = openat$cgroup_ro(r5, &(0x7f00000200c0)='pids.current\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000020040)={0x3, 0x80, 0xc3, 0xc6, 0x2b, 0x2, 0x0, 0x9, 0x610f1, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x2f}, 0x2000, 0x2, 0x1e, 0x4, 0x101, 0xfffffffa, 0x0, 0x0, 0x97c}, r12, 0x0, 0xffffffffffffffff, 0x8) 14:11:26 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000004600)={0x0, 0x0, 0x0}, 0x44000) perf_event_open$cgroup(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x0, 0x93, 0x8, 0x0, 0x3c, 0x80, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x80, 0x0, 0x81, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b2debc66831a3feb4404000000000000005ef800c11956969f02d9c6128e35e85dd4728dd3e28243a1c8b0435e299140eaab7a5b61b4e824601c2e"], 0x270}, 0x24004800) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') openat$cgroup_ro(r0, &(0x7f0000000340)='memory.swap.current\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() perf_event_open(&(0x7f0000001f00)={0x1, 0x80, 0x0, 0x0, 0x6, 0x1, 0x0, 0x9, 0x10000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x80000001, 0x3ff}, 0x0, 0x0, 0x4, 0x8, 0x2, 0x6, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair(0x2a, 0x2, 0x9, &(0x7f0000001ec0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={0xffffffffffffffff, 0xc0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d40), 0x0, 0x0, 0x0, &(0x7f0000000d80)={0x0, 0x4}, 0x0, 0x0, &(0x7f0000000dc0)={0x1, 0x0, 0x9, 0xffffffa7}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=0x7}}, 0x10) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x10, 0x8, 0x20, 0x7, 0x0, 0x1f800000, 0x71aa, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x31401, 0x8, 0x3, 0x9, 0x6, 0x2, 0xb8, 0x0, 0x3}, r4, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 14:11:26 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1d}, {0x6}]}) 14:11:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x50}, {0x6}]}) 14:11:26 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:26 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="140000002200055bd25a80648c63940d012484d9", 0x14}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000440)=@in={0x2, 0x0, @loopback=0xac141420}, 0x65a6, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="20000000000000510a000000080000000000080000fe0000000029e4f622487eb5ff264830a0f98fe2a86e41c2e03aa1215365319c6a9eb08ac64e88372404ce34d05d72a48eb1dc7d5006527454065fcc169d0025be76dbc40adf957f0f9b90d9b1ca035a1c153033d1f54fa97cc032dd07102d021c6ffca2110b11a8f3479e571b24534adecff06db864d503b0c8cc546c5078553c7a92e767cc5438134f3bfdd0b9650a0900837d7c1dc8e0e6955b3a72d3209df8389f"], 0x20, 0xfe80}, 0x0) recvmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x0) 14:11:26 executing program 2: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r1, &(0x7f0000000340), &(0x7f0000000380)=""/201}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni\x00'}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="7fb29d7d3bbb25beee54608da8184aa5753cb694f0e021a63eae917debf6b63f85b56bfd5c3d50a43da4a2be03e6d24386ce79d576f41bdcf9235c32c6777864ef029c1633878913750257da511ea63ea09da160d7f0784b1d90ddb611a9ec142a6b6d35277c29b5f2b1835ee8b9e8ac4cf0acda0724898ab9a201bd58b0d303a146a0c05ccb3f380017f868ba737831c559294315fb3a004e49ef1dc6a912a0d2dadce0b29fc6bf0a31753c1d3bc2056b7b6bc92df1446faad494475016b8fe925040bd7a7bb04b3bec9cee8b8e59fc4a3b41dd4403e32950700aadfa595786345c77caf9", 0xe5}, {&(0x7f0000000040)="8f6e35cd8b1fe37d4451d8b38a1d9bc06fa2d12ce42d71885afb14d11cd028d7997e", 0x22}], 0x2, &(0x7f00000006c0)=[{0xc0, 0x107, 0x25, "2947e89d3878061db3763363ee4e8459f39e78021b0510e1e87bb5408d692c516891e58f36f92024b79170884961aa3af23f3d75428ce5f1d140cb887b899aa7c7d9c594ca34ef1fc030e371c60c2e8442621a5d0ff336d853a5a714e9a669262d0736e388d2dbdf9945476108e7e1e1ffd6e2517c66b4ebd4a9bcce67378d0c419029a84ddeff5133e96d3ee068c07e69d7ec015261b3757bb32035923f804c6b1cdbf4943f5579bb4c0f95b069"}, {0x30, 0xff, 0x5677, "1c2866a95981d77fe8a601a96c788be6d2df5d52ae8575552141e3c9da517408"}, {0x1010, 0x10a, 0x3ff, "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"}, {0x90, 0x118, 0x0, "0df59966225cc98ddb2619210eed50f417cc1fd1a782cc7683329b92a4ef7953ae9b271c8b2151ccddad218df7a76a68ac0064f6c7479d50be921925cabad08d97ad10dc7bec5d9ab7a96dc6030a89fa812e733e8c0d5496ee401e471f46c78e449e5b4f0e99645e689067690fc5e5f02d6259a9315c099f62d3b9"}, {0x10, 0x116, 0x7}, {0xf0, 0x114, 0x401, "4b64f40d7b84e01332c837c754d554786ff65ef2291f3df5b3471745e2eb78898cc5fa69f5aca56b94cfcda37d04bf16ee901d2597b1cf2e845ef76002391ce1cc55212090b46bc68e43fe7eff62f1dae120732e40730a10b366bf53e93005e16fa8f70ab99e3f862b7321ee997860f8bfb9c2577c2eb7ba9b43251d6c950cd708150521d578f4ab06c5ce7dbdffa4463284c955f9729b788f7904eb24a81adcee87435fe9ef13da457ca68a163b792b689ecbc1b1f78d282a943d01de7cdda1f72ba0dc3b70c0a4ecf5c5a98a8a10e51740f24b499e635f34fc"}, {0xa8, 0x17, 0x5, "4ad253f5ddb47aa5ab574b0b102f60c7ee9f4d84d8a09d4de0644511a2d6e81e2cb8eea8e34cd41dcc5b687b0699770074640c06e824ff1c7538bbd6c63c5c2f24d87c04d0ae3a6fa4a5f49346a1aac1896d5eb0d477d0771d2141c2f0236d1174368686cb6d867624a63c86db3c095557f406f53a6e221cf9f398636354f5d8718ccb999f8f743f82ac9af06029981b579c2b55418b"}], 0x1338}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() 14:11:26 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x54}, {0x6}]}) 14:11:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x21}, {0x6}]}) 14:11:27 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000003c0), 0x4) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="ed0e831d6ee6fcd1df3600d0fa002be9e80eb63b12acabfb", 0x18}, {&(0x7f0000000300)="20791ff0dbcf8920f27396c334d79745fa17954f32ac0aba44490c86d3a57df0ef832f1a45523c2906e539dc9c7a6bbd817a92e95010fcd4461a6cc79ebe3fdc664e691b8261", 0x46}, {0x0}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="38000000000000000b0100000000000089d6c615decfd631b62c73e783a61ad2b3fda257d35b111caec8000000480000000000000005010000659e0000686998bb172d266660b5403cf1d876b44a3c492899419f209ae0d0e3d29ba32b4ca39a667df5130a6087f8ca9fa3b72af40000000000000043c0345a04cd797b06049772"], 0x80}, 0x4040886) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x3, 0x1, 0x8, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100000001}, 0x484c, 0x5, 0x101, 0x2, 0xfffffffffffffffd, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x1) r2 = perf_event_open(&(0x7f0000002ec0)={0x1, 0x80, 0x7, 0xdd, 0x1, 0x8, 0x0, 0x7, 0x110, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000680)}, 0x4a2c, 0x4, 0x3c9, 0x0, 0x7, 0x9, 0x4, 0x0, 0x3190}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002e40)={0x7dc003e64db75468, 0x80, 0x3f, 0x6, 0x2, 0x9, 0x0, 0xffffffffffff0cd6, 0xc0, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000640)}, 0x880, 0x20, 0x857, 0x8, 0x7, 0xff, 0xff, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xe, r2, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1100b7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$kcm(r3, &(0x7f00000015c0)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, 0x0, 0x0, 0x2, 0x2}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000780)="97066cebb6efaf65526461daf4493a7540b112720a293cc458d73f5e4745fe7df1b8f4631616f5e2a7df2d4f458e124e913c3f969010fe9bab3491b2767f899422ebb86ad5f66b9a7d3b4449b16ea3d1f08a54a3cd091b5c567136fc0eb9f44aa09b7724304613a7b05942ffe0b21d65ad507423a19ab06bba806a6fb0aa47c62493c18bc2af61ec5cbafabcc779ea51b4283ea0e12f3fc184cc079b78427a7fffbefa9b57913aa7efc7432aacc1fb4c6143f01622ddbcdeb2efa3c58041d16c31ef79a2d19256009c09d7", 0xcb}, {&(0x7f0000000580)="a904fe61f250123b6d7ec4c6fe0b3374da6f6ea1831f9271af54fbe301c2c3da0c4428d517cf183ca270f813e22e69453749471e27469f049d637244e10ac3a08623323e1562d093ccf70d3f0cfc", 0x4e}, {&(0x7f0000000040)="7446ba64ce28b072289f4cf802f884b34c20a7b9", 0x14}, {&(0x7f0000000500)="c6b2b409d37737e020ef56a60f57763248eb3c1a2be54347374624fc38963988c463b9783a7245a3a50a984008", 0x2d}], 0x4, &(0x7f0000001540)=[{0x60, 0x139, 0x94, "039a43bab8a29e1d981da2bf8a6ec171960eee6b6805b3386663212825f17929cffb61efd970441583ffcd26ab843be369b55ef954a23eefbbf32de3ac27816f95fa7f80e1f87d9eab48ceda"}], 0x60}, 0x24000854) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000000880)="cf4e4d2f7d72def5b712fe9f8b963a92c8955e407f28916ac0f0eb27f8efcfd0d1c0aa4e3d5d0b862925effd4183f40b7d60df3f22390e18a01140b1abf177247fa8bd290d9f19c4599767ba952e989f5817a798df0cabcbab5ffdf3f15e53a5dc0e2e86bc379dfb4756b0bb45d99c118810e1dc577810e3ba2ed8135021724a2d63a20f59d05e019a5942b4b32752cff994", 0x92}, {&(0x7f0000000940)="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", 0xbf8}, {&(0x7f0000001940)="7ebb2a1016b8c3b973e05af34bdd0b5e", 0x10}, {&(0x7f0000001980)="1b4f86382935e91167becf7fd8252d4aefbdf0afdc786e25b3805ba3b99f8a698223f500ad71e5e0667ce17e44dc703f44a6e760a859c31a09385207e9a2820a467379a002bff0aea0d21e7067dac6c82b730074af4cf27b469bff75e4f4554031091032136e4b0904829187abf5eb1536be29847ebb921066e3337ef018b502c30f455a710b49b4f375c2abe629083342f9138f6dd26e2f166c6d", 0x9b}, {&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="3d4d97ab2f533f58dbaf5534", 0xc}, {&(0x7f0000002a80)="ec477249ee26d8dfd6affb632f93fcad932d57d4411759952e1480eca7e71329bc1b6b5e3c339f3fc766f2ff16f62bb5ee42d9aaf74b6a4f3e0762dbb96d45404c1705010145b74fea2f3417773cee", 0x4f}, {&(0x7f0000002b00)="4c913de1230e4aae7b1fc8dd650e21f9d6a0c9ee9891f95bd3a1", 0x1a}], 0x8, &(0x7f0000002bc0)=[{0x10, 0x0, 0x7ff}, {0xf0, 0x88, 0x9, "d931da03d8f99fdcc44b4106071b6f69ff8f5c5b56707d282ed1b4e1ad1508bf45728380a776cadbacaf3d8b24d4fb24a4ddfd47bea902751692d6617685205a07e176695c15e3783f96d09c974b9cb0fd2ba80caf5d3c6c65608fd7cb400cebdeea664c59d2fa51d026d032ceabbb5132ce8c51843d6e478c45b468e3290e47bd2fc99f5c3ead974500811be251ccd33994af4eba4f6007d819cb591c80caa2d144f246e7bb2f2d6488c84d76b8e6d640242c39dfe0f7c8e8b4ce1f67a104fb03889574990e5e3e917b9c0aa1f7570623fa45ecf826199044ede1"}, {0x108, 0x10c, 0x1ff, "96f1ff2b8207cc24062bdf5be9dd73c0344d8c3be22fdab2294ab636740104d9c8ae37fec834038710d8cfd36b71aac849b49cb895c19f50b148a0d1bd56a34ccb19bfcc211ed6d9e2be72c696a3d3110cbdbef6df23f525bf141241246fa2e68bce2732f7c2acb60a44edb01803da0d2aa5ed21058c358c7d75d4709d88405512a72d8292fe6f80b2666af085ce12bd8b929fe0cc2e3c846bfd48888dce8bac82b1719fdb3cf9ca270f7ea58432d11b6835c43af1270fe930af3c140775249f95b78d665c86d56fccc724ab6680b5a27dca6b490cebdabb69f66634b057851be0a4466e192ba4ef9ca633dbd4cd74bdb4"}], 0x208}, 0x4000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0x20b000) 14:11:27 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:27 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') sendmsg(0xffffffffffffffff, 0x0, 0x801) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 14:11:27 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5c}, {0x6}]}) 14:11:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x24}, {0x6}]}) 14:11:27 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0xb8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, r1, 0x6, '\x00', r2, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x2, 0x5, &(0x7f0000001500)=@raw=[@ldst={0x2, 0x2, 0x2, 0xa, 0x2, 0x18}, @ldst={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffc0, 0x8}, @alu={0x4, 0x1, 0x3, 0x2, 0x2, 0xfffffffffffffff0, 0xfffffffffffffffc}, @alu={0x4, 0x1, 0x3, 0x0, 0xe, 0x20, 0xffffffffffffffff}, @ldst={0x1, 0x3, 0x2, 0x3, 0x4, 0x2, 0xfffffffffffffffc}], &(0x7f0000001540)='syzkaller\x00', 0x5, 0xda, &(0x7f0000001580)=""/218, 0x40f00, 0x1a, '\x00', r2, 0x1c, r3, 0x8, &(0x7f0000001680)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000016c0)={0x2, 0xa, 0x1f, 0x1}, 0x10, 0xffffffffffffffff, r4}, 0x78) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000001300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xff, 0xff, 0x5, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x5b, 0x0, 0x7f, 0x2}, @datasec={0xe, 0x1, 0x0, 0xf, 0x3, [{0x4, 0x1, 0x2}], "ba70d3"}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xe, 0x4}, {0x8, 0x5}, {0xa, 0x1}, {0x2, 0x2}]}, @union={0x6, 0x8, 0x0, 0x5, 0x0, 0x1ff, [{0xf, 0x5, 0x400}, {0x4, 0x5, 0xfffffff7}, {0x4, 0x5, 0xffff}, {0xb, 0x5}, {0x6, 0x1}, {0x1, 0x3, 0x10000}, {0xffffffd2, 0x2, 0x5}, {0x9, 0x1, 0x9}]}, @struct={0xb, 0x4, 0x0, 0x4, 0x0, 0x3, [{0x6, 0x1, 0x1f}, {0xa, 0x3, 0x1}, {0xd, 0x0, 0x8}, {0x4, 0x0, 0x180000}]}]}, {0x0, [0x5f, 0x0, 0x0]}}, 0xffffffffffffffff, 0x11d, 0x0, 0x1}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r6}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x3, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r6, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x13, 0x3, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000080)='GPL\x00', 0x4, 0xe9, &(0x7f0000001200)=""/233, 0x41100, 0x12, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f0000000140)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001440)={0x1, 0xf, 0x2, 0x101}, 0x10, r7, r0}, 0x78) 14:11:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x8}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/166, 0xa6}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000080)=""/22, 0x16}], 0x3, &(0x7f0000000300)=""/166, 0xa6}, 0x40000003) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400019) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x5d, 0x7, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff, 0x4, @perf_config_ext={0x1000, 0x8000}, 0x2910, 0x4, 0xfffffe01, 0x0, 0x0, 0xe7f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x1200000000000000) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x20000000, 0x0, 0x10020000000, 0x0}, 0x2c) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000680)='&@[\x00') 14:11:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x60}, {0x6}]}) 14:11:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 14:11:27 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:27 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:28 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x3, &(0x7f0000000240)=@raw=[@generic={0x6, 0x4, 0x9, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000280)='syzkaller\x00', 0x4, 0xb, &(0x7f0000000340)=""/11, 0x41000, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x1, 0x20, 0x4}, 0x10, 0xffffffffffffffff, r0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xf9, 0x3, 0x58, 0x8, 0x0, 0x400, 0x88100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000180), 0x6}, 0x900, 0x1, 0x9, 0x8, 0x0, 0x6, 0x0, 0x0, 0x1000, 0x0, 0x9}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) openat$cgroup_ro(r3, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000440)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r1, &(0x7f0000009200)={&(0x7f0000007f40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000081c0)=[{&(0x7f0000007fc0)=""/114, 0x72}, {&(0x7f0000008040)=""/66, 0x42}, {&(0x7f00000080c0)=""/253, 0xfd}], 0x3, &(0x7f0000008200)=""/4096, 0x1000}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) bpf$MAP_CREATE(0x0, &(0x7f0000009240)={0x16, 0xe15, 0xbe7c, 0x1, 0x208, r4, 0x7, '\x00', r5, r6, 0x4, 0x1, 0x1}, 0x40) 14:11:28 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000001400)={&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000140)=""/45, 0x2d}, {&(0x7f0000000200)=""/26, 0x1a}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001300)=""/211, 0xd3}, 0x101) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e004030029000505d25a80648c63940d0424fc60100011110a2f0000013582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r1, &(0x7f0000001f80)={&(0x7f0000001980)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a00)="744a31e8ccbebaaaea0ae5e8798cf848f676fecee3b0fcd4f82d2241650ef63befc1a6035c1aaa8c8967c57b423686a2d3b986022e23dfe25e691224e576f0bf8733af73c5f1ede616cc885dafdbc31608426e529d094d4700646e5d61861f5c4e1af3e2ea7a963c426c8e36ee0588a4b0262efb73e033a919c1cd89b64b69054fd8c10add31403c0a501deb3ed4", 0x8e}, {&(0x7f0000001ac0)="27049a6e110dc4f47e986bba4e987acb53100324dc20f8aceb0947e212f53d9f10bb7c926940859b2b49cad302012477a6b32c1b0390f441495f49b340adf3455474684782233ee2b6dd97a885ee69f036e19a0d733317743a679bd9d132ac2124e22f016fcb57a79e6297b88874065449", 0x71}, {&(0x7f0000001b40)="455b9ec0bcf898d0297050a2600f705f6ca7b6a5d8df25442469f5fb32020fa167178354660b2c27e7dbcba8462766e92a4e4e5f152befb4d010ecbf703e817a353042d8d8bc0ef212c52a1e62e79092f8969704ef3f3dd03ba73aaaf32132099e6dd9f67717a99229d12132864f4255a81563cde62b85ee9141578c3d49fe242cc8e7fc25a091e0330581a2c566e52d731f3dfa97d0117be7", 0x99}, {&(0x7f0000001c00)="fac1b5", 0x3}, {&(0x7f0000001c40)="fb0c5e64a90840812299c4587aab670376e55d55f2f4317a7762adb633d4c274199baf30157085e96b8add236ba94ae4e67e93b46b7f84ec9e61d4fcab108a7474146a1f56c60bfb981f842dd1a13ac38831a795b32404da0ed374f7e98189d845b9873900dc3488363fc5e3101659960a4ff7d68dec251dfa0a033d3d4b7a09604e70766579e6d5d104c0d359e3423fd02568f1202c988e74fab7f363abf82dd27209a25702e0ae13ff0471f72d3cf387ad8722ee5b25a13975504bb34e4ca380a1ead8b8cac8849db1a9c104e30573660718b87db88865c0e3d88aac5cff349fcb93626dbc753314", 0xe9}, {&(0x7f0000001d40)="7821030f27500f4a8507d1f28cb551382cd71a5a350983f580ec3ffd731f724d5ebf40e9ea607abcc530279dcf3c8ca743f542a346e3749343f77dd52b9e90", 0x3f}, {&(0x7f0000001d80)="076b8ddb6938e761da8b38444be8019dea87ee36", 0x14}, {&(0x7f0000001dc0)="3f1bfd5dc5656f6abd1d4f69f3add6daa55e86c6eb2f8852adc23270733bee78c61a41791e8ff08953c20f737003510c03dd5800ddf3f1fe13a64dd754ae408ace9919624e7f6b84bf6fb8eb162c081eeb684fc507e55be0cc1659b40b8d04cbf15f44b099dce6f4d2764fd470d5a05adf76e7035ccfd90b3d89dab443a620f217cb75439a84c0aa20f603485981101cdd34be7fcfb3b8626bfb89c7cc1245e06593540d070b3f74d6ab4e94b4f683163dcd62f3855094baad5246e7000d1e3d97ccfb10ef9ce1cb246db25f2549c1c5bc9379a86640a456fd2c1adf6177244fef0149cf568bcefcec0aa6712d0efa82d438d5", 0xf3}], 0x8, &(0x7f0000001f40)=[@mark={{0x14, 0x1, 0x24, 0x1}}], 0x18}, 0x80) 14:11:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x28}, {0x6}]}) 14:11:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x61}, {0x6}]}) 14:11:28 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 429.931031][T30405] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 429.960947][T30405] netlink: 179380 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x2, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfb34, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0x8, 0x7, 0xffff838e}, 0x10, r1, r2}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x8, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:11:28 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2c}, {0x6}]}) 14:11:28 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8000, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='memory.events\x00') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2b70696d612000000000000000000014000000000000"], 0x16) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x3c40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xa}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) r4 = gettid() perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x48, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r4, 0x6, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r5, &(0x7f00000001c0)=r4, 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x8, 0xfc, 0x0, 0x3, 0x0, 0x8, 0x0, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x184e, 0x7fffffff}, 0x30a8, 0x6429, 0x7fff, 0x4, 0xfffffffffffffff7, 0x2, 0x0, 0x0, 0x5, 0x0, 0xff}, r4, 0x7, r6, 0x0) 14:11:28 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x64}, {0x6}]}) 14:11:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0224fc60", 0x14}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:11:29 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) 14:11:29 executing program 2: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000380)="afe56d3d98605dbb3f889e8766aee3bc529e3d549ef178b609e4d73a941b2e086032c8a5301ff6", 0x27}], 0x1, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x728}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xc2d}}], 0x60}, 0x40001) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x50}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000011780)={&(0x7f0000011580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000011740)=[{&(0x7f0000011600)=""/121, 0x79}, {&(0x7f0000011680)=""/190, 0xbe}], 0x2}, 0x40000100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000117c0)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r2, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000011880)={0x13, 0x2, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x5}], &(0x7f00000000c0)='GPL\x00', 0xfffff01c, 0x91, &(0x7f0000000100)=""/145, 0x41000, 0x18, '\x00', r0, 0x2, r1, 0x8, &(0x7f0000011800)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000011840)={0x1, 0x0, 0x0, 0x8}, 0x10, r3}, 0x78) 14:11:29 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x280088c1) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000340)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x33000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000240), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000380)=""/166, 0xa6}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f0000000440)=""/119, 0x77}, {&(0x7f0000000500)=""/31, 0x1f}, {&(0x7f0000000540)=""/197, 0xc5}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000001780)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0x10, &(0x7f00000018c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, [@exit, @jmp={0x5, 0x1, 0x7, 0xb, 0x7, 0x0, 0x8}, @ldst={0x1, 0x3, 0x1, 0x6, 0x7, 0x50, 0x4}, @call={0x85, 0x0, 0x0, 0x64}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @ldst={0x1, 0x3, 0x6, 0x5, 0x7, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map={0x18, 0x4, 0x1, 0x0, r3}]}, &(0x7f0000000700)='GPL\x00', 0xfff, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001940)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001980)={0x4, 0x2, 0x5, 0xe48}, 0x10}, 0x78) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82434e3711dc40eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x10480}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa2, 0x200, 0x20, 0x1, 0x6, 0x7f, 0x70, 0x0, @perf_config_ext={0x4, 0x3ff}, 0x10800, 0xfffffffffffffffe, 0xff}, 0xffffffffffffffff, 0x20000003, 0xffffffffffffffff, 0xc382583cbbc2238d) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 14:11:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x6c}, {0x6}]}) 14:11:29 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)="230e7db14b0aa4cf82bc14365db925d03df4c0c6ca96fa78e6b1d9e1a26969e0024c6be9f927bee921b71bc2e7827164c3f40cf3b6ef334e55dfb818952618f7616b76e04c08092a06", 0x49}, {&(0x7f0000000240)="da260a15a72ce0c52dc8e35c884596b2ef447f9073d8f8e4d76e9114a5a92e5eabb925d9094af72534e0e80f32c39f479d2e6f9fc679135f610e6eba41716ab686ff2c59f5f5a8511000e86a0683bed72d21845b1643bc71b68cf8732e50f42721d87374dc38459f1f149c9e9d87024fa25ecb7f75b9a233c0d4c9c8a5152dd92a29c2b904dc77c4f87b45ad7d6afceda47c1301fcdab587f7326e604628c6d71ba312a7eea3f125dd034aebd1874155b0755a5eea2e", 0xb6}, {&(0x7f0000000300)="f3757a24a3ebc504497725dd5478e512c41d3dc743a4b0a80942868d9029d29195dba19c831329070f98d8be91b2919f61cab613545de0ce780d21f9c163b03b469a9489adcf4e1ead8c6a94640d6541f8d5b12542a7549f76efdc2fed404beca3c79b37769e3ba3060a9e65d3c182148ea00e351681060634d740ea2378464929520f", 0x83}, {&(0x7f00000003c0)="851612f88c0eed85d87bd2a16c76ebcf4b17986a9d3e6d3f4af44288c29956205c30b3cef9ea05aad2edd25070bb03a9220dfe9b02e360efda049947a92b812c9d2c6ba72c07fe98becae9ec54db853c33e6040c77ef26376eb898922e8ef51a54e869c2bbb8b74644d88ed8197612bcbd8ff3864ba6d7df01fe75702453b05dd6bf1a6ce2a672210c393ce6ea2843965f76b8fff03165fd9fa741c0b4bc58e397bcf93583efc35bcc6a5005bef0adcc69eb", 0xb2}, {&(0x7f00000000c0)="6e575bcd7ca9045e650800d8e23d3c98350e6fa5c41d8f54a7dad91a392bf7af781215596fe6", 0x26}, {&(0x7f0000000480)="3a79050ec5472dd0efb30be2e71cad4c115841a50de70debd0bcbaaad278c2c551d9688877989a34f7172f367c77a7efefc447ac2f0a5af885cdd1e085fda8c3a6a1a97221ad11ca1e326d12d89e11072f080fa1af4442d2e2e982407fe6f519ea6155db33d8a44ddb8623bbed", 0x6d}], 0x6, &(0x7f0000000580)=[{0xe0, 0x0, 0x200, "38a42dc5463cc233125e016c9877486fa00299b14dcd47766dc4d9ff7528fcd0d00107696a39de9602676383ec76ff169b130eac55ff00358a99e29c48a6e2e003048bff551cc088387204cca829f51aedee3d1eb9458713d0fa315ea54b52ffd9b14ce6b784e70dfd2a08c9607c39d0c695d6e6a75eb14d3c9b27c7629ff2983998b4f7929fdd63b151d504f1f7281e8d248f9b12eb220e504bd4befac244a0be89b9315f3a5f503ee6a59f9d625c1c75898b172331a7e09699915c98a85375d0100155be3de3f438999fbf05"}], 0xe0}, 0x4000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x12, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="2b5000000000000000000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f00000006c0)=@can, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000740)="f06889b373c2c8c522cf4d0dfcdf261e50dfdcc428195c2bf2dacd6fa51b189492535a9db09d6face36c8af8629befd2aafefb4567afdea94716cf2140bd0b138d47dc32054ac472c67a985e453f8fd9f22b6bdcb7a1e0350770cccd57e0113b8902c595b0622a0317e18dad1b7d33390d2ef0d68bb3e9a4ea24e0d8f2275ea37513da9349d1dfa9617bae41ebe986447d1ecbba1f419ae96ed9", 0x9a}, {&(0x7f0000000800)="c0f78ef2169663a1833a01909f69de42e1e77faaa71b43d33b9819c72c95a67c7966fdc9", 0x24}, {&(0x7f0000000840)="6454fdfa6adf0621d4ee9317fb14e51c2fcea0cc3d6c710525b8db2fd8770fece811b1d55e59f5930ea55d64700906668ecfccb3154d072d87c0e7e0e710b9fdb9397bd24e10d188a3536de60279df224da8b9e0f5584cc4b5ecceeb66fd0ee71e209e2afdd35fca17", 0x69}, {&(0x7f00000008c0)="3e047508af7abca119f54529096acaf7e24bad40873992c82b8895b5165aa86c68697ab4d753264a96816740d8b20a58a3bec7764b5dbb3f30d4a970fa1c274dfdbc1523961cfaa24b86818f46cdcb0081849cb5af8a2812a0baf4e2e05b9298810c1641f7ccbd56a87717c24f973e8644b2a8659cbb8940cb4fdc33092315134f7b4e08676d2b64f7ab8c581c619a2c07be78167531e1e36bc70547f26331eae5d7240d712db479343ba59bf7ba96f2c849508044f63040bed6", 0xba}, {&(0x7f0000000980)="1d4b7b0c3c2860c1ed02a9fd7ce71a22aab848877f5a523b4cca8ef8b50b90e6b9202240384ea0a259d7de2e6a855a13ba779f8ee30f79b4aa4061336a295dc60aaa0cce5a36a886dd268839c78a96ed02d4bdfb5e6674e5af8426c12bd0b9ff921035a4f8f7fcea9dccf7c63c6923d223f499d4f21ced779f18481ae38e6420fed15b388083f08fa788ae19fd444e8b13b1b9a1585ac5c005c9dd0fd67ee42b359f75fe7dc903658d3470296fdb35a0eb6e20df5e3e1b8cbb", 0xb9}, {&(0x7f0000000a40)="40d65c01df7131b2b08f5f067df190b1981c34141b5f9e161410fe6a927143468458a7d64f9aa85bf89404ca5ed6cb074ca0f76e5107a6fec06b6ddf51d716f5e37c91857eff131093046fc1dee09f19ed54cac9b0ab3d91a39fcae3fcef9348675b29fb0a2a62f0a3c22e8ed36691bb8e5b88094cb6ea4823a1b2f49f5442bd348c5949a7d173b373ff3e4754767ecea5704e15a23a8384dd471eb938b284e22f5a993b4a6745c702c5f543b2639974c858577ae772f8465df6b136666f1b0797c50c773f09f712b4146a95307f0ea1", 0xd0}], 0x6, &(0x7f0000000bc0)=[{0x88, 0x103, 0x4818, "c75cb74dceefbe17610a3f7ca7e3d355ff884ff52d82c0acbd503cf75660f8bf25f2904858d7895913156eb206d5053881ae0e0b3714ef7a26dabdc2bc21655b0917513b685c5b2b38a61b6535bdc9c8149e75a14f1b2df7ad448ff3717786fc2f805301e989b2150162399ca77f8e0da5cc29c30544c6b9"}, {0x70, 0x88, 0x7, "eddfc4fab9e0ab07380f61e63ed4bf778a9637312068b9385f70b7d159c0d54dec3b379bc26c3113e0a919887d63d08314df9a9abc04f344357894355574ae296c611d46bfad3e080bbce1b001c9497d43f493efc4215500420d415c4f7f"}, {0xb0, 0x88, 0xb5ac, "868df1d9c6eede97da222dc815d692b378cac36e4efbfcb7918eeeed7f37b50a4d0c0fb55f8c0bca4e248b47b9c4a3690ea30eff1a602bd17ab7a8a8ee09ef1c9d61e2f71585e12cc9a6478ab587fb20b9939da2acdf666f94726bb5824570d51faaa9952b03f509b5b5f1f9ace543459348ad3fd414164d99f6fa12d2c3639ae76132cf6cc121c9e7f1318e1e792078c06469a7ab9af4b7f45619ff1e"}, {0x90, 0x109, 0x0, "da0fc9de1699aa52a76b977c96c6253e9229b56c8497363bbf1ef9b8449ef3e1365b2dd91065b7bf0f6bfaf4550213f3ab2ec174b5221518ae23aa3e78da179eaee95f772205fb5029185cf245886d5683928750e3d3a89ffceaab07628bc78551d5d247f2395e4f01d212e73b809861910bda60741d8b556058e919d910"}], 0x238}, 0x80) 14:11:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30}, {0x6}]}) 14:11:29 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000cd59fb478757cebdf00000000000631114663b0000779500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:11:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d67514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb5679ad11f1df058e2ad50c762d9943dde0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e7813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b19ca76e7fdf29766d96e4c2f57ba917f0abd5253e87fbe5b86a4b9151c316df3925d86899ab3e2036f4866e277d82829165922f8aeb4ea2b9db2dbb6ac24db009bd2270366b157d4019545e00028d09608ef2e186fd216ce84d913813e1be50f5b6b98d5dab8d5fe3dc100d8b6cf41c29b550f45d68a627db8335fd97bd633694ebb6173d9474c50c0360daa387ba5da3e092463a4c08f2c686ca2ab5f8c62353b8f2c81700000000297c8161e5c939855271fe95df690f658da38153646e660e9ba212986cd3628a500d14d378d4af508f428ecb0e85322f9fd317b29ec23b193b1ded2824dc90eeea4c56a676609d2f9e6b925cc413cde5414869387f23a309fe29c7e63101fec34b22aae77bd5df5f6181f5b4639119fc5446893479e7907e2eedfd728963537e45e01cd99203cc1f28fb06e5f5a6c96ef934e88caa73114373bf887ee1826158abf0111a1293c4a1814a6f8bb023ef377d32523ac0d796b34c4ee7378dfb5e74c9a6a6f69e427b2c623560254ddf69f3de542c97b9b3ec2e21b61a50884f08934660079481c8cb6e44c41d634a216c69b8c0f1948721d72f8c3436e0040984c8db16acd7bb6b8d08bc86251258"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000003ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005040)=[{0x0}, {&(0x7f0000003fc0)=""/128, 0x80}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f00000050c0)={0xf, 0x401, 0x1, 0x4, 0x18, r5, 0x6, '\x00', r6, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x40) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r7}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000cc0)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r7, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x13, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@map={0x18, 0x8}, @generic={0x1f, 0x6, 0x8, 0x4, 0x9}, @map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000400)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0xc, '\x00', r6, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000bc0)={0x3, 0xa, 0xfffff3d7, 0x80}, 0x10, r8}, 0x78) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x2, {{0x40, 0x2}, 0x1}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)="e353cbf34ee70660e2f9f2b32017bf317654c8179a93d0fc350297d7fa5647360a28235c590c54c217c499ab22fb079f41244e25b0421278b3e2aee4321a30d6c1db3e412b4d237c72e2a9d9064770fa7cce671c6f7f36f13716416b89d7f9fc7708adc1bb4d790b45887d944b5d9013ad0c374d1c11c61d190758b9", 0x7c}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f00000000c0)="eeeb1298453c0aa47271b59060d3cf984bccbdb4a855", 0x16}], 0x3, &(0x7f0000000540)=[{0x40, 0x6, 0x5, "e831e82259cba25414b8615fedc1663c0924318f784e48cc8a9780796f5481f14cf94eb579e76d260129ca6b"}, {0xe0, 0x1, 0xfff, "81b4c7fa343a255df9e44629aad4444c05635aeb0f409558a76556112501d06c1f00c21d09d13715de820e10af2d3fdf5016a2b893f1d78b3b19d9150cd98434f05d2af95a39fa8b50016ffe8ba94f89c5a743a1d22a821f8edd095e6e3631f2e93f93a66083c58909f5719c1cdadd7990e1b6ff60ee544c54c8d2c875e4a0eb1c5554fd229e2d01de90dca49e0697a937e28a5a9b11dffc17452f07202f87d93a9a46b1892ee3f06028bad1fe83b6071ac2f019520d288f119fa28f5bdabaafa1629cbb0a41f73cf9"}, {0x98, 0x116, 0xff, "625f46dde3e616a4e8016cd7e83e8dcc86954c94ba4059f045d0b0cc187048ebf52b7771cf4233bf909310d6baa7006a5ba0701d756489af8e143e505bea24347386a67545fb60003c8dc8c403d964ba13f4ce9a940b04861bf1b1befcb0ce57e2756e0f18738cb2a36a2930ddc4c0bd6aa65bfad139badfe80ce9633b387671fc19d6cad7c6"}], 0x1b8}, 0x20000000) 14:11:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x74}, {0x6}]}) 14:11:29 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x34}, {0x6}]}) 14:11:29 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x862, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb08b9cca7480ef426000000e3bd6efb440009000e000a000f0000003f8000001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0xffffffff, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)="18af2260f5813d7a7f5c2ac1f56e3733d467fa5ff8e22129438486c1b74f5fe3", 0x20}, {&(0x7f00000002c0)="ef44e9ebc368074da1ba8ef1ac5fc36dacb23ab94be36094d41d21f69adf79aa979ed2402da8aea9e3365ce7ef3e15fb1e4889b88c24c97385b88df434d3d78071cc197cdfc55b787999e39e0d1484ed25df61d946c2185f935eb6f063697e9ca0b71855b836dc556e5d01581adf539215b6df7552e677ee82bd8376ff29d7e89db1c0a2a670831854073fb74e2bc4e1bdd2e22893bd7d12a57533de5494b149745515863b0c6b66314ae807fd12cca5993ba42b491c36f68755244c1a275f89b66e01045195c04aa58aa7fcee0940b9f44983afe66eda0d7ad6c592", 0xdc}, {&(0x7f0000000080)="45696c19ebb6e5b84c2c762d52c02ae4e2071b68c8c416f699d0f3378473917a7d326fc18726b56c", 0x28}], 0x3, &(0x7f0000000a40)=[{0xe8, 0x6, 0x4c599808, "9ceda59adab516d838b0cdc3b6c137149102454b31b8d39a184dd3ebd8c689d2e8bbe2bd078affbf601a72e6b5e6e479dba9b5811364157e51b6df071d56e01e98d7bfa8aaab2484c19cecedc316efdd1f1437036fbd1e8e725dc30f6ab7df93d0fd8effc61fcc9acf237c457252c08fbca004b99e9fde192519b8804e7c709d34471b92ba0fcc0a68dee3ab22e3caa2733aeef4ae638865453f7efa7f63a7710e4f237a87aeb8110bad2a0e54538ea7975d199249570f97762f64784ccb7f0a702b73be4e0fc2865836fe64ff86523c05129dd0da94c8"}, {0xd8, 0x103, 0x80, "025b61a8aa9ff2a483961e113d2127c1f5742e3df77d3a2823d9dac2706c83ec2d37a08a77101f3fb189d8c51c203437053849c76b74e933a26d29fb918365d26563e1db338f998a4d6a35f14ac857f216926e855eb7423b9b293a6ca6302b09991cdd4004c33aa2a37024a482d826c86c086e18d037fc5637d123aac4fb400ad1e2e968b62d459df0b81860c3c92ce47d3ddc1bebe358db09693cc546484a95398c75204fe53e959746a9f4ea3718e629a73efcf1e9cab82a6d3a425e01292a515e2cff281d5d95"}], 0x1c0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000500)=@rc={0x1f, @none}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/128, 0x80}, {0x0}, {&(0x7f0000000700)=""/162, 0xa2}, {&(0x7f00000007c0)=""/83, 0x53}, {&(0x7f0000000840)=""/137, 0x89}, {&(0x7f0000000900)=""/178, 0xb2}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x7}, 0x40012062) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) 14:11:29 executing program 2: socket$kcm(0xa, 0x2, 0x73) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0xd, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000180)=@ll={0x11, 0xf5, 0x0, 0x1, 0x2, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}}, 0x80, 0x0}, 0x0) 14:11:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6}]}) [ 431.421796][T30561] validate_nla: 2 callbacks suppressed [ 431.421817][T30561] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 14:11:30 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:30 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 431.749184][T30561] team0: Port device team_slave_0 removed [ 431.802340][T30561] bond0: (slave team_slave_0): Enslaving as an active interface with an up link 14:11:30 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x20000000, 0x82, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800, 0x9, 0x0, 0x0, 0x4, 0xc31, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x7, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000090c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000009040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @local}}}], 0x40}, 0x0) r3 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r3, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000013c0)=']//:*@\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x7) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) sendmsg$kcm(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=ANY=[], 0x2e0}, 0x0) close(r2) 14:11:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, 0xb69b2507, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002780)={0x3}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x5, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x0, 0x1, 0x4, 0x9, 0x2, 0x15}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x96}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}, @ldst={0x0, 0x3, 0x6, 0xd, 0x5, 0xfffffffffffffff0, 0x10}]}, &(0x7f0000000700)='syzkaller\x00', 0x642b, 0x7, &(0x7f00000007c0)=""/7, 0x40f00, 0x12, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000000800)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0xf, 0x1f, 0x1}, 0x10, 0x0, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, 0xffffffffffffffff}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r5}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x34, &(0x7f0000000280)=""/52, 0x41000, 0x1e, '\x00', 0x0, 0x21, r5, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x56}, 0x10, r6}, 0x78) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x7, 0x9, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x81}, [@map={0x18, 0x3, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map={0x18, 0x8, 0x1, 0x0, r2}]}, &(0x7f0000000080)='syzkaller\x00', 0x92, 0x78, &(0x7f0000000400)=""/120, 0x41100, 0x7, '\x00', 0x0, 0x12, r4, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0xffff, 0x5}, 0x10, r6, r7}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) openat$cgroup_ro(r4, &(0x7f0000000600)='memory.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4050000000000007110180000000000a400000000000000950000000000000092227d99f8b239f0f2658cde3c5e06e4b24bfe4a9f0a59bbc514270742e6441deda0cc1499924674db1dd4b7f4667f3e7ab89a2467fa1480db3677597ec093ce262063e540f2e6c72e37608e30d88dd5e988257527"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 14:11:30 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}) 14:11:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x84}, {0x6}]}) 14:11:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001140)="70c05c60dc9c305892f85afca87a5aae3a692f35708623cc957599b6f35edf9dc38b3e70c32015d79f577b2a16c13757f5008759a778104aa7e187c5cfeb80bc3abfd42b14a4160000000000000005a1c2e826fe64b5ba3ebc311d99535cdd2ff609b91f762b2cf19342e0b7bbc07412684e2c74599256d234f3d218aed3daf40d92", 0x82}], 0x1, 0x0, 0x0, 0xf02}, 0x7ffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) sendmsg$kcm(r2, &(0x7f0000000a40)={&(0x7f0000000380)=@qipcrtr={0x2a, 0x0, 0x1}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000400)="0ca6177a3a258a84d73ffa265394d85142ef0dcedfc01c669a79e7c582e851f9f7dd472ba01d6ff6c70cb08b11a6a59b46a664b443e38515b6d27cc5922772899fd303c1d174a065bd4754ca0812b0ecea", 0x51}, {0x0}, {&(0x7f0000000480)="826b2d998be591162956053db38f86c08d727639b91d2d71daea8cb68f011b595453c43d36964ebb81933d5e524d93a8501d8112feed70e39f167c1f37db6cc8a19677957dee0d2782972ce4e8bbea010972c051189aca5e49cb119c0202d079ead018d81c2c18d582525cf0c040bddf63c83be433800e09a0c9b193a1d6d109960b999c5ac3ddf7bbbc3b35b7e950c55c58d83b5a7c8a2d20d377ee40adda014c8be4a30d3f67698e2cdee42aeb40ef026e47a9dc172cc5", 0xb8}, {&(0x7f0000000580)="3930f8b0239c7d21568e2cf445a8a1375c89fa469d2f2ed8b33d2bd24c74120c1c65aff5d39f70ba8d8276c3e131da2aa706c1631b65be2ba6fe7e298e1941fb7ada8896c17d4965e5cc55e3bd6ff64a48ab0f18d350622ceb2fb914806223fa5a1aee74578c82836340c0fe928fbf369d3ac7980107005d", 0x78}, {&(0x7f0000000740)="7f6507b4f0282714e1a461886c68b1bf77aed14e13b52f7b8f57692bb0bc22bb0900"/45, 0x2d}, {&(0x7f0000000780)="bf9e6e878fed26dae660b7d5e21e2852ddc289edf2", 0x15}, {&(0x7f00000007c0)="fe0c666b92fd8f4516653704f1ed49f75efdf961b7eb89d493fa7025bdc3a77330f52902ec8c7e", 0x27}, {&(0x7f0000000600)="915b396a8608000d65fdf4d4e5524c1e18ac7a10e6d744e3cfa67aacf3bc75425c83ffcdea5be233", 0x28}], 0x8, &(0x7f0000003a00)=[{0xe8, 0x117, 0x6, "9295971007718d02f648a811439d2915a711f6908248181339d1be802a027f8a23a7c6da1034e66e89d9fbd6f3349a5010e835115ee3937214cf7c42c41489e6b0a7c6cbcb25e5976d7e165ac1f6f53329cd27c0015556fd6361b01d2c4219f7f919fffe6378bed6076aea97b64cb8e21811608f551002d266284b71eee68cf7b74022d154570db092329f6f66f9e818922d29dca5cb283d041e36053baa7e06e13c4bebe0f253722ef4481c6039149f7ee547bc09b5086dc3a54646e7296435a2b4261490cda368b3cbad410bca095dea6944"}, {0x130, 0x11, 0x8, "1e08aee3362a6f23ab7fbbd77cffec7f264e0d6eafb0058c172096019e5c42f910164b9bca122e06a72e67d6e6d67e3d7ad8a554a19e37dab8042ed8c8513e1cdc3a83d98508b24dbd7dcffc89961ad8033eda07add4e7ad8723bb985ede089f19ccbafab8ad546da214303ae20a382d2fe3baa87d76679e855527d17c5802d33647d51cb296fd20cac71eff473d29230e344f7d8bcd7dd64b67139e59fab28c430e0884888d0917c992dd09997dff65c529f761f8d66a14270790ebddba9fe76723c30cf5e3bad208a749b3bd3a1f7505d2562fd721b510f8f0ed4f88cf122f72a7d10a6c2efcee8fa8618a7ce6a2461b9fae4d3434c4c20790b23304f010d46831bf3c488fa37240cdeb7153b55262f84f1dcb9e7f5fd514c469370b55"}], 0x218}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000001000)="8380a45a996da8dad775e545a56dcefc61d248404cef6b23b473d8643cfa164b3671e2e058d64ec516af7cfe01596c0cf583a7e8589a3bc86e413686", 0x3c}], 0x1, &(0x7f0000001500)=[{0x80, 0x115, 0x67a, "1bbfd3fa88733c2e62380ca60f35bbee15762838103375f14e25ffc0bb86bb9e9703b99650050078e9fee80a279cfc4f3f21ac065ff681b81565bfe12633c88d3c4ee4c79143b18500bea7ffcd7fe8cef18f4df1465c570535d4ac7a2437c1758f1cc7b823cbf008cbe830a5"}, {0x78, 0x112, 0x3f, "9837557b1453fa3f99c80667d71c367ea74f9b20749541156c784c11f9a725aaa9bd0f67dcd10529a4cde44a73944a38dd53ea25c9df220a0931cc57a4ab7b92f92a50d457ef478f638fadff66e6fddfa861927986004d3f507f0045a65609e6fa2d530ca43e4a1b"}, {0x30, 0x109, 0x4, "2603e9367626a41c01b1680c6af86f83d70ed9e404dc8ba864"}, {0xf0, 0x0, 0x4, "4cc76898edcf70a5ad8c867bb4d809e149a1bcc1514a8cbc7693e48eeb3b49d1ef7e6db906bcb67d78ddda349ff97feadc0bc5bcf949f9ea23407130ba0c62180964c4a34923f81039e7ff8ebbedd78c5e84491cbfa851f85c08e3d4c7c8a4432c9633a0e5e8878146c1e67f0dfb0304fb4981b43ddbae116c8ea63de97b974604f258d5a23f7efa7b4ffcc8e161ea2201f97d4c6cff27e3bcbc2b9bc13009a86a069b790bdfa739d13ffa76c36d248c91a70049dde2c2413636824e0aa97b581bf72a37a030ce313f5ece2ac5fb2e04ade5e70d4300773a95"}], 0x218}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001380)={r3}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000008c0)="69844b74358127aa15e96197fc6e20a32a6e90b8717c4bfecb5ed13c129b8976c83b887712caf38cf75dd53c30d37404559d00a3ae2d9a615527e795336e4c9ee203863a5cc37cefcbe46b59f0d1901ecf5d323c34ea354bad15d2dd600965563348684054d2651fd042ec2042f5725a15f28aa326d8c00251c5bab44dfee6677eb1b6427b90608ecb4a073de9051ed1aee7ca009b0dee72e324736db1cd67103bea705caaa0f8df27f829c8c189033a10bf7f", 0xb3}, {&(0x7f0000000980)="96be5fd4409ac32d9b32280817816a51abeb294bbe7076b97333df9ff26d5579526db83532a62e4a9aa65ffe91f2e4b5166bf1f0a4fb2fc35e8450678092b502cb169589a6c7fc9c97280535191eafdd2d20c48561727928b52ef3a97e224eec11f426eefc6baab1d73086dfe515161425ade0087bac9c5ade4f83880a7f0ea038132f6d6d52c1b8ecca963373161dbb16395e77ce3ceb6844bf448522b020c3d3af846aafa1fdb6d1c6cff410ece3", 0xaf}, {&(0x7f0000001a00)="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", 0xf00}, {&(0x7f0000000a80)="6f2d42eea6a80e17bac04dbd9729ffbed095ef191dc1fcb55a62cdb26373482e4ba773e8431bc121e1519d78edf47c2de28af5f21c4f12c2fc6b518def0961e78bfafd1e0b57c5a45ccfb86efaacf6001b000c087579adc1094f208efedab6ab6d709cf5f53ea191fc82993552e536455a192b34a3c2ef39297e3f2b3940176f314db123a890e5ed836750d8a292c293d986396d7216cf64457fcef8720984a276be72c4ceeb90f8a0db72fe6aa2b8e3dce2f4ee0f316dffcfee3ccfe1e8ff5d49ec10e622e03cc945b2c8e44f603242188214bc2a91b140e63667e8", 0xdc}, {&(0x7f0000000640)="d160c659ce4935a481ad1df54c6e7a1cefa22847b177fd706384a6347cfed60dada01acc1aedb2a7a8694d095ee8821206", 0x31}, {&(0x7f00000006c0)="3e04a35518cda6a2eb14e71c8d4dd03396d287cb67716c48f9cdd63dfc4f6d2ed4266b3b8685736452d5c2530d44e23a5635b1e2bb835da6ddb7cd399c56ce3acdeaff9376f6d1d247cf416309167b5f43b0a1b178da2067d16444ea909dcafd13a2d264b58d17507b77d9152b8a50e5f0c07050a36c9002c8", 0x79}, {&(0x7f0000001200)="ab24397f1813371c282693e2", 0xc}, {&(0x7f0000001240)="6af134676decfc356fb2437fa140908da8fabeba7fe2d7c1ca322f20fef334070cd1e2081aa9b86a4c5ce10041e991e64d8cf23227e643b61ff634e52c", 0x3d}, {&(0x7f0000001280)="100915bef8a1387010e3ef1c3d9ad3b67cfeed5ce04d9918dcbc32a70c5e5233fdae86c13e9512504d5f87c397643929b3bd486d9f1c10ed2db934a5efd14f24c8c08b5f613a5d89c19eaffb3888cc4ff7ec2b19", 0x54}], 0x9, &(0x7f0000003c40)=ANY=[@ANYBLOB="7800000000000000ff000000020000004e4d54f905c96d0389399df359c1acf3834fc3beb4fe931f7f97deb20c80b1c74adacdc36f575a917ead776e276c99e34e2e4d5f571a8d450d3a40a6c8d2289cbe828cf7198ea02e066187c1e732462434ad3d0a050c404da50c05a15c611d11d4767552f53261c968000000000000001100000007000000206c97d66098d5a161419fd4fd4a6cc3bb5321a547f1c451da165a038ab7a7b01d009a73fc405e68a584c57e98c2a0e7d816364d5e84f6ad60de050ad9e3b82ae84f023af40f13072f1a94725228adbb7c840faa00000000a00000000000000000000000000100006971ce00349e05947d04ad560bdba7d2ca44ac73363710b3412f63f446062a8f3d6ff406f8b57f42023fd3334c0ebe1ef2d1ee3777f25292a850e2c9298121bc4800f006e46d0f92af17a11bcafb14114e9d74606b04bb758d1c549e7c34607f2cb2f9b5b173bdb251395e6196182279688d76c64cdaf731e2d08cb6568fec97241fb9ac68276774d39d904b78c5000080000000000000000100000008000000dbf1325501f884d2e0180ad90f43be0127b4b42f6676e4f835086cf51f4da9bcc3417e6919af1350121b8564beca05817c6cc89ae9c01e90dde5326cd4c29a2cb1da28462cb5b8ec55533326f087cba7255d4f688f7f183528be5cb0db0edc2df4e1c23cdb9f310ba4fe00000000000010100000000000007a0100002b8b00003ad015c87823a0a0a081a9c2a366e5d9ac6be979b96b7d6500c3014bdbefd678b3228eb6a9b59bd6bf0b8a8e462d1f7da7e458bffa53688c8a64f91c60cd534251c819f5ea62e575938804fe3601cf175f81092b9385dcf706c8253f0159ae73c28901cd261aeb05b7796e1bc078ef4e079c3e1fa5dd40902ae827aff26005672d5e3c3ffb15b5ebd44522c602969d1de871e41c4bd251964f6f656b8df1356f4e214e12b4a531578c23f93a2d87e9638c14a605d8319f472caa2693c52b8c42639e0fbe1e6d5c9ae3f272b979cf9fce0e3c4558002b2e3f4b8594f0029e4fee54f4d710b7d338a1bf95bc48b0b03d6f93b5c0864763ec5fc5a4df0627061dee1c8756c88ba5f62f3dc48a9cac6d8c1bddb868d86860fcb6d7eee02eb951c6c4deb744cd31e453cc673bb8105fe21ff10c2574b76365311fe56ab45327030d9575be328f0388bdd95b8a999722f44b58f0a8d4f59dbd2d2a2206bf3b0fe942fe7b54c7105622c24ceb0dc0dabe445bed46f5d5108c450cbdf3eff0606e52214031d0c5c0406126418130cd94be84101c08482937540d64535f34b027827723ba7186ee187dcbff04900420d9293f426fcdafb766352d0dbecd5270d3315f69b9ef426a35f26f56be01d8124dfa39ff2ad3af17d5b14b8da3298a747178e4aa9100633d3edcd30b464a2494d8ae03c504a3845a4df4af09410db4b40af26d737eedfdcf7099977608e42a63a90ba88389b7b77017e71b83dc61a9984c36d81f674324e41d9055b54fe9fdde67fa607723134746c4e5670c12281716c7ed8dd600b3490014e96f0930b7facd6996ffc6926187a22769312c0f67b7d89e7fba0c852805704d193d5dceabcbc962a1f4c3ef6965cd817cd388c310ec599bca95bc0f10d5ab7fc5271bccc87d7d378d8ecfc9248990c014a8eeb0a67a4d2d6211c762e5223d139a3983f7db6432e628518f833b7bb1829d5ac306ccb5432233d7b205f9cf7dde812033c5373b6e304c21ad70562d610f13320081a7298704ad00a12c890fef13ea663661e84c51770715019303e58089102e695bb6af9022c9e4731425f2960ff32507956507efe291dbd0ff939403a7a139dfa2b20abd28d598ebe728c6768e8443b666ced463121bd6a72da3897ce549bf9401d57dede006494fcc17eb57fe981e09cca7e560c7772afc6ab674d04878d6cecfd49600f470b3ede219b7502dcc606169d4f253840c0bd5ea3e90ddd9ad15f4351d4f8dd708224cbc8cfa82b467b8a2a7ad32ff65d09feffec8fdb87ee986c834848c0fe4f74700367dd1a43b9b24458756199349d282493b3f127021ad6ab80aba17dad1c863a5fe9a9f41d06a4f0ad7028b08a460a6ae138d8f02668ec5f9facfdf09238ddd27b4289cdc836d62de411ceea271397481b274be4689be1ca974b24743214fba96959973d3ee2acf7219f2fdfd541032fa60d789b9610c5440c4dc59cb3c00e4d4e8d5da2141fa95bf42fdcaf517f8f8e17bc457b862d4c2be963f9b27da12e7e0f14345dbf6c668a890e0c759b95506df266a569ce4cc4ef35072394cada15f17815cef5234eba8ea6886e46adfefdeb3f9373f0c9df33da5998ace37494f3cc2136d3f8a5d2c72190e22ae6e2f6265de329bf4f4e22c8bcce9ed71186672e2c807148fea4654ea3a123599757fee27fefb04e667a3012d85cc297d83c575e1ea0013de912a2e3292bd7a0730182f960f71c7fd4136935ab86fa48408db2d23b69b6c295a97229dd5cea64ea5313e5aa6a4315f296a52368668d2dc024a5fea1afb00a12058502002ccb2c6e27da44695fac8809c257dae0beecb749b581716ffafa4f9bc9114114d1042badaec70c61b1057062743ef6bebeda40ddd28177a9f0a02c905b803004cce8653868e1073cf2c42bb4cf1f85a6b8d116ad88823b1bc8fb68c1f8157e073e5e6812c72b537c41e713e812e04eb3c7e6b2d86a3bf9290beb76014a589da656b0f19537b00b60b96767f5b60045a16a38b08f82dc3643b5c207bfb3e31f8a3b841ec0a366f3e89ae67dc071443bfa0aee37d114b4ebdfc95fbf9561b91e4473d1d574ae326dfb6dd5497eb9cff1971239b54b4460d64539c6b49b2a9ef350166a2a4e9d87b1c227f9925a7431debd25a5ab6339c783f912376d69ac48f98bddd826626d4cda8255a0e70c3cdc2092bbce48d97aae14a45309a0a50067487850d7ad319fbfec62a8d3fa65f4b560d0c1cf04bde68c9977b43ad348994a5cdad08db467e179c992c14c94852c4d5ad75fe16c974d548a70969a016a977c16a735e8b0ebee9bb1d11931870ee2cd598a44f3fb2be2d56891f9af993807cc3c42e394860457f9ca10d55166fc2e9674771a50737f36562e0a74fdb517621c8aceaf76be5c14e34a28aa5b2bd5fc78c254915f18e9aab9686c0e69eba10f3bd2d2727924d5d012a01b734d408974a58367ed10c54a09a20e9f2231cdef4170f192793d20a8317abeb97ee91602cde34bc1fefd8bb0a5cba4423370f846bfc2d57fd08f4d03622c3773a950ade7a9cf21465e75b052c9bb6b8a939389f9af20054c6a6c414a5c741f1bb0c2edb40e3612df72a9282af461fb56297b6993e81e92cdbb36b957d1cc2703cada3d69fdccb2c367fe5dd91de01b7952cb6e9a0a3e5d87928c5f846181cdea2d1e93c3b2626cc593fd22667d600bbccb58cd501023e22a8e70a199e2ef3729a77a020d66fe7afb1d24726895cf93bab0f1f1b27c5eab416f7f88ec504d9320dea0a28436e7c343afc61446de4fff0324032d23eb7a8ff0b30961d004fe25aa431241fe815defaac925518f11c93bbc06e94e9ad2025bea28dea5fd0a0502c8069a3773ff97125bcb29ccb37477be647b86a8c9e5ed7d87461dbe2f27a9a44f28b131799aebbce06e085051c84e0bf0c368e60fa0b803951823ea5e9537a6c95fdd0243c9a0b717862fa785bb32b958d2756e1852f1962949ace7b5b2b624135fbbc5ddc5c6cbb8636699f32f65c5393b2833e9b2e748909b8e60bb25e862711a39d7ab762ac10945db55ca32762610f3cdb3943b0aeabd9d313eb22669c2a480c5ceb20570f4a3f9832e88268c66eb547ab29b47c3c95b78c18c53d25f6264f755872e0fd7260b22cc06c630eabe29cad00b4a004d9ef92c50b1f2d280111844ab120fe134f4d4f4ae2554a57d902f49dc4a49cabda0c34f5f39a978dbda010d6de56d315689663aac5dec53381f87c5bbb1a9908a55c1c27985d196cea068cfa75ca542a8321ed65ef758e88005b2a9145240a57dce3f5982ee207468697f3e13e26ab5242fe0a5dd7de40093c6d90b1dcc53c4bb333054a6c7e90069ec3831e8782c0baeb39526c56d9d7156f86784480275a0ab46ac37b079fc1f66d96e99e90fedb8d42d97064be12a6681630614a42376cb7b773b659725b24e5181e6e3e181c1da4dda6d66c55c231421bffc1ffa59b6d0984ebfdaa2eb00544d8021b591e4a0680a872149c6aa9a33fdd8b52065ef9dac6d0322f65eb72f62de3cec71120b2223c35f734596381843ec9737995be9b13835a8bdf7b1c7cf791c869b02ff2061cbdc97e8e5b388be29e668ee28684fe88153ddf587e6c0542195c1c47beccb381fc298e518483f0c470e2a58d4fb12d3ae95189764ab11fff9a01460688cbec46d011e58cf5bda77f9035bcd634281bbeae7170e6a116a4c60cede67beeab26e09892609a2d4f4853725a62118c5b19d615d8ba4a49812324a1b57acd78ff8a095bc6945cae0aa76521d5ac2e326f7ed278292fd5b1d1cd0e507aa646c41f9d4b36077141a5e7b0ee948351fa7d5c82f7d9c50b21664a60a661986cb49f97b9787a09b22bfba71c082a67ef2ef080155cc2d66a493ed4c82ee7e2fc8a8fbf2dec8972aa0542500ed893582bda24fd4009318675906742e6e94aad7fbb24be731750191218f74059a2edb718de09a1d2038f1d7baa4fc89c998e80023ce33b24026205d0a5639d992d442ae167f8decac6d04979d834d9ce479e73d74352f44dd914f6857e69e449acbc3b121ce4df9e01ae67749052d383db0189b118914ec123640a8e987eff2f10b01279e0f0b8ff5064b97fc58aa3ddd054ce85f456b06671b2f9ce53792c886aaa39a95c0b9eaadd4c5ad0f2338c4ab0a28e655d0af7abca86ab2f7a423062d4ad13fec5ce47e057376f59de977ebfc65d1afc957ba5b78cab44898628060b5613f8810a459d7246bb547916e90d4e851e5bc83a7127eccd13368dc3bc99f8ae4706513aa2abdcd2ca3048165b048250f492192b80bf6a4a8e1c841fbe17472ac24cc9d8da6fc4f3c0c32dae83a0e49980780a1e3d02b798d87ba6f3cf564d1d86dc3487272016ead295343591d694c71112f1f387aa0107fcc77ed33cb55d0c1012ec6c01ed08d133a0d5009ae6dbdb7526eb420eeafb5cca2cf6d0c8ddb52141906c389c8fd7d76144630c048341486dcd5938ada439fc7af20a04497b684eb3f95bd5a583ea4fc23c6f1905982b226cf03f3227f7e47bef32e7c5b0db0cdae65e64998626b6593bf691d190e6f66ec1938eec70f42778ea970a872edfd13221c02b88f1947ccc65668fd2074c2aad0c8ec5f909d0a7ce0d4fb0272090736f5acb89faa9f0f965f7430c3f9589a84929ed4c165a40f713da3c71edfe0cf216d4458d978702b74410993eeb691ebda9c32f01687093e73ffc73ee2856a0a90f006fa7fa9f525f7a6f43c5e4c8988534008366c347540c9f5d7d9b76869fae27203ded15f0c8b4338e7157e515229ea7ba90cd112b740558ea46b9cc41f489c9928e05f5e4e1ed8a7a46d74598657644a243cc4f73c19139dc31e9c7aa9eb186734f345217786b0a45f4cb3edd17c206c18a3dadc9f25cff4547bbd9fd4f45e85d7e0d2311c6f993e363c2399933b60d649777f5e7484a1b64ca8f10d0c0f7a7803b747fa570458b31695d952a0caf2500a6b4823957052fc534b908fe8fb6d5e6b6ead197b4aef429de42e4b46a4115fdc02893f254ba801026bd4e70f75d555c27b21b5d3b982e83331b096cbdd35031d1da083d3f8e63889a1f66f17575d1a144394606e2daa2947689d836a525c86ac8a919228c2073b0fd06817ec147cc3b51be096e2327d7d0a593f77a08f0a2b939686dd55b124250129116fc5c4d61f48368a881ef68c61c18f53c6d268d09419cad42f89c7ac606203aa69ce582fd21d6cbf46f89ac64cf10667a9d3e66c2996542bcfc187f68d2c4c707f43b24d3ca75fe9b1d18aef73f9bd1c3909f1a4855bfd92abb0e49c11b0d0c23c4c0d9338b174f55f79ed0d01484bf1fab5fc8d6939312096474da732224df6cc07e3c6da610925a631f5c7c590523a7c86b354dbfa02ab222c525e812c97c2f9d2611a3f2bfc14527736259aebaa8aef676a2f74e3566651fe9eb14230f85b482c68eba49e83deff4115c59cc9dba0bf4c9176d26b21c23825f673e4317aeb1e8f2459eaa68a9148093f3c352091cf117b6bd3d9b0b260a70ba8867184965370113419391036d1fc5e747d1f0708ca023db8efdfb35ba051090f5ecd83b682f65390b414cdc16358e78e9974c955716ea09cb04023f21198280879912497c2909e16a86ec1a4c6586ff867b3284b14b0dda2aa9dc2a93e3de63e6c022b4a02aadd758e78a4a48a2bd49143fa5fdfb979d0a971ecbf08d93f73a6a1f44d516f9fbdc4990803244997cb4a92c8a9a8fe9b2b4497b4bbdd3991bed5c09454c6222ec10260e4b100000000000000018010000ad0c00006800000000000000140100000900000041f604c412c006b2c80e2c0ee65a5e6ab9935510e5ec2323e5559863f09bc5de9224a3e9d12883206bb569f10a394a39d6f7c6a2dbc635295314aabe1240bb87b5a7c49c023e740bad93697c66976da3c454e294bb352e00f800000000000000ff0000003c07000029bdfbf5ef71aa8ba755ca3cf2bb160bc3dbc3e377f102dea0562202b9d8b5cac7e7104d82c386ee55d43e9108367053f9af756101f50aee1fc068f4508e96f49b206b40a63977f4d761cc8e41121c6647c6cc9555b0d852e45af756374177c19dbe453ebbb0738bb4ce065e8fcd827ac80b43c32dbe980732e1f66529a219f8bc767b506f87e2a7b2cae59ca41710f3c207597ccd2439a1215961ef5606fc86cfeb3474628c7b6c6d7a8fffdc0015af23da979a46db179183c1ce808f9900158f225aca3478b0fb834c171fe4b6cb6c54067542c096678bb730215c02522763c9ec6a27e8145ad1c80000000000000088000000ffffffff4908645a49f0783fcbcfadf08eedc93bf3b8412a21a80c942deb0f930d53a06dfefe08796d4c20068271941a740bd5c9cc818425ab59a9cdf6a9dd3c57db6d6d72673b4306646f14d0d566915864dd2eb9cf2a1e6775603f8884cd4ea4caaa4181a0520718726be666cacdf143eb8e5861cb69c2477dddcaf60b3c6818a70bf78b5c32912fde79241e07b85c29e9dbee27d2e61f577b026bc00a988a07504541beca1befe3c616c7f6ea359807ec519e9a00"/5197], 0x1448}, 0x20000080) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)="30aa43e0bd43e88936dd213c64569708c9b27857d7f18cb5ae591755420adc35a66e6cd3336e9dc7f4fb278c56e434084fd8fbb21abb2e720d18c934e73b05fa8b2507ad8a15c67511c72c9f1239d9f9bc4a3162c5d6ebc4ce3aa270f621c8dfecc7f86ebe224a02922455b0c4ac9bdce912cc3246a0d4371f34d09ca05b56ce20", 0x81}], 0x1, &(0x7f0000000300)}, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80044002, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) close(0xffffffffffffffff) r4 = socket$kcm(0x10, 0x2, 0x4) recvmsg(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000b80)=""/105, 0x69}, {&(0x7f0000000c00)=""/78, 0x4e}, {&(0x7f0000000c80)=""/41, 0x29}, {&(0x7f0000000cc0)=""/158, 0x9e}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/31, 0x1f}, {&(0x7f0000000dc0)=""/104, 0x68}], 0x7, &(0x7f0000000ec0)=""/138, 0x8a}, 0x121) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef5680277bec00123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 14:11:30 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) recvmsg(r0, &(0x7f00000065c0)={&(0x7f00000052c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005580)=[{&(0x7f0000005340)=""/178, 0xb2}, {&(0x7f0000005400)=""/84, 0x54}, {&(0x7f0000005480)=""/32, 0x20}, {&(0x7f00000054c0)=""/176, 0xb0}], 0x4, &(0x7f00000055c0)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000004c9ec476d59f08d8a3d63c7b0811000000611184000000000046000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 14:11:30 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3c}, {0x6}]}) 14:11:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x7fff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800, 0x4a, 0x0, 0x3, 0x2d04, 0x0, 0x8, 0x0, @perf_bp={0x0}}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) gettid() perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000003c0)="b8e45a7a7995c99cdaab01fd3bae6f3220bb19000000000000000019575cd8e0aff6f65d60324ae3e5e814db94a1b26f38614bd83abd6100000000000000000000000000000000000000007308c55b793aacf974ac477be190f99c9942c40b879b14307686202179cc524e8a53ce8bab78c724db656a4c36b22a1cb46ebf84650d", 0x81}], 0x1, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x4000000) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:11:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24008010) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x402002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001380)={'veth1_to_batadv\x00'}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x42, &(0x7f0000000000), 0x58) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000c00)=ANY=[@ANYRESDEC], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xbe, &(0x7f00000013c0)=""/190, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000380)=@ieee802154={0x24, @none={0x0, 0x1}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000400)="7f4ec4a0c39502c725c980b86cf04d7ed45250feb806bdc1742bf48853ce2d2e00620e06c593a013349514d5dde0c36ca3232d464728216a97b1b9ee75dc19c4193f0bf4cf67dddce29e7639a45aea3b3ecb0d693e7e7731bf8e853de4e7f240ad2501c49315fd39297c52e165bbfeaf7cebd0adaacbee0f51c1ef251c316f8089455fd4ee5e1ac945da32d04f9b9741df0714f0db0d0bbac483d9c3234ddaf4e73df12b5d39ddd3fc583f33b194f1a0bf4c5678c996de38672dfc9afbe4f6a224367e67e1cac720e6b8c4975ba0c25c5def7de318169ec920ae2d05dec3e85052a6642f9982bbc3fc8635", 0xeb}, {&(0x7f0000000500)="975cbbb106fd168dcffc5c6d15832a5fca284ba681b0211ea8fe3d5ddf07dd8dc696d64711fcecdba99edf0e52934f82e2d9c3f49297d4546587ab1d8040c211fe2f602d4e5cb2bbda254131de578e9e2a898cf4dc86e96ab580f8d698f93ceb317cb06f6169a708dca1ce812feaef3919616e83c1e28df565daf503ed7690a019c587f06c8adc9603337aa01f0529b98e9f880c7217c9eedb16baf496d26a17f5b1405f4409731835909773fbcf20eb55557d372a7f71bf0cd35d150e556e2a", 0xc0}, {&(0x7f00000000c0)="ca33170dd67b6302903ff3dd0b7cc0d8ef137a6c56581003f2c922bcdb974188c651b62986", 0x25}, {&(0x7f00000005c0)="f1bb26a8f1f880a7059ba275c001fe5881d943b7783bd196f975b6f417d31f44f85518f9029c0408cebf747d34671f7655fcc608954fb33591df498ff326f97f4b2711db80b00fcbbe6d4079faa8a06a643db6bc31ffbe1250d130753fa13cc07bc548346d253ba3e600f5874a145111e6ce7efb5315d7cf63ae06c1e190179309e294f8b0d6b1ca740f24ffa9cf016a4f399cdb3db7eeb4be817ae84ab7d906ea8c4144bece1a2896f6311e7daa38c98e75fce6ec2631c2b652b93fea5872c874e3", 0xc2}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f00000006c0)="06fb6f401d9a04ad74e4ba530d65a10a5553fa3e3996e44ba063d089bbbd190745e1ecb1c65fb862ecacf7212289dd77aafe7c43433b46928af40deaebdccb49759711372e99e8a6320881e0f0bc4da4102c71f2ecc9390642a7c5c3225074e14b7ce3483396e3fe0e5957a16adf0b0a9ef8231bc6a9ee65a3355eebab65b9428afe66af0a770951c1a419b6a50587e12e1426b8734cadbdef8a565388762b79851e2963bee655f03cd6d93f474e3491aed6b1322116c35b226393afa7c53eae8d373be3abbb1ff9277530610c70bca18dd9e62f56b04100d9d8bffb1aed", 0xde}, {&(0x7f00000007c0)="e6aa224c812d6080803fdb06d2a8ee3680ca00b1bfb00bc031f9a38f15c62b23f1bf2cac7ed961fd534a8ef4e6e86edb8dbd207b7c46da75b308d9f6abf59a81ab9e5a05802bb785eedbfc12cd1241adc728801a0f1e8583dba5dfc5b9ba898ccef6638e83dc1979011271205cd6cbb5b731e90d222ee3270dc36e19a6f096097482fe555fd1b0c44c3f69e5c77cc4d4fbed77cd69e2b8c9781c58ec24767a74face5326713bed80befb494d444307512f7884443a15e252b9d429e6854c", 0xbe}, {&(0x7f0000000880)="cc9477ab773c8a845f75c51ce0529d5b82a54a653bc133e0f9aa54ef8f13d3832faa456390d714d8a0bb6d7dff48dfef387f01c58a4236885df709d61e2a6de762b4dee1d8552ca1adad49edf7b2a134c7368d9d9944d64d485cd5821463ecdfb194260bbe95131f3f9b2d", 0x6b}, {&(0x7f0000000900)="0016c65939fd4e062703aba26ac7ba36f8dab9513b6100619727fd9c28d3584d308dec1104bbbddd7d5ecb228f9c2934d15ef6bd3307270a23c5b3c438c78888cf3e6c759774fcf4ee52e10771d93bdcc624f84e8412d0a3c8e160d1d4bab146ea04b3bc9539aa721395d6fb27ffcec1a5c0acb4d686cccf", 0x78}, {&(0x7f0000000980)="3fe2ca9c2179f03e118f6d04c5e18ea8e626198eb89f6266a71d2ce147ead399c4e533295dc3f55db85db0b2bae44f4881c639fe2ccf80a3b63c2d634a1a8a81648960fa2e0cf69ff55333c8330c72c44b2127c08947469e42f60b164ce6503f03fc91b84c3e949fd5018c9fc7e082f5362374677cd0cb97851ce38dd61baf8d8fab0a13c2399e11d2abe966e0f8a6cfe7606ce093af3bfa7215", 0x9a}], 0xa, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0x3a0}, 0x4005) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000b00)=0x9) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000150085ff030000000000002e020a00e22c000000160001808eb3d81fc77948f328995a017c7b58510600", 0x56}], 0x1, 0x0, 0x0, 0xa00}, 0x0) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000180)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, 0x0}, 0x24000804) recvmsg$kcm(r3, &(0x7f0000001ac0)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000001b00)=""/4103, 0x1007}], 0x3, &(0x7f00000002c0)=""/150, 0x96}, 0x2000) 14:11:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x87}, {0x6}]}) 14:11:31 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 432.632605][T30649] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 14:11:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 432.694934][T30656] sock: sock_set_timeout: `syz-executor.5' (pid 30656) tries to set negative timeout [ 432.719878][T30649] team0: Device ipvlan0 failed to register rx_handler 14:11:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:31 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x0, 0x0) unlink(0x0) 14:11:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:31 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x0, 0x0) unlink(0x0) 14:11:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3d}, {0x6}]}) 14:11:32 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x0, 0x0) unlink(0x0) [ 433.569040][T30656] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 433.591477][T30657] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 433.611469][T30657] team0: Device ipvlan0 failed to register rx_handler 14:11:32 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x4, 0x80, 0x0, 0x78, 0x2, 0x0, 0x0, 0x6, 0x8c140, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, 0x0, 0x165, 0x8, 0x1000, 0x0, 0xfc, 0x769, 0x40, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x91}, 0x0, 0x5, 0xffffffffffffffff, 0x1) write$cgroup_type(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, 0x0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpu.stat\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0xcf, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000200)=r5, 0x4) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) 14:11:32 executing program 5: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7308}, 0x3f9c) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) sendmsg$kcm(r2, &(0x7f0000000800)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000440)=[{&(0x7f0000000540)="783f26de5e8e9bba493a539dd6e81ad14c5625bcda8436253c1bf3edf313dccfd9a044ee61ba076e630215bb565ed192943945d6568f9572d1b0c1bf6b951273eb105b457aa7f44666636e884f63f19651032ff2d9e4fed9bf6ad1aa2bb1d42e8ac74e439afe19c1b815889db55b5c1e3c30f49335f2", 0x76}, {&(0x7f0000000640)="2b2198355f67f9e2143004376adc04c7907a2ccf8b11cab035af726fde6ce7395122855b3b25671d8d546534e4706b2e38c19e9db42354e6f07c4a266b00997954de", 0x42}, {&(0x7f00000006c0)="2f93b2052b9cdc7f72221d7c6944f6743bf4f1a3b8ef34f52033e73851b164c2f1d81f3a0752cc85ee676fc80dd7b0305c24f051d8f8142a7d4ea3c22a806979baecadf43f8d4a552162fadb06822948d0d737e4f14cc5343c04972f99eaeaa10947b6bfaaa64654e9f1e200a26907b6e604e098a2cd78842d3c75f27be221499caa564cc3dcef2f0697216da2abbb988c9d5ceec0d773a64bf0b0bece2cf6f45259fa65898136cf99e23b5a2d565e6ecd3290eed215ffd0c5657f8f94704ca703fbd4c5953dcc50be4281541d92734ff4fb0fa22a5c6037cb4d19793d9e9f6b62c5fddb2d32", 0xe6}], 0x3, &(0x7f00000007c0)}, 0x2000000) [ 433.885069][T30663] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:11:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x94}, {0x6}]}) 14:11:32 executing program 3 (fault-call:12 fault-nth:0): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:32 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}) [ 434.159916][T30725] FAULT_INJECTION: forcing a failure. [ 434.159916][T30725] name failslab, interval 1, probability 0, space 0, times 0 14:11:32 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 434.345035][T30725] CPU: 1 PID: 30725 Comm: syz-executor.3 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 434.355328][T30725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.365393][T30725] Call Trace: [ 434.368680][T30725] dump_stack_lvl+0xcd/0x134 [ 434.373304][T30725] should_fail.cold+0x5/0xa [ 434.377842][T30725] ? getname_flags.part.0+0x50/0x4f0 [ 434.383214][T30725] should_failslab+0x5/0x10 [ 434.387784][T30725] kmem_cache_alloc+0x5e/0x3a0 [ 434.392574][T30725] ? get_vtime_delta+0x26e/0x420 [ 434.397533][T30725] getname_flags.part.0+0x50/0x4f0 [ 434.402667][T30725] __x64_sys_unlink+0xb1/0x100 [ 434.407564][T30725] do_syscall_64+0x35/0xb0 [ 434.411993][T30725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.417902][T30725] RIP: 0033:0x4665e9 [ 434.421802][T30725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.441561][T30725] RSP: 002b:00007fd919206188 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 434.449992][T30725] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 [ 434.457982][T30725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 434.465968][T30725] RBP: 00007fd9192061d0 R08: 0000000000000000 R09: 0000000000000000 [ 434.474047][T30725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.482118][T30725] R13: 00007ffd7d3671af R14: 00007fd919206300 R15: 0000000000022000 14:11:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 14:11:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x9c}, {0x6}]}) 14:11:33 executing program 3 (fault-call:12 fault-nth:1): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:33 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x2, 0xf9, 0x0, 0x0, 0x0, 0x509, 0x40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000200), 0x8}, 0x100, 0x1000000000, 0x80000001, 0x0, 0x0, 0xf110, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000640)={0x5, 0x80, 0x40, 0x2, 0x3, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x2ae, 0x0, 0x3, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x32, 0x0, 0x7) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) [ 434.814013][T30751] FAULT_INJECTION: forcing a failure. [ 434.814013][T30751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.835620][T30751] CPU: 0 PID: 30751 Comm: syz-executor.3 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 434.845816][T30751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.855974][T30751] Call Trace: [ 434.859262][T30751] dump_stack_lvl+0xcd/0x134 [ 434.863891][T30751] should_fail.cold+0x5/0xa [ 434.868424][T30751] strncpy_from_user+0x34/0x3e0 [ 434.873378][T30751] getname_flags.part.0+0x95/0x4f0 [ 434.878494][T30751] __x64_sys_unlink+0xb1/0x100 [ 434.883314][T30751] do_syscall_64+0x35/0xb0 [ 434.887734][T30751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.893625][T30751] RIP: 0033:0x4665e9 [ 434.897513][T30751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.917207][T30751] RSP: 002b:00007fd919227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 434.925616][T30751] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 434.933587][T30751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 434.941565][T30751] RBP: 00007fd9192271d0 R08: 0000000000000000 R09: 0000000000000000 [ 434.949535][T30751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.957978][T30751] R13: 00007ffd7d3671af R14: 00007fd919227300 R15: 0000000000022000 14:11:33 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ff, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0xafa}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001207", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='@:?,!*R%}\'^\x00') r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x3, 0x81, 0xc1, 0x0, 0x8, 0x41800, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x1000, 0x5}, 0x4000, 0x7, 0x1c, 0x4, 0x8000, 0x2, 0x4, 0x0, 0xc43, 0x0, 0x75f}, r2, 0x6, r3, 0x0) socket$kcm(0x29, 0xa, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000380)=""/25, 0x19}], 0x1, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="170000001c000000000400000000000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x78}, 0x60) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x8800, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYBLOB="063c80006e00", @ANYRESDEC, @ANYBLOB=',subj_user=@:?,!*R%}\'^\x00,context=user_u,seclabel,\x00']) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:11:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x48}, {0x6}]}) 14:11:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xa4}, {0x6}]}) [ 435.056044][T30775] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 435.090388][T30775] bridge0: port 3(team0) entered blocking state [ 435.097558][T30775] bridge0: port 3(team0) entered forwarding state [ 435.106306][T30775] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.113897][T30775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.123537][T30775] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.131386][T30775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.179478][T30775] device bridge0 left promiscuous mode [ 435.216448][T30780] bridge0: port 3(team0) entered disabled state 14:11:33 executing program 3 (fault-call:12 fault-nth:2): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 435.224391][T30780] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.233061][T30780] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.264797][T30780] device bridge0 entered promiscuous mode 14:11:33 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 435.580727][T30797] FAULT_INJECTION: forcing a failure. [ 435.580727][T30797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.704399][T30797] CPU: 0 PID: 30797 Comm: syz-executor.3 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 435.714592][T30797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.724662][T30797] Call Trace: [ 435.727948][T30797] dump_stack_lvl+0xcd/0x134 [ 435.732567][T30797] should_fail.cold+0x5/0xa [ 435.737094][T30797] _copy_to_user+0x2c/0x150 [ 435.741613][T30797] simple_read_from_buffer+0xcc/0x160 [ 435.747224][T30797] proc_fail_nth_read+0x187/0x220 [ 435.752271][T30797] ? proc_fault_inject_read+0x220/0x220 [ 435.757853][T30797] ? security_file_permission+0x248/0x560 [ 435.763604][T30797] ? proc_fault_inject_read+0x220/0x220 [ 435.769172][T30797] vfs_read+0x1b5/0x570 [ 435.773357][T30797] ksys_read+0x12d/0x250 [ 435.777632][T30797] ? vfs_write+0xa40/0xa40 [ 435.782099][T30797] ? syscall_enter_from_user_mode+0x21/0x70 [ 435.788520][T30797] do_syscall_64+0x35/0xb0 [ 435.793049][T30797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 435.798944][T30797] RIP: 0033:0x41936c [ 435.802840][T30797] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 435.822536][T30797] RSP: 002b:00007fd919206170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 435.831106][T30797] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 435.839079][T30797] RDX: 000000000000000f RSI: 00007fd9192061e0 RDI: 0000000000000005 [ 435.847044][T30797] RBP: 00007fd9192061d0 R08: 0000000000000000 R09: 0000000000000000 14:11:34 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 435.855013][T30797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.862996][T30797] R13: 00007ffd7d3671af R14: 00007fd919206300 R15: 0000000000022000 14:11:34 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 436.027852][T30782] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 436.048859][T30782] team0: Device ipvlan0 failed to register rx_handler 14:11:34 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:34 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x7f, 0x6, 0x8a, 0x3d, 0x0, 0x6, 0x1000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xbb5, 0x1, @perf_bp={&(0x7f0000000300)}, 0x5a0, 0xffffffffffffcc98, 0x2, 0x7, 0x101, 0x9, 0x5b0f, 0x0, 0x5, 0x0, 0x38f}, 0x0, 0x6, r0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900), 0x0, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)={'xfrm0\x00'}) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=00000000000000000001064,subj_role=mode,defcontext=root,fowner>', @ANYRESDEC=0x0, @ANYBLOB='\"\b']) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x80, 0x8, 0x5, 0x1f, 0xff, 0x0, 0x1, 0x100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8620, 0x4, @perf_bp={&(0x7f0000000100), 0x9}, 0x4, 0x5, 0xfffffffb, 0x1, 0x8, 0x3, 0x4, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x5) unlink(0x0) [ 436.370131][T30775] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 436.394459][T30775] bridge0: port 3(team0) entered blocking state [ 436.400813][T30775] bridge0: port 3(team0) entered forwarding state [ 436.407415][T30775] bridge0: port 2(bridge_slave_1) entered blocking state 14:11:34 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000880), 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="150ef458558d89b581e7fab1763641406f1ad83fa48c1d1eb72aa55580ea451b9716215bbc4f87fefa2227e0ca945f79f0b8b1b84df20dad7f5878462571f8551aae1ecf34ccca5dcdf69557afb33dd100075d47a5d9b971b385e8b5", @ANYRESHEX=r1, @ANYBLOB="75ceaccdde5c1d20a27f3b48b6431558eab289981c8c6350819e3395cd89d585e55fa01701f75164ea40b9d604378dec6d021ec3bbc85b38116753b32bb18c2ae849d1c4fc91794b3d7085380c2af70325f9684d102325ae51b48948821401a54e9ac8d3c33b81ced341bb9eb0e90e94063340bb42b4792d0355ae94431671745cf0812a7bacf163e79f3591fe72671a019f6cf195e212bb249626be42cca54342a14d7a8f880d654ca95c5d7a5864e49a94f60117ce614b67f2c6bd1e7b9a3cf44f0295031c02fdde42030ea5143da60338bbab1e06a453bbb70ce0c830396708a8a4", @ANYRESDEC=r0]) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r2}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000ac0)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="280000000000000001000000010000007592a3986e63a10e5b0d089d7754b8f024b43080ede1d83c3b53f68738e52403c7ddbebb19dd33ad1ac8a2ca9a147b15fdb5a13d0a99ac38d9011e431bc1e6567ea911b2d98a35e0a3b22cc196e81b591c53c32e2891c4ada1280ac37042209a27020c03642e0b9af9dcd05b479c4345c3907bd4ac8508e8c8800a874fb628aca6c6be20", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x28}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x8, 0x20, 0x6, 0x1, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000100), 0xf}, 0x2601, 0x0, 0x4, 0x3, 0x1000, 0x1000, 0x7, 0x0, 0x7f4ea7c, 0x0, 0xffffffffffffff31}, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000800)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 436.414527][T30775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.421866][T30775] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.429072][T30775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.489287][T30775] device bridge0 left promiscuous mode [ 436.496595][T30802] bridge0: port 3(team0) entered disabled state [ 436.502964][T30802] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.510148][T30802] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.541840][T30802] device bridge0 entered promiscuous mode 14:11:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f00000003c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) socketpair(0x26, 0x2, 0x0, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0x200300b8) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x1, @empty}, 0x80, 0x0}, 0x20008844) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x1ffffd, @mcast2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="097e29bb6160322e86ea4143545a1ab1a988834ece1400250234364f0ea7efdadb768ae98455282293ac1c0beeeddaa7e9225f47d0c4b728f8ab3f8c5cf45575bc4a006f0772e81bb3f6c5653e8840d39c59e73a4d1a881cc120e758444d75e37f1f8fc808000000336681b7539251a75d17296c88289ef135b9086150bdd62cd471e89ca65fd92a007211d98e962bfb8e2256dda2793930823000333a830237ee704c2fa42f1c23be16cded0db67761dee13c142593b158835f8cbda3645813278636e5ee4c8444e364e5df34f41794cdce6073441d02dc1ba1221bc158205907"], 0x38}, 0xd090c24d8aa01fe0) socketpair(0x11, 0x2, 0x4, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68bff324d6c37d03057c90000866f55e3376e4a82071d7827af04f8426e5b0eb4642172797fc01200533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703a954af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bebd2f992112024650892c2e25b38f9cac849a62720cd661d21ab5d7a8b9f974b4f5da4b6862c01b4cbe5f279020000009f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a3401d604f415840873a0e1df38c8c7c9ce232542acf57c44faea190b98de36aa113dba42def9c5bc3c90823529860583d8fb2dd17279eafcbdb226c00545f7f7c4fa93603f2ae2260bb56cb1a542ab27dfb25f54b6f73e2da29ef6b6f33e099cd94987238b5b09ab1b377fc08135572dd7e7ae09d603115f1cde757c9d2fd838a84251cbe5f8e9e62fee4d1554fa20d84df5e107d368c139b5c17e916a990422a72150235ea93abb04521db134aad75b7c41ec63ca90e22c26a6ef512cd5c598330e07b18183e20f145c031a129aed2186d7a6e3cc00125abaf55b18a727bfc6616d0df05a684730e2f014e5400000000000000007d468676e6c0da27c75254f16c0680519c26f1a602b0df27df00e16af8ac465612353a1e4fc13dfb46c68acc6a000000000000000000000000000000000000dcec704f1e0f9343f76e783f980a20c15b9ad1eeebd6e9f5cb45422a075a7ec964d386fb9ba291492161cfa7edac599d6287f1873abda0c12a84f1345e7717e5ff08871f6a11d9d4829e6cc80716241c501b4298cb0a64299f0f74db2ad1ae0dc5f3cf47ecbbff4c8fbe3cde681e5422a4820e7c49568a9648414487e8dc65ae5d058966a307fd74264998b08574cbbae2ad9acde1dc4cd040c212f87fb2b80f08e00aa568e8cfe998523355df720f231b728e157f70761c12957d9443241b20a33d3ac117adf89ed477e847d55b2e7c6806ecfa2749f1cc9cdfce7c401e927e878108956a94a3d56d0ca7ecc3e37834731d25b3bbff407a7c5751000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:11:35 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 436.651777][T30788] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 436.676271][T30788] team0: Device ipvlan0 failed to register rx_handler 14:11:35 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @remote, 0x2}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x1, 0x0, {0xa, 0x4e24, 0x401, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xff}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="4f452ef180b3f88254eafc1952ae04d6b0663ab67664a0aa53396483c9ed09d0e5f38f7c2a5017527ad9a4157242086c25a40cd751e48c669164bc6cc110e6744954f3df575cf98eb8f6e981", 0x4c}, {&(0x7f0000000300)="49447d7a03a64976afeb207ac2fa67c85fb7f14e6318ac9046824c95", 0x1c}], 0x2}, 0x8017) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r1}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000480)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002140), 0x0, &(0x7f00000003c0)=""/166, 0xa6}, 0xc0002184) sendmsg$kcm(r2, &(0x7f0000002b00)={&(0x7f00000022c0)=@can={0x1d, r4}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002340)="fe96cddbe8fb0c3960fdbe110f0e5b23c7151f358c120fbdb15d106a2fb5984eebda0c12297170265367143bf27b057be1e45f8a906cbe174f0c6aa048a0c68746e2d07d84811752cbfa88566fa3862e2dc3236e15d2289a1b77553df2de774e9521997078b40f502020", 0x6a}, {&(0x7f00000023c0)="587696add6f7aa12177621216381b399244ab0bb963f2aec8131883f81596be4da2cfb81492eb523ef6ea4a0558b5045d82e73c11a7a63dde87d52e8628fc23e5758f43553a41e53bcdef21abfe2", 0x4e}, {&(0x7f0000002440)="273328484f270e220dc01d560e163a4d9c573402432885b730ead5b1ff8bb23e3cce7e27374977237d501b09fa018eab783324300bf50e77a4cf732e3e497ea6a93421946be662c551f5e1a46ea3cfa15e05034e6d1e1a063a81dbb6b5bc55c3283f9a33498bfd1cf607b43d79e46313b22e3cbbfcc137483f3c68afb36480206c852eda67b4748d8510c653e31b0783563debe68c24b7e904e140d5ca6d4afe1fb17e44169e47b9e79add24e37ae1ffb6c83221882bd53420d160069559e04137cdf3a664afa0fc987b763dadc5301328f0fa31462b4a66432c", 0xda}, {&(0x7f0000002540)="105c323e44a7118fb001b8ceca927cbde69442543870c9e564dc7a8361e66ed7821f16aa0c95af7a15bd53481ecb2e1b9a446f50b4916344d4c4500e7e961743b31fa5c04f154aa1fc22b016145be928dc9167f83f46ebea05e849b1418a0ab32efbad86c75b46f66048f0b05f2d93776192f85e7eddb352905febe94566d842ba85233bf3dfb6a6bcb54204a92733935e78ca9d150f1d2f9f05eaabc8d69f19601d77d7b45ac63e2c7b38ebdb2810196149f053baaaf7e3b0a70eaac1c67ac4aea16ced55d4b9c1751fc32265defee6da7ba522e7c69e79a2b1577799f8ed8e12", 0xe1}, {&(0x7f0000002640)="a2a23f34b19c455b7338754187d5e6bd18b25230f51c5f13e788e1def665f79b6ed2caafcaac61b90f27785f50b4e3606b08cb7fa4832a52e941e8b9b0c50b90e95a09395d18eccaa481f6fb25", 0x4d}, {&(0x7f00000026c0)="57e28c5a8c2c347569824ce2b5be8e200b4bd08d3056f6d84e00f082278d4ca141984300c4eb9154b76ae63a6db4c0dbb959c04ec7ed659b9aa419cdf18554a2bc1aff654a1d26e3cb1f0f23ab3cb92c86c62dda61b36cab079c75ef7c07217b70f622de2b74e52dd95a27bf459cb5991b3c4767a7c2823ac7d1d1a1a80b96abfbe566bb4ca420075e0966599807f325744e16de4675f9038b65351e94500071f1a341d8dc7b5a45fe1c93ba3c", 0xad}, {&(0x7f0000002780)="bd1b0f2977bfa75e2bd772d2f226e2a78a5d9e006bfadc82c323ecdac2a8416bebf21907a583a16fd93a6cfce57abc3487555fee67b4b143f9e4f2e6a94fd494deb01e6ac75e6ac52f0d25639baf7bd4c30be2350e9239bd2bab1750dc671263a0fe463cfb88c4b0eba7301212c9e77e1a3d92fcd7969a22c957e101df5acc90485228f4027cb95be73427ccceaf08f84b823f252b4171c681087b9ced083060386c9415229d6545aefa3ba9671a8c6ebde90a019fb1c2ea421ee0280e21c87190ba971e00db8afa88c3820350ac95f4df06274c4ff073c4c4d284ff9c55925d0641dbc6", 0xe4}, {&(0x7f0000002880)="8034f181c8eb9165710228a1a73d315f3f6a64a7efa3b88bf350a749fe8d1e80036d31aff233063bb9f4da4bae2e616b6f35cbf1d2f069fd9702509bcb7ca3e5b7aad43c4d23b2fbfc16e3d6c9afb32d623654ff", 0x54}, {&(0x7f0000002900)="6711084117d40e2ad61621f8cbcc614f71bb5a7c2ac11b1ed604bd1d9c379314fd1d77023f93d154edadf6a1ed9e25c2242b16f32f3c585a9bac39cc85267809655551e5ed5da8394fa94a41b631b5c2ba", 0x51}, {&(0x7f0000002980)="d1cd772ccea39dd0edd891da40f25355bc9c3e17", 0x14}], 0xa, &(0x7f0000002a80)=[{0x58, 0x104, 0x3f, "5712cfc7fbdcf068f63b98ba8e773a58958a11ea33a108b65bc2090ad4bb5b09923042646efdf0b711884e4da055ee3ab58b0e68de9f7685f1f84f7806a726e42a"}], 0x58}, 0x20040800) sendmsg$kcm(r1, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x0, 0x6fe0, 0x80fe}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xb8c2}], 0x1, 0x0, 0x0, 0x500}, 0x0) socketpair(0x21, 0xa, 0x6, &(0x7f0000000080)) 14:11:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4c}, {0x6}]}) 14:11:35 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000c00)={&(0x7f0000000a40)=@phonet={0x23, 0x8, 0x9, 0x7}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000ac0)="83b77f1f09a774b7a5659b0c0a0f6e619f1983d137b2ca3cd037f0176907d670d74f5ee617dba4985ba534547556ad9b7a6641d93e790302e27d8ad51cc94a7366f2d608995d6b03ecc7b34e095e0c4e8da81852643681210a2095ca8248bec7b24a3e1ddfa3b050f24fe2431f1e5679fad67eb27a8270f53708ef43758553f94f86e6d05e697ebd92ef348ed3d27315fe8ead", 0x93}, {&(0x7f0000000100)="f3271f45dc18679f8a6bb8268ae8caccc5341f2fb519aca0d70090be5cf8c35019398b8636bde1a7257dbbcab91fcc86eaaab63345ba254679", 0x39}], 0x2}, 0x40005) unlink(0x0) 14:11:35 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = gettid() r3 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x2, 0x3f, 0x1, 0x81, 0x0, 0x5, 0x820, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x190cc3e8, 0x9}, 0x44305, 0x8, 0x1, 0x2, 0x1f, 0x4, 0x1000, 0x0, 0x3, 0x0, 0xff}, r1, 0x8, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x5, 0x40, 0x7, 0x1, 0x0, 0x5, 0x400, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x6, @perf_config_ext={0x1, 0x1}, 0x5a004, 0x100, 0x8da4, 0x6, 0x9, 0xea, 0x7, 0x0, 0x58eb, 0x0, 0x80000001}, r2, 0x5, r3, 0x8) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x806000) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r0}, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000000)={r0}) close(r7) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.max\x00', 0x2, 0x0) 14:11:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xac}, {0x6}]}) 14:11:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x2, 0x0, 0x0, 0x1000003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') socketpair(0xa, 0x1, 0x400, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r3, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x880}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 14:11:35 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open$cgroup(&(0x7f0000000a40)={0x3, 0x80, 0x31, 0x3, 0x48, 0x19, 0x0, 0x40, 0x40004, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9ddc, 0x2, @perf_config_ext={0x8, 0xfc}, 0x3260, 0x0, 0x3, 0x7, 0xfff, 0x5, 0x1, 0x0, 0x6, 0x0, 0x10000}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000c00)=ANY=[@ANYBLOB="1c00000000000000010000000200000004508f084d872c258b03bf6ba25dac6e634dc77f4bc4870fc0a46a74e31db3c9a90c0648614684120e637da6af3ed129283f57", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000416c58d6a09000100cc6b71e9adb59b556efbcfa542646a", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:35 executing program 5: perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x80000000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000060, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:11:35 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x0) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4d}, {0x6}]}) 14:11:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}) 14:11:36 executing program 5: socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000f1ffffff0000000000000000850000002c0000009500000000000000655206a4de62c87553ae43518cc99cbc9acbcbd594621859e523349338e53c3228faf246b3f9f8e68ed7daf777c426a6d2469e6594f9c326834695304c9b096233be66e28191807d7d3db1ba4786e3411efe4f6f51956fb5dd27286cd09b12624f1bb19717601f169e"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r1, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x790, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x20) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 14:11:36 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000007000000000000000079110800000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 14:11:36 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x11, 0x7, 0x8, 0x5, 0x3000, 0xffffffffffffffff, 0x400}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000280), 0x100040, &(0x7f0000001340)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_eq}]}) unlink(0x0) 14:11:36 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x0) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x50}, {0x6}]}) 14:11:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d94, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="2e00000010008108040f80ecdb4cb92e0a480e003600000001bd6efb002009000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000019c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x303, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:11:36 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(0x0, 0x0, 0x2, r1, 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x66, 0x81, 0x0, 0x0, 0x3, 0x2080, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x3001, 0x0, 0x3f, 0x5, 0x8000, 0xffe, 0x1f, 0x0, 0x8, 0x0, 0x892}, 0x0, 0x9, r3, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1f2b, 0x43408) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 14:11:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x900}, {0x6}]}) 14:11:36 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="1b70b75c950b", 0x6}, {&(0x7f0000000180)="c1fa27d4ddf697bfbf49cad474a014b9b6829d394ca6d80c00c0339a8ef6cda1fbb00a8c14635781d5f528cef6a5a3d035cf039475fd0abb9b5acd0163b9201f037e1c84d03e475c14a92961dd18f6bf999090cca59508586486e68f088f9e3299d9021da8e390b0331e282bd947ec826aa1efd9eba1497be5245d8b", 0x7c}, {&(0x7f0000000280)="8b5e14e6d9e93e4a0dab4e7c69055911ec10b6d51f822afbaa0a709b664023bf84b2db271781544aa9d73b6fc1ae98557bc9bb0da267920941e49c9d98d4e0dca96c893fe899c325fded61c3879bb97babee6d1f4f41e6c2b5fd1889131c0610080415482b19de8070a81501247db5a12030b2e2cda6506744461b1eb32c6428bac73441f1e7dae7bd1681d7dead5d9d58b13cb679ccef4ced7c88da6bf524c4610d7a53f63bdd3b20556047", 0xac}], 0x3, &(0x7f0000000340)=[{0x28, 0x10d, 0x200, "794e856e09b39e3a20164f1ee9fc2988a9e6bd1e73166b04"}, {0xb8, 0x1, 0x2, "3140f8ad1856e163422ef99692e70d943c926689f31859f8b4c40f38704cfb0d2c00321bcea687cb80fb116214865190f0ffda826615c30afd2551ab7dd6ba9433772fd1437d0961a6abc2b7e220c854394d0c8119316b938a34700cae1fb2b54fd883176ccda0c4b3172bf654c389b552c928e96354577faa41a1db6a98050acd7f28e3ac6658469959a98395f8ef30c106431bdf8017ac2ffa2ba1c3e704a403a6b2cc3b"}, {0xe8, 0x1, 0x2, "0d4daaa86e29c606f5f62591e9f4cfd34498b3958ec1576f856108f4668efa6964c489a073fc02228772f82fa311c6f2cfd37965400d821f96ff11b78ab6a6f9e88a520097d4a77c1741563a59b4851db46e4c9a351193d8cd8de1496d091786c24645f9af2fb68f2e091b3bfa57c5829c8b0a346239fea56d5b0c46e42e991bf2b2cfd068ebd13bfcc98bb7adbde288b44a101edd018399934945816554a63798ac2a36c861d449aef6af03273dc9b0d1e3d880a65b1c4e13761be4a42bd74a8bfd3c5beeb85ba78b66fc92101ab14f972fff"}, {0x1010, 0x115, 0x8, "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"}, {0x80, 0x220, 0x800, "c20317e4bfe2e23b777b4cb377b7dd399355426c9c2f344224b80f86857329717182a316384ac4129d727d70bbb13f953d5d04d457da4297ad81ed967670a75a9e7036b4affd32616f2e36c0fdcef103d3a2f9d6d6414196f5ebdb0f2ef876560d7244399b708556b49e65d9"}, {0x50, 0x0, 0x371e, "5ea7a28c3919c852bfc3d0ba141dd746ed8359c014d9bbc1e1cfbf6111e86ae21e5ff54c2beb8c9bca23515d59314b08d46851d0feb8a03e756b"}, {0x30, 0x10f, 0x0, "c4875a3aee15d2c137d85924b558c64098aa4c4eac3df9bbd361b1e3d6"}, {0x1010, 0x114, 0x45e, "410889eed2ebc5a755aed72f750943e42652e7e27264fe31ee1a91f1f1442091512dce7c7223f22cd1f879736a46bf73e1bd2af4ec35095fa6508cde404ff7955e8950375bad16256ba0a604f7ff35e47410800a3dba832c8839e56653535d349e1a91a63a5c34cec8509ac2b22ae077b6c46866be76c25924a43efe8c16989ecd1a384216b337ce6118c0a40c6d077bc7b4f47614131e26ca363815764101ed69dbb383c20c1162aaa9cf2526d0f5e307494b4c298e6ac217abf5d5211fa48df0c16e84ce54f51de8745a1567c3c8c3536ae4bc5d9302a3b78c3ffed58f9d8364358c7ca3a1c780c0c04d0ba0c31c8d31d19e29b077578cc4003165fd31eaadd9ecda339897cec06441aa8e69715fcb2614774db828ecb75e3fe9878247aef3259aa590f34df3f23c909a0cd13ddc7756c44457eda64f64ed332f55faea61c9163cca81343487cd8ed9a3e85837d514de5339ee3f5a623ee816933e8e4801ec0e92a7f89605810e86bc3b12e8752bcd0365c662285e92613b8b54b2a6720dc3b32e40b51a362da092b7fa816a2945cce0f2d247c89c26613fd29a64bb45b7cc8d642671e7d0c45dbb07943ce9cd1c4485165ca019387db8bc481a05d9d6cd27447677810d275d5cc6ea4defacf861e624e6ad4a94fc4d6c73f6e79f4e02334e1907084a963539c1621081fd7d8b40f7bdc3dc2f09ddba90d37f831dc6b4e0f4d41f55f7eac451134da6d0f0c60f195590f74cd080c4835b5c2f65fcebc3a2aad3fa7cc91db6e18cf5d3aa9d4313e76cc64724c6aeb8d54e2c2ba56dce0816369c0c1d0a9886509cb39a702910ce4c12adeca86365bf7aeb91958d557238bc161d68410cd90501b8ecbf460848d22c273ff5751a5c95366f2818ad2c5709077dfbd2e238851b8b6359b4ffbff866e6ee81dd232ceb2395d3f01f963ad162bea45631292ef5dfc29101e5d79263f1292bdd0d6f632c6afd4d97a06ee7904702ba5e16bc97fc4e064509570bcc30ba4e84ecaddd35f7cf80810005e8d90545962e005c29c3fecbcbae85349af40c567dfa020e7e1d5db45c03f79b25f73f7f79aad370469e3c1a406539a2a4aaeebb98e83d1f6b7f86558768be437bf1106b9d0a17ff7c1a2576e16bd0b744ccbfb487f515b7b7da5c205a981935d27f2ce1964ca153c4c8677538950e7a364630ea9648083a35cd82f012149de5ff6e5afb7c26ff872041fb3480df2d3c23f7c6d103e32a94b6f935c5bc60f7d646c850f6c652c1e486686850877300c3247f6a34815d413f29cfdfd58079978909f9aa5930fc2b4b5e576072f023ad9407ee72a6779df78f1f6889581daaa7942465da64de37be85050568ae798309d2b3565cbc1405202578e5f68faf42d15d09b13f3d7d01b22c62f76b246f1339fb8653034a117620d3a4f260242d0a8120985639c4220a5f288065ee2112170b8bd80fc55cc3fec02f1160d6b9d3fdae54a87e80bbe3dd5fb4a079a6e3b14d520b3228e97151c1f0c449111772e35561b75692cff303a1fc1d014d1096e1bca99a33500a6dd9530f7e83cda622060b159298fdfb11de6a675d322092d30360ba6dd6c67e74500c1e4b58a1057e8fdd0e93380fbb687cd7dea75dd4b01651b134a2748adb37638d99e6ab34203d9eb49ea630f288806b1d695f4ac1552f72341307b31ac8f66cdde9d4afc417db5e82b83bea7a262fbc9406389cf96d8a110a6aee9d6c38078b1e2d339f629a9e1da29cb7fe0b6063390fd7025efe0081f309f6d01d0118252cffded5594d1a00f86032cf3657b6c2ef67a849029ad123b62ef058b2fb4862f0ff18cf8bacd0eb6fa9b779736856c81622147dc70eaeddffdc54b921d938cf40cf8a3ce998482764b2523be5376d7fa0521d198848dde221688afcac63e84cee05af7b3b5e026c99d957ce9273d08317acc4561dbfe7e68840aeba3c86b893fa1c89d3dcb975193bc1a3365ee6311b7f670b9a667d18e7ea6095525ff8c3425e918e9581baf40aaf6be70621a16c718305e15eae12aa59d3ad2ed5ec61dd1ec973589f2dccb268430f1913760d15441d6c650a15abf998ba8bbedb32b14b2a12e729bd32d1be29ea09e1b1b6ed63ff594d02b39c07b321111e65c036683fe2c17b4f01d23dd480fa8a9200cac75b4821574b3d2dbabf0b24a6f53abea9fd2d5fe6f7c7b28bf3efce5dc314be8d60269aae841ed4f45b496f787c6bd0cf246bce37478d62bd9d5e1fd03a5d6b6016b6d0f3fcec3355bdb83a9eadd88fe9817ff6c126c10be86c0aeda3892253e5270b574e2d30e029801483a5652fdd57cf9482d8dcd6b6f478bae336945738bd429b7159d02a4c839c26678ecdd55e485883dc6f2b55ac7ef0fb3d4c18ebe42fecc6e35baf90e39150d6c658051a572c0e45c59384642b5535b165e83fc6d2e773bb8830d18bbfc09fb5c8fe7defdaf48265503bb7bdab1b298976c81ef6eaed19c801f08f8791e2e810db1fab553c9124c78cf333ade8bd4552d6b0c496b3bee9ab002bda99c3286c46b40e92451a92bec8250b2cfa0245951e8ddce1dfb4e5d8bac1661f93c0201604f9384b6080f795ec45c8e124806f9278ec0b2f7a7630335d7ba63aa68c623e916716a1575f838542b6afc9553a4e55b5186d6de43045ab70e79e0b295bdd0c2238ddfc3c1e9b48170b701db9dcb015efbd3a1ed8983420e6b79755a3e465d2779737f0b530718c826afb96bac295aa01d8b9cab30cccc7f9d6f989b49d89611264c749c44fcd7cdacc92d6ebefe5fdeaaf1e27978d28af26f18ae9a124133bbdf114a37c4d8a7b6ed71204ad4435d9db776c34dbd60b1001cd5bd61e3bc40314e90b1b7eeeae30785a9086114186ec987bc225ccf6a803a8cc6d51e2c0931618ff0485b0f890dcb21f58cb08667590b056ce2108532fd7db348a1542a5fbde50a94bb81490000feaa2eb2352647f4a010ddbea024de3f6ef39477c7e2c3490a49752cc66e3b613f5d8cba70ce360e3391bfa166c1ebacca79a01ecf60ff9597a5b0da72c8d2d730a57de66bdb54eccda80fcf1baca7ec2e2c68f8ef2ad37fa84683aa6eea8bca0ee1dff24b76082c3f148d1955c1647285c7666e8ca0f7f4de49f86925a9c8e4cbebafdbb959c0a934eb5eee99da976d9d429f9c2b61570fa808f154e05ef5cbc32fecd60a0969cce1ff4866bdb398f26ecc8a83c5030e15b406a444293232e8fec71f9b1829c2cbf406101f7ffadda7513d30a206aa2925cb3f181dd7df805edc93b51d27d37f6447c013fcb57986c4c65e3f0e48bc8062a59aed3bdfcfdd5952816ec48c05dcf845419c842a302aac910db3172b4344c902620b830269472ab83e36df5643b718667545be87f24cd611320b3646a3450a79847ae3f30fedc82f1b2c6fbee3ca518e7573ded5c1165e83571777127decc53c513cc5c72b25f6a08aba8b40f6140b0e68f98b41c1fdc1a1c9457a5b01a9f142a08ea28f4df9c89de0c3fbc2218653565520d6ac29f47ff335dc5261672a92ccc2bb22a0739f18ee44447b39f672a60b8bbaeede63a0f4373c95370450568146557e43c9c4dc61291e85e62ffe5dae234fa35f74f60eb2765e6fbad4e0bfd3e2408abc546cd29b541a6a9f61050a07c0cd218196aa5a82bdf5325f2f69173b33590a4bc18e113da2478e89e29c0a1e1a2c6e2af93080dd76284ec0a838561e46d6034473152322224a16242b33b21e40ce8468527cf981a77f13550b6f7528a866bd90ce1100180816cecbbcae0c500fd6669b69360d6b8b67cc808a1ea1af6c1330f517d5c20508a2094c9d6a728cd60a1fdcfa956a84fa4502726e043f2e547395cfe98d332d1f3e73c648811fed830251e5647afab4424dff835cc1c72df9173f939f8f013525711c483dc653e83adc81d6df486fcd45474d23960d762afc8f2619c95a3dafe6072ee0bd1c8c9595d36ec4052e3752388f7d028717e32bf82bb8c8f94ddacaae163a1904a589f4cf412f2486fbda6fddf3b69600b804a210c21201e08c762da2aacb4c588935f92a7bbfc80f5a80700a2ccb538ce0a1ce24ce60875d2c297fa485c356fa7af45a1456f5734f40bc745f62ec1cce54597d5d58dc6c47d2dbc6155c9c3b288ac3bce8bc53731a44d5d676471507783d10a1faed02465b469f5fecfa2c48966706e6f0f8a75b3532826312cbb9249fd23374eee19d123631c012b3212458c6152c9593aa322dc22663445f2a64ca699d9b89620de654f5524329df7ebdbe77272345a36ce60554b5ed848c3ce83eb61a8b804977a258f1f54f10480fd28e19ba188493e60a77ebc72bdf693b7179e2570dcf462475fe120ee6d532fc7b4f341d6b498118f264f2fdbdddf07a78ab803f3856b78a63dfa81614c8a4226ee09c836e002ddba0f0758180ad5a47d1dfacbf1a8c5ea8cf799cdbcba99e8012eb41ea9ec51dd81de57d6bee9fde04409837aa5ee69aaf0359e011ec109eba025d21c86c2a4a7eea6316926589cb57abcb943fb60715f30814f12b82881df4c0f793725b3ace59180b76dc1405882bbad470ec754dccf43d1a606864b4ad38efe46841f084437359ef9f2fb36791c6762fc84b4dc4fc514af03ec24e6b6b1de6117865ed9b5fd8995f8af2bdce919bff47cd18c68f68d4620deb26cae626858975a938a7619a59449cfe5c8a39554a72309248d86d0829b5e3f51ef43b0decf1ba0af23490c19809da690cc32913327fd800fb4b5450c0bc91e3f422d35f1cb2a661e42773234951331807e35a1ff14604fe02be5a8f53f57a5aa33166b489288efc2954b05fcd7cc4a7c43df4291b929a03351696f0c6a1172358268cb6082d454dc1af1e27c9c39a45ba81ca0445401305267a7cec6c80caff8cc0182496a40454da38e072d5cb177f71ab8cb4d9485de835307ff93ed07527a05bc89b4b72a54f753699a4c2677c6b2cdcb4179955be38b1cf4ded2fdf91c26af5d8b42e01aeba9c0836815fc455351498b4b270255e4e8917d888621ef4961a429ab8bdd485bed40fb778002fa7407d89dda1efaa2957dcbd9643277b8acebe7f3d6a89a34855beee6c173a47781a6863436572a76b47967ba69ea7ecff3cac269297d0f0f6ff2440eec136d61147c188af10374b78c0fd6470eac592533867182b69e27f5fbf0697424099cbd13176829a9226031ae5f9e89ad4d5bb8ed38e9970e0a45ac6b77e7ea7bfe32b9404d13617073ea3bd84861856989b996bb05a7335fc7335dca66326a8488d5cf65c703a1a50066640c36f568789325f57f33b2b3a1cc7c49a48870a4e5817245dd1163029dcdbe3ba5f9e5bc148b81c479e573d7b7e29e6778694ec19ccc792e63427f4c1206fe9a5de60931e298974c570b7acb6b97377b8d099b3e621a06d95c0ba2fcac6739255622421ccabb52a900fa522371691c4027b5860f1099d071aba82160103d0a96b839383eabd523a864a68c3ce614b841fd13531db7f280767f1ea6ab83e8718ce1fc5b3a9b32344c14802b7bf34a9bcf4b1685f0eca3f5290afb2a07d65dc1311a897739f7bf68dc0f025b1908793e00e1d1a9aba32deb0149b96b7bcb3608c6bc1f2c2df686c851f9837b48523c9e51591abf94bafe9ceb17393b48327327823ef54cdb5fc3e07a7a98de6fea38895626a181fa6550606f72c213f5445bf61d7df6f2dfb14f92e47a607a2f631fa21317bfeac839b0c425202202141b0ce3ceb9df111c8764d928272f4302957c4643e70175105f3f490f4372c44519001d16"}, {0x78, 0x116, 0x1, "c72cb163928d1ca98cdc68f133185bcec5949c06c400cc44a964e20e93ed975b05aca2f157f53f79bca053a81a76f9ad31d764e96a9d298e90dca3d9e1c9d8234852376130cc7921f8d2bb9e2ca853ec1e0699edec304d16efea22645ba214f2ef00"}, {0x98, 0x119, 0x7f9, "9537917032eff37a498b129521fddecc0b2394f8da4577b8002e194164e8ddce110d6d4bc7f42a603061ce411423d07288bbf1e75a692373a86a70e5fb81f392e3c188924a6937b5c52b2e47c0084da85c5921ff8a07619465e06ddee408d3328dc1eaa34e5b7a5b79455451f3477f2bc85561db4e6aad35ec4a96a55c333ef02bd0"}], 0x23f8}, 0x20000090) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) 14:11:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x54}, {0x6}]}) 14:11:36 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8190}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900), 0x0, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}, 0x40010162) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}, 0x40000003) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000a40)={[{@mode={'mode', 0x3d, 0xe0}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash}, {@smackfsroot={'smackfsroot', 0x3d, '\\$\\{'}}, {@dont_measure}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=00000000000000000001064,subj_role=mode,defcontext=root,fowner>', @ANYRESDEC=r2, @ANYBLOB=',a']) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:36 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x0) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe86) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x8, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @alu={0x0, 0x1, 0xd, 0xb, 0x9, 0x18, 0x4}, @map]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000580), 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x3, 0x4, 0x589}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x5, &(0x7f00000009c0)=@raw=[@exit, @ldst={0x0, 0x0, 0x2, 0x0, 0x1, 0x4, 0x8}, @alu={0x4, 0x1, 0x4, 0x5, 0xb, 0x30, 0xfffffffffffffff4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}], &(0x7f0000000a00)='syzkaller\x00', 0x1ff, 0x21, &(0x7f0000000a40)=""/33, 0x41000, 0x1c, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x2, 0x5, 0x400}, 0x10}, 0x78) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x5002a, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, 0x8800, 0x3a, 0x0, 0x8, 0x401, 0x0, 0x2400, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, r1, 0xc, r2, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4, 0x2, 0x24, 0x3}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000003c0)="884677c7baebafc4de3c93a526cf8bbfd1151fc4839394a2efb3c63dd8b0ce2c1fd1d3493f14a3e84534097a3bff66d0bec6dcfc494b00655921679e5cd261d4ab40d8cb390029a2facf3532217b5fad4abc5eaaf503bf5efc487b955d1884dbdbf8c3a1b1350f972916efa2eb71edcb868c96c27afc1ab21ec9ec6019d2644b3119758eec6095706012af00d7367226f6674eef03f61c8c186c63621ff35f01ffba55a73f51b8d24c6442eb029024f11b4e624052a6fb4e955e01fadfe2acbc802ef586f2c237accf8d865b6be6cb90689f60c056e2", 0xd6}, {&(0x7f00000004c0)="150827878e2578a3f74229513f1cf601f84bc61166acf4c6a786f65ea8a96f6b0f3f510aaae8146699db88ae022998c2e102294ec1ea6d87ee93a247ca2d06ae47e00bd0d3758d8a6bdab54220817e3eb92a0ee733fc8365e28d110082da195ab423830172c74083ba0ab908913414b7a17a3dc5e15ccd9a0847fdf7627dc162f58454ed47523cf6bb39a6ffef7e0c47b3a8ec99590d2992d51641db4fe5cdd1bce5e815ee871f48504f28bea1b4cc85e4d8562365c58a39481fa7e84c9f6de127a4a97c10952c0806f41483e938f1e33c76d61a0a18370e07a396", 0xdb}, {&(0x7f00000005c0)="b183bcee3069d2a3fbe218626c25b860ce26fc7b0a8704dec1d9a6b7d696ea520a11b07c07d64a352f9d0a7f08e8db85a8b21998a81cfea35eebe1f1eb7181f937658a12001c925eb35003c5602e10c39204bbec98eb3ee5a8c69f5446fa9e8470942a81a0afc9eda3e755d881b6c236505c00df0789e6878f527ad23f1875fb6663c341279777995c34f7bb27d3380a6637c82a96ce5450b91caeed8bdc20e1a9c2ebbd34b202b7", 0xa8}, {&(0x7f0000000100)="cf02e9a6275bfdf69bab24790623511680bd", 0x12}, {&(0x7f0000000bc0)="6dc00df0809d67862dfa651e55557e382b01da3721e77bbe45e6244d9874be060eeeed833428853a71ca111358a712ef993d175ac58e336825dcbde0e867b0e918432735395fd1d3ef9fe6f330d2ac54cc6d8dd2c8735fd9a1569d2a8879dadc69406a7f97135d94dcec500fda4f34a3372c5ab31dc0b1537e48702b97ebfa82ff04679e15167cb89b7b00a3194088313d2a5446", 0x94}, {&(0x7f0000000740)="159040847a01b2441807295e58f106b6cc7b97fb66d7bc254709324a53fd1b85ed867a59564247162e63ddfc126664276795af5e2b8795a4247f346cfc5eaf8a528e436c6003bbee1acf7da7767676193441b768b653f8379c8e06b9a38ac5140bf59c703ed3a7b516cd17acd6a2dd026c7e990691", 0x75}, {&(0x7f00000007c0)="c2debb12d026ea1cd8b499eaec0f87771ed82f9892e0255e3993afbc4200f1de552aa8d3bdaf692a48158452d479120f0bbb24d4518fc16c480c7718b49b220db0d896508fe9e14b6a2dfcc879c8461383a4b13a5e8fae5b74c82976e67bd7a2997e1d0df0636f6980f9a2768958f9f61defd69a3cdac16a2d64147579328b007e6b37f64bda8bed97c2b3b30eaabdd6e527e5dbd7038bd8dfe8343c6692641f6ad068f885556c103ed05959d40c8e93bc325c3c5b0479635b37bba9f761c150fe09e986af2cfe0d446539", 0xcb}], 0x7}, 0x20008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200), 0x24000) 14:11:36 executing program 5: r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000400)=""/4080, 0x1000}, {&(0x7f0000001740)=""/190, 0xffffff81}, {&(0x7f0000000080)=""/115, 0x73}], 0x3}, 0x0) recvmsg(r0, &(0x7f00000158c0)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000140)=@in={0x2, 0x4e23, @loopback}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="0546315b3df62f16a717b3a18bb5dc48ab9f39ebf4728274799c", 0x1a}, {&(0x7f0000000200)="f7a7c4cdf3f6aab33ed57b20f4b9718687efbc3ec38e0d472ca3a60f8f6fb62e14e5d3260084f3d5064a3552003dba074b80c4461b0dd0449a900fd21ea62974ec06ce66420515987cfc72b7a67d6a662674143bc94b75b0fc5dfa8c01b7e6973f41e6204e", 0x65}], 0x2, &(0x7f0000001ec0)=[{0xf8, 0x103, 0xea, "612f4dd890f6edfcca01d04b4a085e70ce5c32c2510613d725570750c481c192d7f4a7360256add51427419fb4941a0e0052eedf5eb8661188d403d1a8a381c8a95a85d7aed6cf9aba218b5208f5fbd7cf3e05f5a78b56eb6ac107b3c6b790503746af28105fe5e7c8849c83b7f772ca9f512c0fd6cf00e3c0895909261c7b378caa0a84652573183c94fae572b752590ade83fb38e447b9929c8cb264d8b95f9f44180306a09da7d1584bffa3307c99a6b4c126a2fa683aac9534b7fb588f37080f17e06d614fe2f5f195b047c43c659ac428473e48c1e7360710c69d7b97aa0a1c"}, {0x48, 0x108, 0x7, "df486de7f667781e04e97c0026eea417e45631d0188b1c238ffe66385a262e7e6dfcf1c4c594937106f000"/54}, {0xc0, 0x111, 0xeb7, "dad33bdc840414641a21dc1b6c00e5f5e94f1476be51e77358f8e33e2744510df2ada5db79699198582c058ac308cd20291f8f46529d03e577eaf4c869472c98fe2e1b4f825b9e21d08a16df16de303cc61c9398ab3b9e2562bf0ff3073e136611dce9de497591f55c1b38764d5f4f2140fe8f144c3e2e0aadca28e64e51d55eb07ce3da186ebe0502a142f78386a5971c01916a6e24719fe6b1e6037121165dd668634c0d1084096796977c4b8c90"}, {0xe8, 0x10c, 0x49, "6c086e62488ba0b4cf25b5ecc1387e608e35269c86307503afa4c1aaf80c70dd1db8fdb77c32553688d3248873badaf90a2c6fdcd23831604201c869f84c249671ddca93fad6761c89d70d0115d1253a65c3f41d00792549ecd8e2fea065d208735bade606445a8752a589ee7606a7a06ec1d32f336f21fb7d6c6f568e625afd50d5cb673eef8552529859b0db0acff2458deb08be6ff2d55151d9097436f7cbb694abf93f3c190a72f764a2afae36c2e09caac0db106c62c08c1f442bb07da78a7e425a27f07f0384bbd79519756ed2dbad"}, {0x68, 0x3a, 0x8, "a5cd873dc5ae7af970376e2da1413e2455606f0bef298d9d4dea8073e8b232839d45fc907cef02dfe97abb2181f07e126c54fbe385d1e027c2e8d0b9b8d6c652939390ca5f3166a2352de53729529f2ae4a4a1"}, {0x70, 0x10f, 0xfffffffa, "fbfa7752c604d8d371450c6104f6e19d67f0c15effc754761f57b1dfb749f72760a4c6448bb5098990864df052c26d8834d7929dd5fb5f4bc115695fd844e0e063e0f58458ac096c724e529be291abce5a56653e2495121337b679a1e2"}, {0xa8, 0x110, 0x6, "74e925edb8b289b547db2a1eb89d58b5076a934c63844680c65622bfbd0d046a373c22d99ee054b046ad6788992330e46654a3dfb7bf8cca06d9dcdf6386147063122e3df4af2ad35ebd5d4328dfb97e72dddc3f231fe80acf6dc01e89bf367ce232d6a63ed73ecbaad12694cc5434d5884de6d7fdbf36be50a64dc43f10958ba415b52f6e6357e88e79277a3edb000028"}, {0x88, 0x6, 0x8, "340be9a702c03dcb72a1eddebac283b0e6388a4465671f97e192917af99042289bba6a6fa4722e1d0f2d110c8080fa852c3afe66af13b6006320288323b089f5418beafa92d0288ca964364f6069b670e20b557de66f30666b531408db98a73c5506a4f69e866ee59c7fe53d15a33552b355"}, {0x48, 0x102, 0x80, "b44b81ac1bf75606dd36fa8b520a98d25eb0d39bc8dcf7afc5282b980ed32a02978770fccf1afb9afb009c1ef4d8973dfd3d"}, {0x30, 0x3a, 0x800, "8c93ebdda26fd95c6009f1203666149fec8f8a455538ff2d09578f"}], 0x568}, 0x40004000) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffd88, &(0x7f0000000000)=[{&(0x7f0000000100)="160000001a0081aee4050c00000f00fe078bc36f1600", 0xffb4}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000105c0)={0x0, 0x0, 0x0}, 0x0) 14:11:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1200}, {0x6}]}) 14:11:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5c}, {0x6}]}) 14:11:36 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, 0x0, &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:37 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000ac0)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x800008, 0x5, 0x0, 0xffffffffffffffff, 0xd416, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000a40)="f78e498ea7b00b64831e7349095093bf6fcb85d3e1ed7193c42cf79d05f83ffee6eb00f4fd364c59482a6f968c8bb063d250f8b257095e9cf98ed89345e41d64966089d85d9a501157d919a43fcda2fb9a4955eb28", &(0x7f0000000c00)=""/199, 0x4}, 0x20) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:37 executing program 5: perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x7a00, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 14:11:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x60}, {0x6}]}) 14:11:37 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, 0x0, &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1b00}, {0x6}]}) [ 438.824314][T31036] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 14:11:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe86) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x8, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @alu={0x0, 0x1, 0xd, 0xb, 0x9, 0x18, 0x4}, @map]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000580), 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x3, 0x4, 0x589}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x5, &(0x7f00000009c0)=@raw=[@exit, @ldst={0x0, 0x0, 0x2, 0x0, 0x1, 0x4, 0x8}, @alu={0x4, 0x1, 0x4, 0x5, 0xb, 0x30, 0xfffffffffffffff4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}], &(0x7f0000000a00)='syzkaller\x00', 0x1ff, 0x21, &(0x7f0000000a40)=""/33, 0x41000, 0x1c, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x2, 0x5, 0x400}, 0x10}, 0x78) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x5002a, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, 0x8800, 0x3a, 0x0, 0x8, 0x401, 0x0, 0x2400, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, r1, 0xc, r2, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4, 0x2, 0x24, 0x3}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000003c0)="884677c7baebafc4de3c93a526cf8bbfd1151fc4839394a2efb3c63dd8b0ce2c1fd1d3493f14a3e84534097a3bff66d0bec6dcfc494b00655921679e5cd261d4ab40d8cb390029a2facf3532217b5fad4abc5eaaf503bf5efc487b955d1884dbdbf8c3a1b1350f972916efa2eb71edcb868c96c27afc1ab21ec9ec6019d2644b3119758eec6095706012af00d7367226f6674eef03f61c8c186c63621ff35f01ffba55a73f51b8d24c6442eb029024f11b4e624052a6fb4e955e01fadfe2acbc802ef586f2c237accf8d865b6be6cb90689f60c056e2", 0xd6}, {&(0x7f00000004c0)="150827878e2578a3f74229513f1cf601f84bc61166acf4c6a786f65ea8a96f6b0f3f510aaae8146699db88ae022998c2e102294ec1ea6d87ee93a247ca2d06ae47e00bd0d3758d8a6bdab54220817e3eb92a0ee733fc8365e28d110082da195ab423830172c74083ba0ab908913414b7a17a3dc5e15ccd9a0847fdf7627dc162f58454ed47523cf6bb39a6ffef7e0c47b3a8ec99590d2992d51641db4fe5cdd1bce5e815ee871f48504f28bea1b4cc85e4d8562365c58a39481fa7e84c9f6de127a4a97c10952c0806f41483e938f1e33c76d61a0a18370e07a396", 0xdb}, {&(0x7f00000005c0)="b183bcee3069d2a3fbe218626c25b860ce26fc7b0a8704dec1d9a6b7d696ea520a11b07c07d64a352f9d0a7f08e8db85a8b21998a81cfea35eebe1f1eb7181f937658a12001c925eb35003c5602e10c39204bbec98eb3ee5a8c69f5446fa9e8470942a81a0afc9eda3e755d881b6c236505c00df0789e6878f527ad23f1875fb6663c341279777995c34f7bb27d3380a6637c82a96ce5450b91caeed8bdc20e1a9c2ebbd34b202b7", 0xa8}, {&(0x7f0000000100)="cf02e9a6275bfdf69bab24790623511680bd", 0x12}, {&(0x7f0000000bc0)="6dc00df0809d67862dfa651e55557e382b01da3721e77bbe45e6244d9874be060eeeed833428853a71ca111358a712ef993d175ac58e336825dcbde0e867b0e918432735395fd1d3ef9fe6f330d2ac54cc6d8dd2c8735fd9a1569d2a8879dadc69406a7f97135d94dcec500fda4f34a3372c5ab31dc0b1537e48702b97ebfa82ff04679e15167cb89b7b00a3194088313d2a5446", 0x94}, {&(0x7f0000000740)="159040847a01b2441807295e58f106b6cc7b97fb66d7bc254709324a53fd1b85ed867a59564247162e63ddfc126664276795af5e2b8795a4247f346cfc5eaf8a528e436c6003bbee1acf7da7767676193441b768b653f8379c8e06b9a38ac5140bf59c703ed3a7b516cd17acd6a2dd026c7e990691", 0x75}, {&(0x7f00000007c0)="c2debb12d026ea1cd8b499eaec0f87771ed82f9892e0255e3993afbc4200f1de552aa8d3bdaf692a48158452d479120f0bbb24d4518fc16c480c7718b49b220db0d896508fe9e14b6a2dfcc879c8461383a4b13a5e8fae5b74c82976e67bd7a2997e1d0df0636f6980f9a2768958f9f61defd69a3cdac16a2d64147579328b007e6b37f64bda8bed97c2b3b30eaabdd6e527e5dbd7038bd8dfe8343c6692641f6ad068f885556c103ed05959d40c8e93bc325c3c5b0479635b37bba9f761c150fe09e986af2cfe0d446539", 0xcb}], 0x7}, 0x20008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200), 0x24000) 14:11:37 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x302) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x46) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 438.879351][T31036] team0: Device ipvlan0 failed to register rx_handler 14:11:37 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000280), 0x2000400, &(0x7f0000001e00)={[{}, {@mode={'mode', 0x3d, 0x6}}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@audit}, {@euid_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x63, 0x30, 0x0, 0x65, 0x31, 0x32, 0x30], 0x2d, [0x37, 0x38, 0x31, 0x37], 0x2d, [0x36, 0x36, 0x30, 0x62], 0x2d, [0x30, 0x37, 0x37, 0x34], 0x2d, [0x31, 0x2, 0x7, 0x63, 0x0, 0x38, 0x31, 0x61]}}}, {@fsname={'fsname', 0x3d, '*$/'}}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000a40)}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:37 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, 0x0, &(0x7f00000003c0), 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 439.251836][T31036] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 439.275123][T31036] team0: Device ipvlan0 failed to register rx_handler 14:11:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80006, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x74abe027}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x13, 0x3, 0x8001, 0x5, 0x14, r0, 0x1, '\x00', 0x0, r0, 0x4, 0x2}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0xffffffffffffff3b) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400000000000000ff4a413bc8906ee7", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:37 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r2, 0xf, 0x1, 0xfffff5ef, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) 14:11:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x61}, {0x6}]}) 14:11:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1d00}, {0x6}]}) 14:11:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140, 0x7fff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r2, 0x6, r1, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r4, &(0x7f00000001c0)=r2, 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x8, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x5, 0xf5f1, 0x7, 0x0, 0x2, 0x8001, 0x0, 0x3}, r7, 0x6, r6, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) write$cgroup_pid(r8, &(0x7f00000001c0)=r7, 0x12) r9 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xff, 0x7, 0xfc, 0x1f, 0x0, 0xdb, 0x12ca, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x71, 0x2, @perf_bp={&(0x7f0000000300), 0x6}, 0x9044, 0x1ff, 0x1, 0x6, 0x0, 0x2, 0xfff7, 0x0, 0x80000001, 0x0, 0x8}, r2, 0xd, r3, 0x2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x4, 0x0, 0x81, 0x8, 0x0, 0x2f7aad9e, 0x51100, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x64, 0x1, @perf_bp={&(0x7f0000000080), 0x6}, 0x40206, 0xec, 0x200, 0x1, 0x10000, 0x8, 0xc4, 0x0, 0x9, 0x0, 0x6}, r7, 0x6, r9, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0xb1, 0x5, 0x7, 0x0, 0x9, 0x100, 0xa65e9abdfc0364e7, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2c, 0x0, @perf_config_ext={0x1, 0x9}, 0x11010, 0x3, 0x99a, 0x1, 0x8, 0x1, 0x8, 0x0, 0x6, 0x0, 0x4b4f}, r2, 0xd, r5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582b, &(0x7f0000000040)=0x23000) 14:11:38 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x820000, &(0x7f0000001ec0)={[{@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x401}}, {@mode={'mode', 0x3d, 0x5}}], [{@uid_gt}, {@subj_type={'subj_type', 0x3d, '{{.-(\x0f](O'}}, {@smackfsroot={'smackfsroot', 0x3d, 'fowner>'}}, {@smackfsdef={'smackfsdef', 0x3d, 'defcontext'}}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:38 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 439.754451][ T3262] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.760888][ T3262] ieee802154 phy1 wpan1: encryption failed: -22 14:11:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r1, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000013c0)=']//:*@\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000002c0)='memory.events\x00') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000240)={0x0, 0x80, 0xff, 0x1, 0x8, 0x94, 0x0, 0xab2, 0x50d31, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext, 0x0, 0xf92, 0x0, 0x7, 0x20, 0x2, 0x4942, 0x0, 0x0, 0x0, 0x4}) write$cgroup_subtree(r3, &(0x7f0000001400)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) 14:11:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x64}, {0x6}]}) 14:11:38 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2300}, {0x6}]}) 14:11:38 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f0000000640)=""/106, 0x6a}], 0x2, &(0x7f0000000280)}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x6c}, {0x6}]}) 14:11:38 executing program 2: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) r1 = socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) sendmsg$kcm(r1, &(0x7f0000000840)={&(0x7f0000000180)=@ethernet={0x6, @local}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000200)="37aabe171f96f2cc423261dd5ca7b67f705e9b565f9ccdad50e1f66d32b1e29868ebd87f3d2bfdcd672d9f345507018941cdd311d8257978f7db6c8cf3d65764bac84c3ab5b0fe7499c6a5668a610f4990bd4ce1b6a2092404be224bf0899301336cf605cf80f7d09a35f0e245386ea6ef65990d", 0x74}, {&(0x7f00000002c0)="6ff0ddd15f592bf64929dfd64eff697cbfce095ca591314bfd3fa2f8a909a93e31ae2a6048e3f8f02cc222add9deaff8bc5b10e1afec8849153c7dedf616a7d39ba573feb9f8eda0e4fe639cb4842048f33041c58a4ac392596db4da0da84fed06f967ed4f2218fec14dae4913f4ef1ea9fa223c1641e5fb9a8a1949e12e1c422a", 0x81}, {&(0x7f0000000380)="6091f1eb853288d020c86732cb15fbe04fb79ab21ce6fc1ae61c4b1e289cd9fc831f5607556c07e0f4c7b6933d1411a6ac129dd53ef96c365a77a7292569db42304e257aa0b6d45bbb019260ce742df876990a0af81925f9c4f184869227d105a671f2248cf98d4a0dc4f963c190142c1370b468067a9daa3960cea46728726b84dec9847991557e846aebde145c8b155c4db75c7ae7f7b844871db66af85edb086872031d94ad5993938d2c451b77deaeb8c6a0e9dda05ea17ac5d29c74bb213948a89203faaab24e7658e8afc28a848dba493eb2445ebc16", 0xd9}, {&(0x7f00000004c0)="6d60086dfd049c195025fa3798cd64471c012a25d3328a7ff50619cdfd9e39eead88eeb8e3a0c19e91a19183a3706a8b61d50f04842c4146dcd1ff931f79f38100caea890b8679db6a53f305e44ae457ad9b8d00e80c696a406e91b304afbfc91f05999d88701d91", 0x68}, {&(0x7f0000000540)="de355bb032fef657b3e84d586ead66c13168471019c1e8dbf4b28b7d7e42a2d83d185ae451c8c588af614d287194eb94e4a9a991a7b3a286825ec5534cd1f2521de8645d9b0c95c8a6c08cdf52c646646657a9e363d6f0c9180933a51b164234326ef585914f309ec4666a78bc93dbe08e10369cb230033dc3cf384bc8d356d4a52d2272966dd2649d6672b74e816994b89029f8c8d88d93", 0x98}, {&(0x7f0000000600)="b19268921aadbb8091c83677bdadfe2f4f9a58f21ea441410c96f546617308cc22b74218b3f3abac97f64abd6a9ea56ce9d7da0e8e879a4b440531d4d4c9fc72cd2545406db41840c2e7b1418f74d4cf18d2481f2d01ad3437eb511489dd22000b2ab8efb7a4a8f3ce68c44242b0df6e6cb71c9ebb7a0c529ddb111dd0b745d938dea03536e2f9cf79db2fbcc92aac4d3d99643fbcbe5963790ceea1c10ccfb7557dde9ccb88ab603dcebbc4493395fb9a91463d28ac94908e", 0xb9}], 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x100}, 0x4000010) sendmsg(r0, 0x0, 0x10100) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000880)=@in6={0xa, 0x4e20, 0x9c8, @dev={0xfe, 0x80, '\x00', 0x38}, 0x833}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000900)="41d197925fca23f04905cf97e4b14c00c9c78e1686d07244948ee9726297d36f8786fe765b82be77443d3ec205e0defdee7cac24dcb02c6eaf92b954ba69862c5f59b9308e2ec5490e945ce8d5819e55ef30f44877973f626988a477e007ec06d0a246179e9c8157663d5107f6bb0b815ca5371b34d819128451b8035aeadfa70567aebdc80b415b16e79807dba8719a4dee42283264c219e4c56861d9d82b395c51a0923a78e80ce735bcaa2f7d0fd484ea1fc7b1ac65561d54e1971ed402bc368e1ba4c9f771c71a59f2d440290c3b3159c4aa2463db85a313f8c306", 0xdd}], 0x1, &(0x7f0000000a40)}, 0x4000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 14:11:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x2d00}, {0x6}]}) 14:11:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x80, 0x1e, 0xfc, 0x3f, 0x7, 0x0, 0x3, 0x4040, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xdac7, 0x1, @perf_bp={&(0x7f0000000080)}, 0x1c40, 0x9, 0x9, 0x9, 0x0, 0x40, 0x4, 0x0, 0x8000, 0x0, 0x5}, r3, 0xc, r0, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x400000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)=0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6611, 0x0) 14:11:39 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x18, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x800000}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f0000000a40)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) unlink(&(0x7f0000000100)='./file0/file1\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:39 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x74}, {0x6}]}) 14:11:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 14:11:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x3700}, {0x6}]}) 14:11:39 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6}]}) 14:11:39 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000a40)="2bca2ebce3568788ff96d8136c95edc285630278988da4b578784a084263c97c6946ddd9caad77164d56fc39d40d63b8d6474d1adfaa98d9da23efc4e7d46004dd9ff841c4d6129e9ea6b8ad04a6252c127a1bdf5525f91303a2125bbb4b8dd7ae7883a34e6809bc39b872", &(0x7f0000000100)=""/14}, 0x20) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4100}, {0x6}]}) 14:11:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x0, 0x8, 0xa4, 0x3f, 0x0, 0x208, 0x500, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000540), 0x9}, 0x2100, 0x0, 0x4, 0x7, 0x0, 0x4, 0x1, 0x0, 0x100, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)="07c2e5602c0e996ec90061bfc45ca1ccaa6b25a8d00ea8b8d959d16f4029f169950a9a8920d5740ed14eb501385d98c1dc098c6743031a80fef72ff459e0de3f0f5b9f9db71b6452d90f7881f7048136bc533675b573b14eb1efaa5d6c78", 0x5e}], 0x1, &(0x7f0000000280)=[{0x20, 0x10a, 0x89, "e1c440cfda706fa59e8fc6680fb2"}], 0x20}, 0x8800) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x20002845) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003080)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000002c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda9036201210cbe8931b9c7b1b85f3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee1d6ece1ccb0cd2b6d3cffd963218ce740068725837074e468ee207d2f73902ebcfcf49822775985bf31b715fd888b24efa000000000000000000000000000000000000000000000000020000000000000000000000000000b27cf3d1848a54d7132b388b3d56b2e9b5d429d22ce1ffb0adf9deab29ea3323aa9fdfb52fafb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f4d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e610b2462d4407778c6abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6fefd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c3936e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8cee910d73d5c6977c78cdbf37704ec73755539280b064bda144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160ebf6cf8809c3a0d462357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044d1f000000825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e713142000000003be7664e08bdd7115c61afcb718cf3c4680b2f6c7a84a4e378a9b15bc20f49e298727340e87cdefb40e16e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a34fff7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c9eed00000000ab6648a9dea00000753f8b349b12ed9c640bdce268f41bde6f3dddc95f5397d3dd1b24d80d5219724b771b8051b9d2a3bf9379605a81e91cbdebd7fb413c452be3454a61c20d6d3a505690b820b2d335fc1eaaa4c04c01216894368c4809ee1ee4f79b0edd976c306d6f4d3e53e00d57fb1b4b170a3e06bade734064c4275fd6597e74859f13b7b14387b040c6d6465cc931d970931f6e94f5c296cba680a686503dab0dc88ecfa39aa2af04509c5b7ab452cc595664e8479d27ca43bea716b3d852583a6b286f129ff1abaca1a4b0d55ad53050afc0425429288d4083c14142bde92d68fb249129e86272d49d52489a38eee57ed3797b7194dcb0fb11050da0fa2b73ccb8c36a6b78297bf1fc71e624519a49094709846051d05590f7c4f8e61e643774f4043169f3ec817756ef228e38347e0342d172096df9847d9c2a22096fd226ac7b5b14eeb55266bed049c6076184eaffa4cdbca02d8b4f9b93d762f39258d5b22d18cca3f8b696c40f406cb87eb638d0db75ca8416ab57683f88c3c14bf6aac1fd0997d0f1d7a8a14d3e99633ec5660672069f30e1ade1b7629708a7aafa13d90a10618fd392aa98ec27e95dcf3bdae9def96aae54ab5b64c20b16b3df08148a70701f49e58dacbaa903241d2b1a630badf6833f032baa1bf8cae8d304ee0678fdcb15734a5c8ee6c42458f0bb3fb657b2f75fa961e09f8820eae7c93e889ea45056201efbb244c2316c10824db864da23293c83ce9033ba2645b239595273c894d78253abc994fa1e77ad9bb5b5fb27873710d85178c02ca04584876d3f761128a896cc12fca22e85a69995926f0a164937f658731f8ca5ab59030d7d01c84db78b75f87714a2788bbd00925ec94931cb52e23fa33eedc8920635b0d591d41150200ad639c6c9e4aa6b6a9b30f818aef3e4678e056802ff954954310ce40e4e2f4b81d040eb9da956367233d9119e52a867841e69baaeca93686e4cf831c78684004ac4de106697dbbb2adb635ed63a177970ad4a190dd8d8ce5d15b0b15dbbacfe9b207d966b5dcd40fd600d323853703199759fdc8d298e9eaa34f43e875bb0d578defa215dfbc264bc200c2894de37c8b07a325d86784c6ad3115b1be4e532acbb5d019acbc2ae1c70433ae7770b7b28004df5e7b624d164a57f12f6d810cb5a9515a2733033a5456393c3502aef3d03f1e5e733ac748fc1a8ec933b2a99686cd53ae000b8d4a0a70c56d9716be9fe30ad350e234c024c9c6dfcf30ddec205abb04d"], &(0x7f0000000140)='GPL\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000003c0)={r1, r2}) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000640)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000380), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, &(0x7f0000000080)) close(r4) perf_event_open$cgroup(0x0, r3, 0x0, r4, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x400000, 0x8000000000000002}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp={0x2c, 0x1, 0x0, 0x2e}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)="73e4c75f19b29e41f1339b369cbc1f4e2c807da64b5c9801999e8780a15960eedd0afd67380cd9fc1a1c8c65f99f4f0d9ddf4ae0fcf8ff9d25c75e4be6edfc6524010d0b624c9588279909488c78bc87b32cd7be1b40b677ae04e5b2a61d96c8300ffb52c85809db0f96a6ec54f3f3b01830412df3138f", 0x77}], 0x1}, 0x4000000) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 14:11:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x84}, {0x6}]}) 14:11:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x80, 0x1e, 0xfc, 0x3f, 0x7, 0x0, 0x3, 0x4040, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xdac7, 0x1, @perf_bp={&(0x7f0000000080)}, 0x1c40, 0x9, 0x9, 0x9, 0x0, 0x40, 0x4, 0x0, 0x8000, 0x0, 0x5}, r3, 0xc, r0, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x400000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)=0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6611, 0x0) 14:11:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x4b00}, {0x6}]}) 14:11:40 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 441.576676][T31242] EXT4-fs warning (device sda1): ext4_group_add:1671: No reserved GDT blocks, can't resize [ 441.671625][T31233] BUG: sleeping function called from invalid context at mm/page_alloc.c:5167 [ 441.680418][T31233] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 31233, name: syz-executor.2 [ 441.689883][T31233] INFO: lockdep is turned off. [ 441.694645][T31233] irq event stamp: 0 [ 441.698532][T31233] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 441.705646][T31233] hardirqs last disabled at (0): [] copy_process+0x1dcd/0x7510 [ 441.714943][T31233] softirqs last enabled at (0): [] copy_process+0x1e0e/0x7510 [ 441.724084][T31233] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 441.731284][T31233] CPU: 1 PID: 31233 Comm: syz-executor.2 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 441.741428][T31233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.751504][T31233] Call Trace: [ 441.754776][T31233] dump_stack_lvl+0xcd/0x134 [ 441.759373][T31233] ___might_sleep.cold+0x1f1/0x237 [ 441.764521][T31233] prepare_alloc_pages+0x3da/0x580 [ 441.769637][T31233] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.775702][T31233] __alloc_pages+0x12f/0x500 [ 441.780481][T31233] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 441.787325][T31233] ? __kernel_text_address+0x9/0x30 [ 441.792607][T31233] alloc_pages+0x18c/0x2a0 [ 441.797024][T31233] stack_depot_save+0x39d/0x4e0 [ 441.801877][T31233] save_stack+0x15e/0x1e0 [ 441.806247][T31233] ? register_early_stack+0xb0/0xb0 [ 441.811442][T31233] ? lock_release+0x720/0x720 [ 441.816199][T31233] ? __alloc_pages_bulk+0x8b9/0x1870 [ 441.821481][T31233] ? __vmalloc_node_range+0x39d/0x960 [ 441.826851][T31233] ? __vmalloc_node_range+0x313/0x960 [ 441.832216][T31233] ? __bpf_map_area_alloc+0xd5/0x150 [ 441.837495][T31233] ? array_map_alloc+0x285/0x710 [ 441.842485][T31233] ? __sys_bpf+0xbc3/0x5410 [ 441.846993][T31233] ? __x64_sys_bpf+0x75/0xb0 [ 441.851577][T31233] ? do_syscall_64+0x35/0xb0 [ 441.856168][T31233] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.862358][T31233] ? lock_acquire+0x442/0x510 [ 441.867039][T31233] ? lock_release+0x720/0x720 [ 441.871711][T31233] ? preempt_count_add+0x74/0x140 [ 441.876746][T31233] __set_page_owner+0x50/0x290 [ 441.881505][T31233] ? post_alloc_hook+0x145/0x1e0 [ 441.886533][T31233] __alloc_pages_bulk+0x8b9/0x1870 [ 441.891643][T31233] ? __alloc_pages+0x500/0x500 [ 441.896402][T31233] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.901870][T31233] ? trace_kmalloc_node+0x32/0x100 [ 441.907083][T31233] __vmalloc_node_range+0x39d/0x960 [ 441.912400][T31233] ? vfree_atomic+0xe0/0xe0 [ 441.916902][T31233] ? array_map_alloc+0x285/0x710 [ 441.921873][T31233] __vmalloc_node_range+0x313/0x960 [ 441.927076][T31233] ? array_map_alloc+0x285/0x710 [ 441.932014][T31233] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.937475][T31233] ? vfree_atomic+0xe0/0xe0 [ 441.941996][T31233] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 441.948333][T31233] ? apparmor_capable+0x1d8/0x460 [ 441.953503][T31233] ? array_map_alloc+0x285/0x710 [ 441.958438][T31233] __bpf_map_area_alloc+0xd5/0x150 [ 441.963544][T31233] ? array_map_alloc+0x285/0x710 [ 441.968479][T31233] array_map_alloc+0x285/0x710 [ 441.973241][T31233] ? array_map_update_elem+0x560/0x560 [ 441.978785][T31233] __sys_bpf+0xbc3/0x5410 [ 441.983117][T31233] ? enqueue_hrtimer+0xf0/0x3e0 [ 441.987974][T31233] ? bpf_link_get_from_fd+0x110/0x110 [ 441.993341][T31233] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.998802][T31233] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 442.004525][T31233] ? ktime_get+0x30b/0x470 [ 442.008935][T31233] ? rcu_read_lock_sched_held+0xd/0x70 [ 442.014402][T31233] ? lock_acquire+0x442/0x510 [ 442.019174][T31233] ? lock_release+0x522/0x720 [ 442.023852][T31233] ? trace_hardirqs_on+0x38/0x1c0 [ 442.028875][T31233] __x64_sys_bpf+0x75/0xb0 [ 442.033290][T31233] ? syscall_enter_from_user_mode+0x21/0x70 [ 442.039213][T31233] do_syscall_64+0x35/0xb0 [ 442.043640][T31233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 442.049533][T31233] RIP: 0033:0x4665e9 [ 442.053423][T31233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:11:40 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x5, &(0x7f0000000100)=[{0x2, 0x9, 0x40, 0x3}, {0x0, 0x66, 0x7, 0x5}, {0xc0, 0x8, 0xf8, 0x8000000}, {0x1, 0xa6, 0x9, 0x4}, {0x6c, 0x3, 0x6f, 0xfffffffc}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000a40)=ANY=[@ANYBLOB='mode=00000000000000010,mode=000000000000004,subj_role=oode,uefcontext=root,fowner>\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="0484d1f9042e5ad9d8d79c5fd9907d14d7cc5c"]) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 442.073218][T31233] RSP: 002b:00007f1a685ef188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 442.081629][T31233] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 442.089677][T31233] RDX: 0000000000000040 RSI: 0000000020000600 RDI: 0000000000000000 [ 442.097653][T31233] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 442.105878][T31233] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 442.113842][T31233] R13: 00007ffc6da5b8cf R14: 00007f1a685ef300 R15: 0000000000022000 14:11:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x87}, {0x6}]}) 14:11:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5500}, {0x6}]}) 14:11:40 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:40 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x94}, {0x6}]}) 14:11:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x5900}, {0x6}]}) 14:11:41 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) perf_event_open(&(0x7f0000000a40)={0x3, 0x80, 0x2, 0x2, 0x8, 0x87, 0x0, 0xae, 0x2, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x2f09}, 0xa0, 0x5, 0x40, 0x9, 0x1, 0x3f, 0xbe6, 0x0, 0x2, 0x0, 0x48e}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=00000000000000000001064,subj_role=mode,defcontext=root,fowner>', @ANYRESDEC=r2, @ANYBLOB=',@']) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:41 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:41 executing program 5: mkdir(&(0x7f0000000640)='./file1\x00', 0x15c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0x9, &(0x7f0000000000)=@raw=[@generic={0x1, 0x8, 0x2, 0x9, 0x10001}, @call={0x85, 0x0, 0x0, 0x71}, @map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffff01}, @exit, @exit, @exit, @map={0x18, 0x3}], &(0x7f0000000080)='GPL\x00', 0x101, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x4, 0xf9cb, 0x8}, 0x10, 0x0, r0}, 0x78) 14:11:41 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x9c}, {0x6}]}) 14:11:41 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r1}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0xe8000000, 0xfff, 0x1000, 0x60, 0xffffffffffffffff, 0x871b, '\x00', 0x0, r2, 0x4, 0x1, 0x5}, 0x40) 14:11:41 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000002640), 0x300, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0_to_batadv\x00', @random}) 14:11:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 14:11:41 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000c80)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x10001) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 14:11:41 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') 14:11:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xa4}, {0x6}]}) 14:11:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x2}, {0x6}]}) 14:11:41 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000280), 0x84882, &(0x7f0000000a40)={[{@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0xffffffff9cdc78ae}}, {@mode={'mode', 0x3d, 0x987}}], [{@measure}]}) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0xffffffffffffff59, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/97, 0x61}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='GPL\x00', 0x8, 0x74, &(0x7f0000000240)=""/116, 0x0, 0x1, '\x00', 0x0, 0x8}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000040)='./file0/file0\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x400, 0x10}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x800, 0x8}, 0xc) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x10, &(0x7f00000005c0)={&(0x7f0000000580)=""/18, 0x12, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x9, 0xf, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x6, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x83}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdca, 0x0, 0x0, 0x0, 0x4}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x4}]}, &(0x7f00000004c0)='GPL\x00', 0x53, 0x0, 0x0, 0x41000, 0x7, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x0, 0x101, 0xffff}, 0x10, r4, r0}, 0x78) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={[{}, {}, {}]}) 14:11:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xac}, {0x6}]}) 14:11:42 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 443.703929][T31403] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x3}, {0x6}]}) 14:11:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000001860f5878c37ffe36e1165d14d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f42d0483696f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8, 0x4}, 0x548) sendmsg$kcm(r0, &(0x7f0000000a80)={&(0x7f00000006c0)=@qipcrtr={0x2a, 0x80000000fffffffd, 0x4001}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000740)="cae7a070df92e3d4a9ff0adf2de0bed81f12f52eaee17e67b44c7f158ecfc9e33f9cda90420710669e9e44fb1ffdabd28aa6d13f1701ef6b7fa78d1cd8a6ac1aa68c78a07a0f360adea0917cf29151f80d5742cbb492751569f0800abc61c7012b21afa23fcf", 0x66}, {&(0x7f00000007c0)="161cfcbaca03b5c9942bdd03206a389835cb5a09f37e13b7e325a28592dd35a9a81b34665e5322fe609294d369254c23a4556edb4aff020ea311c58b5f0d954232a4563b2fd0f4becd687241556dc98acc4eb5480b33", 0x56}, {&(0x7f0000000840)="fe558e16d7272cd7072f30513d361784ba11fa671f4ad7af43778f23aaca41ca448a92b41a8fa99396002995da10db74b0ddd0190621a72afb42a35556a5f6a75abc2a0ae639f6f3c732c294da44aea5e5f1e6619da6e5daf84c977844f6776983ad61f708690199c68ce32749f5b0563c1aeaac2f78f6a1459eb878bc0cd9ee3507dd2add9dea4b7d195a5029284df8fee73a57d90157e3da0771fb485418d3aad02994d994a1e03249218ac0225dd068c3a68ff3d678a828bec7aff7b14aa1", 0xc0}, {&(0x7f0000000900)="fd4e3e4f0720", 0x6}, {&(0x7f0000000940)="474e675b9f8ca76e41632b79f1d807ca7179b3601e785814faef2940bcae8ba85561b4ed9970599527a71fac49e1ceb155ddf6f157d84ff8d94ae428cb5d919bc5d9267844e4cf3aa19a37441e0966ba00ec70483f6820e6b2abe7191a5bf128d72a53d3d3a3c8888b6eb12031aae7fab2043910", 0x74}, {&(0x7f00000009c0)="d18c1f3565890323547f248b6b29373d43f62ba6228b712dd24c1e12abf72718490f47cf0006a51f44402644395869271495c3a0b97b6c0b7f5b300267f86251b11d0ce8029bef9757a945262d074d7a", 0x50}, {&(0x7f0000000b00)="414b76628d6ab7f310ed69dd7a1d2c830162c308e82fd368660d0158b1a7fb8de120f6c118ea6e00bf3861abcab7f59275bca348bb728281581be136def569cee5dd24f8b7b48feddae0fb199cde791f04bcf6e36a59c37ed1f62cd20bcd2a63dfa94a790f53a98082648fd93f70da7dbe3ca904abd1661f7122ce5bf8ba31727faf82d4500fae7dbd4b1aca77ac704b4353798567b9ddff4c02dc12d24533d64f3d88f6a5f02ae5cd64985f03d51ecea156766cd9b7ef71d2a182e328bd9a17eb841ad20e562af9e48ac1b84d146a2303ad51bbc36a0964a2cdbcf28e3794e6f6127796c9c90f82f088c3ea1d", 0xed}, {&(0x7f0000000a40)="5637baa402e68f36a4b344c97c58d2c537e4443f45edfda0ed80ea3257603e34e0087e38f767ae6699f6df503f17c4125df9ae5b802c264bd1e9ba6250ba", 0x3e}], 0x8}, 0x840) close(0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0x64010101}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000040)="877f807e", 0x4}, {&(0x7f0000000200)="9296f1616f2d94a67e9160e601236bb063b1b643b60bf8100c8e6028d4b47c44ffa0f15ad9dc4984d1d66087c7cbeaff37b998d80a22de91e6309fa24fe152854cd3e469b5532aac92cc9a9f516c01d7b56834f1066c13d078", 0x59}, {&(0x7f0000000280)="2693b41864fe1c343da86c172068755209b3456bc5b49e892cceb48ca07d4cd27f49b886117aaa067e71dfaf639c1806fad25b4ab486287807dc98b47743d4ec2b9e6509", 0x44}, {&(0x7f0000000300)="f57c7e1522a474c17f54934c1efc2b71cd9a6de0ea8a86f76c07b5077bf7029fe2d8c9b84eb4893c890033f5e25e0fe8d0ee466b6d1e6d2448f7df35bddaf36ac9ce680fd5675b5320876c2df29d4c06b216e0417eebfbf40c167ade10a90d5be0dd5df73c688b4fc57251d476aded5ffeaf52bc23fcbea831222f1a9bada9d47e95fa30b169f6abb1d4d826a3eda408", 0x90}, {&(0x7f00000003c0)="bffdc34970823a8f7b9392a48e8b3fa38729aa79b08d811558afbc0ae4a2c0fd", 0x20}, {&(0x7f0000000400)="01ad62891ee50c1c1f5b1b9850b1576319bc1560d818b82c713185695a2388338200cf9f6ade82de9d1bea23a1a33f3e1433fac817b23af7e904522550f119e00c39560e4091990298a743266041ec14a725f8e82a061a5d6376d71c79e8f6c8a3cda0dc0bd85f4847f05b74a88ca4262ef3cf5b364d8c36a9ab5c06c51e406811f27311e2e323d197af663547dbfd5176820ac31031f841b74a63389f4971b8334927ea", 0xa4}], 0x6, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x108}, 0x40040) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="450000003800052ba4abd32b8018007a032482c137000000080009800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000005480)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x8) sendmsg$kcm(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000000c80)="b223fe5f725c1df94c42cdbde4dd101be5b382655c0d6154ee6610244ed9a9e03e", 0x21}], 0x2}, 0xc005) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) [ 443.806711][T31411] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:42 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socketpair(0x2b, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000001c0)=""/230, 0xe6}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000440)=""/249, 0xf9}, {&(0x7f0000000540)=""/251, 0xfb}, {&(0x7f0000000640)=""/89, 0x59}, {&(0x7f00000006c0)=""/70, 0x46}, {&(0x7f0000000740)=""/165, 0xa5}, {&(0x7f0000000800)=""/148, 0x94}], 0x8, &(0x7f0000000940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x108}, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000ac0)={0x4, &(0x7f0000000a80)=[{0x4, 0x8, 0x1f, 0x3}, {0xfff7, 0x7d, 0x14, 0x20}, {0xffff, 0xff, 0x1, 0x7}, {0x0, 0x3, 0x7e, 0x3f}]}) socket$kcm(0x29, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x7}, 0xb) close(r4) 14:11:42 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000300000001000000c537885994533a63ea8fd5a8e438260cbed89cf8dfd8439f122dc9f62f561e0b3e1c5d1975753ca2a237cc2553559824397992d430d99bd1ee0b3c77a7e2a3196e74a0f7a9595425e86a38b67d4ec1957edf86dcfc7f1c5c", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:42 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}) 14:11:42 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x90}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0xb9, 0x7, 0x1, 0x4, 0x0, 0xffffffff, 0x4020, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x40, 0x2, 0x0, 0x4, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) socket$kcm(0x21, 0x0, 0x2) 14:11:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x4}, {0x6}]}) 14:11:42 executing program 2: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000bc0)}, 0x0) recvmsg$kcm(r0, &(0x7f0000017340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000017240)=""/219, 0xdb}, 0x0) sendmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @multicast2}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000100)="1b300559a541f6652d8507f9382a96168def80086dbe34625307941fa2977d57f48f4d8159ecf7c0b63f3953c117163dd958769083726c3c4a26d0274d78ca978cff71a5dcfe0ec0cec5b27eb9f5abd197339809da887e45b725d9e4713e417c3b740b72f4dc0eae69a20a3be187126ce43e3168fab8d9109e0facb8843dc7d35c285a9e9a9f391fe910718687d93ffcaabb39a0c00339e8c172f89095c52d3888beb778a2a297cf8677bec0525903bc073b5a2a4621cac9c5aac109dfa794e34a484b67a5c9e462cc96af413cfa8c7def5d16ff3746b9f30dcd7c32e73cd95f4d451e36a79a9a36bf5de7f58999163fbd5e", 0xf2}, {&(0x7f0000000200)="580b2795dc69b046c51ccd655f3b72911c53b19ae92d5463e7f3b17cf0f719a4bd5659ae6030b5112c27adadb0ac0aa0fc39a8215370c6bb3f665553e363cc9ab9ad7358f16931778a0154339e3415ee1660be1d99866ed34a3ca3c4d60d3e0c044bdaa778af3107889573b5f4554b2cd9e7f1a1d41e26273ffb25594b8ff02676416abbcbf7f8a2f1ab61468d1e700163230495d027d0742f6941304099e6537d3de917b48a399b0dec2b253d09aa408e66880ea1d272f1ce275c6253d401b82e3b85e8ca06048d7227e4cfc15604d4449b431bf1e46fb652e732ac0ac177e7d0153fe482501b", 0xe7}, {&(0x7f0000000400)="8675a4d59a0b34a39f153a3072cc337846151b5787ad1cca536d2022a7c1ebfc9fa1f63636d8f0621ce1efacc0af735158b00ab6e805b363bd4efd1c43cd89e4dff53460f8409857c3b43aa3ff31ca96fb7f93e396bcc512fcdb696ee58cfff25e925e0e3e9b88cacca1941c4c2d3945482293b765401d3db436ee37a1def23d58d4ca2fb27f0269785fae72e8", 0x8d}, {&(0x7f00000004c0)="226236fdc209613b3af936f4c1bda496efb5a7cce8dc1d37f8aaf41eb910b82f85b9bc1ea2e26d9f6e2b65f774493ec6f541a1e576e5623d0bafc932442f46de845fbd46e432bfd31dade78643b0324a62d06dc6c8ddc7dca428f206e78b9fde0b22002951bdae543953c8a969ac7d26445b06a85c1721f0ff4f5608d8f4374d3842ae45969d441d64120ecac638fa6c0005cc93fa2944ec51ca2be07400c5", 0x9f}, {&(0x7f0000000580)="fc217c58a3b927c7a2f88c6743579ca0fc725cb1e9153054fd3e593e5a06d43d0b33973ff98b6491316c8a3b0b29e4409ec98a3057fbd259c25ff77ea23fafbd4026f697a6af60a80b4462114907aaa85e05498294cfd79d63429b88d1a4b948cbe4d370d55c18d990648414834b4dd30f419dbf420a5c8d69fcb00024faead3187367a18a9190e913259544110c6323eed10cb9432bbc07b2d4cbbf85e28bcb4fdff17a303ce5845efa39cdc4b99478b40873bd19b175f2cb0dad83ac58a4ad605eed3f1f32977020eaa8d93700249841702ab4e1b2ea097a99", 0xda}, {&(0x7f0000000080)="bf5684f5edfcd9540a07b3da8fa4e5e16272754b58", 0x15}, {&(0x7f0000000300)="cd2b06e4", 0x4}], 0x7, &(0x7f0000000700)=[{0xe0, 0x117, 0x4, "d41cd0306ee627a977c53100f5c0f3e6d518ac12afde4f7603a662735a2dc629fab2a41835aacbe07c7813a63fcce299a19fc2a439beb4523e00982677a7faaa68f27b6920e37a41e0a6f376ffe6f9c3915054cbf4d563a1b7b55f460afce5521dd4b9a710246db199eea9c3246bc79910527c8f964eab7ecbe0b6a5fe62d23ee5c6fc4f89aff3838c49e2560fef6c563324056052cf895a2ef6db531229f6f762ab3e53b2bdfcdeb655fb025ff4e4a89c93f64656d86ce71cca767611d4f954aaabe78ccb52199b0d4b"}, {0xf0, 0xff, 0x9, "fa6008bcbae0b7e35398544fdd4f01eee25d5f0b01f86a6bd25e1760b9d0e51ebeeac465c230bc308a45f8227a138c2831eddfc2273c1aa2ab13050af2c722b7bc0dc532cc78ee82bea3152d3a9ec215be2d0593d10a4ebe8a7b1dc57950bb7d0d6cf704222abdaa4384e947abaf6988dc342ab4580b939250bb934b7494d3f06ae68b7f1cdcc770cea2a0218a3348e033372dff42b427bbf7f41216a61a1313e56a2b41efa42240021df72c2a42bf06cba17890be6aaa41d5555ea498a725f3cd2beea340cc70d8eeb59fccff3f6968729cd634028cfb24d6"}, {0x78, 0x84, 0x2, "b6278139ce723450fc812cf77a5bd924baba2b0b133654de56e214a8978def4c046f25bfe2eac59c0701f0b1241d0b6d6bdfa9b2c39d96c411568f24cdad683febd750d75be5029bfde418ca1fec83a458de76392feda4f66d1446203aabdd4684"}], 0x248}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) 14:11:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x900}, {0x6}]}) 14:11:42 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0077322d478ec6d981d71a3c2dd01f13ff6ea75d5aba2cb9883d9d"], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:42 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 444.401946][T31462] device wlan1 entered promiscuous mode [ 444.470397][T31477] device wlan1 left promiscuous mode 14:11:43 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000bc0)=ANY=[@ANYRESOCT, @ANYRESDEC=r0, @ANYRES16, @ANYBLOB="30b94f446d43a2dac9218ef76594263b3243c31bcf72445db0f98bef8dbcb04f5e784c15b09a733900038552aa598e54fffdd9486adfed084034851f7d7eea8902212d9d0385cac9252f9e9835e9ded7d97762d9d4d2c69c865558a9b21f4a65c9e839a7f0cec145ec", @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYBLOB="b09fb77fbeeeabde", @ANYRES32]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xfd, 0x0, 0x7, 0x11, 0x0, 0x0, 0x840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x8, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}, {&(0x7f0000000ac0)=""/156, 0x9c}], 0x4, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) close(0xffffffffffffffff) [ 444.612814][T31479] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:43 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) [ 444.668262][T31469] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 444.696477][T31462] device wlan1 entered promiscuous mode 14:11:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x5}, {0x6}]}) [ 444.729081][T31473] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:43 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40844, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000240)}, 0x204, 0x8001, 0xcf, 0x5, 0x41, 0x5, 0x98, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x18) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2300, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe78e}, 0x0, 0xffffffffffffffff, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x3, &(0x7f0000000280)=@raw=[@ldst={0x0, 0x1, 0x1, 0xa, 0x0, 0x10, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x80}], &(0x7f0000000340)='GPL\x00', 0x8, 0xe, &(0x7f0000000440)=""/14, 0x41100, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x6, 0x2, 0x2}, 0x10, 0x2c287}, 0x78) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x2, 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000f00)="b377adfb87057a9c31acdc7440959912ec742b8d2a61da1f9d5ed3221f68e7b70677df98", 0x24}, {&(0x7f0000000f80)="5aa3e7e63643e982626821831e4da83f85b1bae21a183113c13e23eea26d30e4e5a6bf9711d5f828ba4c31f017eb3b28960dcba2b0b58a7eade4269e060e7013580ad9e6a24b65dc597e9d27b7dc6b7494d1bf337270d216e9b158c3439aeb44a7bb6e68001a7de17e3fd306e3fb9c1361", 0x71}, {&(0x7f0000000480)="1d5cf7e803000000f9ee9036698bc930d719b02171a9662f07ce3f8d39b200a3823aeceefec00154ca00419947d1c64ed6ca4d81441762af81849241eecf705ac881c059fc9d254e1066db2810ac0beb2b0c3d81cac66c3a915436480d927b61953558719abeb9cdf92291d155d380ad9a40e544d7777e8dda481dd5378d5f5ba2e3486bcb0f15a33bd1b3b4e7e614750e02da96b4df6b3ca961305c3158c0493657ee9f23ba2bf511be67be22a1b4c1752634076b4f38fbbd3972c84ad71466e35be620cc9835d3afa024d52f85411063031a1de9e2ecdca7bf721725d42c705b98bfcbd898db5f493a0738b2370b045f46ebf881", 0xf5}, {0x0}, {&(0x7f0000001080)="0cc3e5c28cec67f2472acdb06e73ec112a22d74427cc9e6988f510", 0x1b}, {0x0}, {&(0x7f0000001180)="c99e79bae308f38f6ce1b43407a802d56552b9266f2915bfbe9f3b53cfe3b1795d53e7c2df75f790f5859a41bd20dd8056736bbda092efc1046519962bed41aec23b0c1208feaf8013725b995a68cff15cc83caa21b8e4ab544faa4da2ac495206732c860ae4a0c0d00062286279b33264077a3ac44640ef98f9f547682cbf49ada7da480a0a2bbb758027956a162875294fd8", 0x93}], 0x7, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0xf8}, 0x44800) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005300)={&(0x7f0000005000)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000051c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000005200)=""/254, 0xfe}, 0x40000102) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x9, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000100008000000000080000008500001000000000d1593fd7"], &(0x7f0000001740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x9, '\x00', r4, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000005340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000005380)={0x1, 0xb, 0xe1800, 0x5}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x31d2) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x206, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) [ 444.773258][T31469] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xb01}, {0x6}]}) 14:11:43 executing program 2: socket$kcm(0xa, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000180)=[{0x20, 0x84, 0x2, "fec000000000000008"}], 0x20, 0xfe80}, 0x0) 14:11:43 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000a40)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=00000000000000000001064,subj_role=mode,defcontext=root,fowner>', @ANYRESDEC=r2, @ANYBLOB="d460bc129f04ea862d2a47cd98921121d6b76f1d231a77b5681d9198feeb18e0bb29839d2b80fb2a0caded2acd9bbaee15c572f30ee96e8d8101f0c4846425210d283417941e45809af6de27c6d5aa2dae5ff3328a4dd9b49d5d386f093a5ec839ee01bb8cb8548b3079ce0e51e3334f8e0083d16866dbe3c7b965cfbeb96286d1a690c9547e554ba457ee5bb65c6b9f182cbda4505ecaa7c30be720a76e57c296bae0889f43f4c366ff935f356a08a9702cebe82fb63df2aea208d0c4df354e3152b702"]) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x6}, {0x6}]}) 14:11:43 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x2042) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x234}}], [{@subj_role={'subj_role', 0x3d, 'mode'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r3}}]}) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x1200}, {0x6}]}) 14:11:43 executing program 5: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xe4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xaa6424c857361f92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0xffffffffffffffff, 0x1000, 0x0, 0xe0, 0x1, 0x457d, 0x0, 0x9, 0x0, 0xeb6}, 0xffffffffffffffff, 0xf, r0, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000015c0)={0x1, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_da_update_reserve_space\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='$@!\'[\x00') write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x8) close(r3) 14:11:43 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x3}, 0xa61b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200d, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x7, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x5, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000800)=""/186, 0xba}, {&(0x7f00000008c0)}], 0x3, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x10040) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='mode') mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', &(0x7f00000003c0), 0x45000, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f00000005c0)=""/105, 0x69}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14b9000000001472ad58ec92f887000020f94b8ee3a62bc3f4efdecd70f44116a03bd4ca9a86eb3045178069af9d833c16db62ef277f2df0a8f091fec06abbbf9a9ae4bd01e09b56e2bec3258ee5edf236404818b5bb1a818b2119bea15284b600fb929fa1377bae44547563fbb9ba73fee83b69b210509dff994745792676a6ace10cea084bfae512b9f1dd960191986957d3e25545003d304f79656e30f90696c5e551065ebbfc9ad8497d003cbaba499352508d7336d83cfa93a9e34944808f9f0640f3ce6a5d3959226589edb6c5408fc9203c5032190c3bc2fc572e9c005839442ee39516832f8b69e439800744cda251975a3cf50b", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x98}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0), 0x2030892, &(0x7f0000000a40)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=00000000000000000001064,subj_role=mode,defcontext=root,fowner>', @ANYRESDEC=r3, @ANYBLOB="193a901c8d7c2a1b1a30c441e810c20531b14f016a6b"]) socket$kcm(0x29, 0x5, 0x0) unlink(0x0) 14:11:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000200)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'ipvlan1\x00', @random}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x400, 0x80, 0x4, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) r4 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000001340)={0x0, 0x80, 0x4c, 0x4, 0x0, 0x0, 0x0, 0xc9f, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x6}, 0x0, 0x3, 0x70d, 0x5, 0x7, 0x8001, 0x81, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, r4, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000013c0)=']//:*@\x00') perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x1f, 0x2, 0x0, 0x1f, 0x0, 0x8, 0x6080, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x5}, 0x52ac1, 0x897c, 0x400, 0x1, 0x4, 0x7f1f, 0x9, 0x0, 0xfffffffe, 0x0, 0xffff}, 0x0, 0x6, r5, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x33000) 14:11:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x80, 0x7}, {0x6}]}) 14:11:43 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000007c0)={'ip6gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbecb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x14) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000200)=ANY=[]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0xd416}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x10) mount$bpf(0x20000000, 0x0, &(0x7f0000000140), 0x2001004, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x700000000, 0x7}, 0x2b80, 0xeed, 0x0, 0x127c1dc406b80be, 0x0, 0xffffff3b, 0x4, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000900)=[{0x0}, {&(0x7f00000008c0)}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10040) mount$bpf(0x0, &(0x7f00000008c0)='./file0/file1\x00', 0x0, 0x45000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x2fb}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<