last executing test programs: 10.098665231s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 8.130388683s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 7.274893554s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10004, 0x9, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={r1, &(0x7f0000001040), &(0x7f0000001080)=""/184}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059", @ANYRES64=r4], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000007001811", @ANYRES32=r5], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='mptcp_subflow_get_send\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x20001412) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x200000000000025c, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xcbf7c1b3e704aa2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000140), 0xfffffffffffffdef) 7.195551756s ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x29, 0x80000, 0x82c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9e, 0xcb}, 0x0, 0xfffffffffffffffe, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20010, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xcb00, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xa6, 0x7f, 0x8000, 0x850, 0xffffffffffffffff, 0x4000005, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000380)='ext4_writepages\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001}, 0x48) 6.005064509s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 5.249831565s ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x29, 0x80000, 0x82c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9e, 0xcb}, 0x0, 0xfffffffffffffffe, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20010, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xcb00, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xa6, 0x7f, 0x8000, 0x850, 0xffffffffffffffff, 0x4000005, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000380)='ext4_writepages\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001}, 0x48) 4.158315902s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 3.558207434s ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x29, 0x80000, 0x82c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9e, 0xcb}, 0x0, 0xfffffffffffffffe, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20010, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xcb00, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xa6, 0x7f, 0x8000, 0x850, 0xffffffffffffffff, 0x4000005, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000380)='ext4_writepages\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001}, 0x48) 1.789247106s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 1.69350196s ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x29, 0x80000, 0x82c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9e, 0xcb}, 0x0, 0xfffffffffffffffe, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20010, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xcb00, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xa6, 0x7f, 0x8000, 0x850, 0xffffffffffffffff, 0x4000005, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000380)='ext4_writepages\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001}, 0x48) 761.597553ms ago: executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bond0\x00'}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{}, &(0x7f00000000c0), &(0x7f0000000100)='%pi6 \x00'}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6612, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0), 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000d80)={0xffffffffffffffff, &(0x7f0000000bc0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x74, 0x0, 0x0, 0x1ff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x23, 0x0, 0x0, &(0x7f00000008c0)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x15, 0x0, 0x0, 0x7, 0x0, 0x0, 0x14000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000280)='io.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000c8500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 747.019556ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1d, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"/849], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x90d}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071122900000000009500004000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x9, 0x2, 0x9}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r4}, 0x0, &(0x7f0000000100)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)='%pI4 \x00', 0x2}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'batadv_slave_1\x00', 0x200}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 613.686376ms ago: executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x6a, 0x1, 0x20, 0x9, 0x0, 0x5bf, 0x54020, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100), 0x1}, 0x1080, 0x1ff, 0x7f, 0x1, 0x80000001, 0xfffffff8, 0x401, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x3, 0x3, 0x1, 0x0, 0x540, 0x88, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040)}, 0x140, 0x3, 0x0, 0xf, 0x0, 0x5, 0x5, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x9, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x5) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000280)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @alu={0x4, 0x1, 0xa, 0xa, 0x0, 0xfffffffffffffffe, 0x10}, @exit], &(0x7f00000002c0)='GPL\x00', 0x0, 0x36, &(0x7f0000000300)=""/54, 0x41000, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x1, 0x101, 0x1ff}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[r4, r4, r4, r1, r4, r4, r4], &(0x7f0000000400)=[{0x0, 0x4, 0x3, 0x6}, {0x5, 0x1, 0x5, 0x6}, {0x4, 0x4, 0xb, 0x9}, {0x1, 0x5, 0x9, 0x7}, {0x1, 0x5, 0x7, 0x9}, {0x0, 0x1, 0x7, 0x81fb73468b082c5f}], 0x10, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000540)={0x0, r5}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x1000, '\x00', 0x0, r4, 0x5, 0x4, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r6}, &(0x7f0000000600), &(0x7f0000000640)='%-5lx \x00'}, 0x20) openat$cgroup_freezer_state(r0, &(0x7f00000006c0), 0x2, 0x0) r7 = openat$cgroup(r3, &(0x7f0000000700)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r5, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x66, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x6, '\x00', r8, r9, 0x2, 0x1, 0x4}, 0x48) socketpair(0x18, 0x4, 0x1, &(0x7f0000000b40)) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x5b, '\x00', 0x0, r9, 0x0, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d80)={r10, 0x58, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x12, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x68, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x2, 0xe, 0x0, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000e00)=[r10, r6], &(0x7f0000000e40)=[{0x1, 0x4, 0xe, 0xc}, {0x3, 0x5, 0x4, 0xa}, {0x4, 0x2, 0x5, 0xb}, {0x3, 0x3, 0x0, 0x4}, {0x1, 0x1, 0xa, 0xa}], 0x10, 0x7fffffff}, 0x90) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000f80)={'vxcan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}}) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002280)={0x18, 0x1c, &(0x7f0000001000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@generic={0x2a, 0xa, 0xd, 0x100, 0x400}, @jmp={0x5, 0x1, 0xc, 0x7, 0x2, 0xfffffffffffffffe, 0x19}, @alu={0xd7ea9fac26969ba8, 0x1, 0xa, 0x1, 0x3, 0xfffffffffffffff8, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @map_val={0x18, 0xa}, @ldst={0x2, 0x2, 0x1, 0xb, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001100)='syzkaller\x00', 0xff, 0x1000, &(0x7f0000001140)=""/4096, 0x0, 0x63, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002180)={0x5, 0xb, 0xed1, 0x1}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000021c0)=[r11, r11, r10], &(0x7f0000002200)=[{0x2, 0x2, 0x4, 0x4}, {0x3, 0x5, 0x4, 0x1}, {0x5, 0x3, 0xc}, {0x2, 0x4, 0x0, 0x3}, {0x2, 0x1, 0xc, 0xc}, {0x0, 0x2, 0x5, 0xc}, {0x0, 0x2, 0xb, 0x1}, {0x5, 0x5, 0xb, 0x6}], 0x10, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002340)={&(0x7f0000000fc0)='qdisc_dequeue\x00', r13}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000002380), 0x52200, 0x0) r14 = getpid() syz_open_procfs$namespace(r14, &(0x7f00000023c0)='ns/mnt\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002600)={0x11, 0x4, &(0x7f0000002400)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_val={0x18, 0x7, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @ldst={0x3, 0x2, 0x3, 0x3, 0x1, 0xfffffffffffffffe, 0x1}], &(0x7f0000002440)='GPL\x00', 0x33, 0xe0, &(0x7f0000002480)=""/224, 0x41100, 0x4, '\x00', r12, 0x0, r9, 0x8, &(0x7f0000002580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000025c0)={0x5, 0xa, 0x3f, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) openat$cgroup_procs(r4, &(0x7f00000026c0)='tasks\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000002700)={'virt_wifi0\x00', 0x400}) 610.791897ms ago: executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f0000000200), 0x0, 0xe6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000002c0), 0x8, 0x8000006a, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x3f01) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x20000000, 0x10000, 0x100, 0x20, 0x1, 0x0, '\x00', 0x0, r3, 0x3, 0x5, 0x3, 0x4}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x7, &(0x7f0000000700)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x65}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000740)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x6}, 0x90) socketpair(0x19, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x50}, @generic={0x2f}, @initr0, @exit]}, &(0x7f0000000000)='syzkaller\x00'}, 0x80) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r7, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x3, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xe0, &(0x7f0000000800)=""/224, 0x41100, 0x1, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x8, 0xe9fb, 0x2}, 0x10, 0xffffffffffffffff, r5, 0x7, 0x0, &(0x7f0000000c80)=[{0x5, 0x4, 0x7, 0x8}, {0x2, 0x5, 0xa, 0x5}, {0x0, 0x2, 0x10}, {0x0, 0x5, 0xc, 0x1}, {0x2, 0x1, 0xc, 0x5}, {0x3, 0x3, 0xc}, {0x3, 0x1, 0x2, 0x9}], 0x10, 0xffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 570.821713ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x5, [{0x1, 0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000040)=""/249, 0x3a, 0xf9, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x6) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327edb1fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18c65ae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a4693986852ffffae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c9068000000bc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b60c2499d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d7676074a0bde4471414c99d4894ee7f8139dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d409731091f4fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444e2de02f47c61e8e84ff828de453f34c2b08660b080efc707e676e1fb4d5865c0ca177a4c7fbb4e829ab0894a1062b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e8380100632d03a7ca6f6d0339f99530c53c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026def743f1213bf817becd9e5a225d67521d1128eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979030000007081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661351df747aa6a65872dfdcfa68f65bd06b4082d43e121861b5cc09b986bf56c747d9a1cc5b506892c3a16ff10feea20bdac89bfb758cf3500000000000000000000000000000098e6db5a96055e764a3bfd4ccb20d2e800994f4b602d25b2c076f21c7102687e054bb93b2d013be6227fd99902b074c0de00733128c81c48c5e140b17d71ac48f137d10798c4272826d2ba55bbda0059636528c132ed06759d880d1bc291a76456ed7ee8bcb392fdf886dbc74879ec4b831904d7c101ebbaef3c0ae6d0cf0000000000000000000000000000000011cb735f66a559ef0cdb5163a15c0bb986474bf5d9542e3e48805ce53127e4c076d69d868df543717aaaa07d7aca056f7f036c2bcba0795d1a64868a29ac5321b3cd6ef5b1a741afc7124ee3df174c1d68b45fcfd7e531090ceae2f05536a4d5d6a4081e743827fb9c031d1fc9f195c2da189c49eaed6c30c71da0452e502ef393efeb02ebe82b1851cae5fa7c958ba23110b5e0e5b890803f28a356b2920e74564e0f8377b0ba5187fed2882b4780a1bcb583f1cb1470003ef9b592b9461328cfc01ebfce0ecdcea714a517dc40000000000000000000000000006bd0561e1cc72880cc3ec1bdf35eb670a9040e3b53cd826b94ad8aeb014e74787fe89fb3247a87d8bfb6d400142369f88964708d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 487.936096ms ago: executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x7, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001040)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x5}, 0x10440, 0x0, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x2000000000000058, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x63}}, &(0x7f0000000480)='GPL\x00'}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100002000f20600000000120000f1850000007d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xa12a, 0x508d, 0x0, 0xc04, r1, 0x9, '\x00', r3, 0xffffffffffffffff, 0x1, 0x5, 0x3}, 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r5, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x1c74}], 0x1}, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x0, 0x5c}, 0x48) 392.17533ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4b49, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)=""/200}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000500)=@l2tp={0x2, 0x0, @broadcast, 0x1}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)="163129d795e6a2dd63edfe065933594fcc02be9838d9d7b376903ea0987b3695b2f6dd539dbc758845528a25cc7a84f7b312dcd28a727783cdee4ce16c236646f1f22325671acfd8a6e5581333e119ee1190b39cc1c3506e1154b17b8681969a5bac2783a1989f77dc56a2ba975f59d18e25dff35e38bf688b59074e84d1183e80b766118e0fc73f288da01efbd1e542676bcaeb88a9089d7a4c47f4237be7a0784eddf8002a8c747790baef306a0fb0358fd42cf729cc", 0xb7}, {&(0x7f0000000340)="e554e86d18cf442480794da969fcad37d59d86922df7d59d801617315e2a50af71a5362ebc17d802322cdb6b312971a979e5", 0x32}, {&(0x7f00000003c0)="7683ad15baeef6cc78918cf9c289f9dde696444d642a10304f8ee3f74c3b9b8996af2e2696d40177203b8b3d834f52be0d1b35d421483e666391268a11ce", 0x3e}, {&(0x7f0000000640)="ffdaaabb2f4c91873eba620bc385840423a036a5d9e550a9b9ce1e8cbdd26fbd2bb127a0fcf0af4d5f01fc3032146be1515cba1836913032c86cb23c42d5e1f9f73ef997b0bd2f96cb0d0937fdba2fb7ada895ed5e3c4a7c20d62b9cbb621fad018deddab4f1c32a851dcd9889dbbf44c3d9b54fd2d71b", 0x77}], 0x4}, 0x4000800) perf_event_open(&(0x7f0000000800)={0x2, 0xc7, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000000000000000000085"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xfc2e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='ext4_ext_convert_to_initialized_enter\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='ext4_ext_convert_to_initialized_enter\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1fffffff) sendmsg$tipc(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x40000c1) write$cgroup_int(r5, &(0x7f0000000200), 0x42400) 378.186822ms ago: executing program 2: r0 = gettid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rxrpc_rx_icmp\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x0, 0x3f, 0x7f, 0x0, 0x98ad, 0x20, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x75ef, 0x0, @perf_config_ext={0x4, 0x1}, 0x8000, 0x0, 0x8001, 0x0, 0x2cb64000, 0xbc8, 0x8, 0x0, 0x2, 0x0, 0x4}, r0, 0x9, r1, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x8, [@union={0x9, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0xa, 0x2}]}, @ptr={0x9, 0x0, 0x0, 0x2, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x66, 0x0, 0x4a, 0x4}, @fwd={0x10}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x4}, {0x5, 0x4}, {0xa, 0x5}, {0x7, 0x1}]}, @enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0xd, 0x8}]}]}, {0x0, [0x2e, 0x30, 0x61, 0x2e, 0x61, 0x0]}}, &(0x7f00000001c0)=""/143, 0xa0, 0x8f, 0x1, 0x8001}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000002c0)=0x9) close(r1) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x8, 0x1, 0xf9, 0xf8, 0x0, 0x2, 0x7690, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x2, 0x3, 0x6, 0x1, 0xf5, 0x7, 0x6, 0x0, 0x100, 0x0, 0x9}, r0, 0x4, r1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x7fffffff, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f0000000440)="75d39c830f31a761a366226e3304"}, 0x20) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000004c0), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r3}, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r4, &(0x7f0000000540)="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", &(0x7f0000000640)=""/80}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r4, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x0, 0xed, &(0x7f00000007c0)=""/237, 0x41100, 0x5a, '\x00', r6, 0x1c, r4, 0x8, &(0x7f0000000980)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0xf, 0x6fa, 0x10000}, 0x10, 0x1ad40, 0xffffffffffffffff, 0x6, &(0x7f0000000a00), &(0x7f0000000a40)=[{0x3, 0x5, 0x1, 0xc}, {0x1, 0x4, 0xd, 0x9}, {0x2, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x10, 0xa}, {0x3, 0x3, 0x6, 0xd}, {0x2, 0x5, 0xd, 0xb}], 0x10, 0x15}, 0x90) r8 = openat$cgroup_ro(r4, &(0x7f0000000b80)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r7, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000cc0)=[0x0, 0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0], 0x0, 0x45, &(0x7f0000000d40)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001000)={0xffffffffffffffff, 0x8, 0x10}, 0xc) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001040)={r5}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x8, &(0x7f0000000bc0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe1b}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000000c00)='syzkaller\x00', 0x1ff, 0x8, &(0x7f0000000c40)=""/8, 0x40f00, 0x45, '\x00', r9, 0x25, r8, 0x8, &(0x7f0000000f80)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000fc0)={0x4, 0xd, 0x6, 0x80}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001080)=[r8, r10, r2, r11, r2, r8, r2, r4, r4, r4], &(0x7f00000010c0)=[{0x3, 0x3, 0x4}, {0x5, 0x3, 0x1, 0x9}, {0x0, 0x4, 0xe, 0x2}, {0x5, 0x2, 0xf, 0xb}, {0x2, 0x5, 0x5}, {0x4, 0x2, 0x10, 0x8}], 0x10, 0x42}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001200)='GPL\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000012c0)={r8, 0x58, &(0x7f0000001240)}, 0x10) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001300)={'macvlan1\x00', 0x8000}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001340)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x92, '\x00', r6, r4, 0x3, 0x1, 0x3}, 0x48) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002440)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x10, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x7d}}]}, {0x0, [0x2e]}}, &(0x7f0000001440)=""/4096, 0x47, 0x1000, 0x1, 0x6}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002500)={{r8, 0xffffffffffffffff}, &(0x7f0000002480), &(0x7f00000024c0)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002540)={r12}, 0x4) r13 = perf_event_open$cgroup(&(0x7f0000002580)={0x0, 0x80, 0x9, 0x5, 0xd6, 0x0, 0x0, 0xc75, 0x41002, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x7, 0x9f}, 0x481, 0x5, 0x1, 0x5, 0xcb2, 0x9, 0xf800, 0x0, 0x98, 0x0, 0xa49}, r4, 0x5, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x40082406, &(0x7f0000002600)='\x00') 348.156037ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.usage_user\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000400)='cpuacct.usage_sys\x00', 0x100002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x2008, 0x8000, 0x0, 0x0, 0x4, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r3}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@map=0x1, 0x36, 0x0, 0x1000, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0]}, 0x40) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfe1b) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) close(0xffffffffffffffff) socketpair(0x10, 0x0, 0x15, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x23, &(0x7f0000000000), 0x4) recvmsg$unix(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x34140) sendmsg$unix(r5, &(0x7f0000000480)={0xfffffffffffffffd, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe38, 0x61, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) 321.638321ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001380)=ANY=[], 0x0, 0x3, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000c000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff3d35010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925cd3ded25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf72a4de1c2ea17f04537fc211576846ac629d1d93265ba4580047a9dc88de358ce795731891a2031de4e09740c64e5506f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfadfe6d4421c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2a304e06543b56c35235d78b7a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664a44e22b72e843e7cf55f394cf75d1cd3ee79a25fb98cc45b3fde43e42e150d4a2fddd9a97677400ef0bd697d135324ce480c2960344de346bd511dea4ff7a07400b2d12dd1a8c4c300aee5f948777085ca142b79dfc3aca5fadaa0532ab0572169f68584ff2ee063bc7e75ecd5cc8973464629ba236e3ff97f6033d0800000000000000cef54a60aff12590a50ef147e3e640193d00263003a4ef412420a070dd0327e47c8c7abb77b4b53874788d7e2e5d554de4713db957afb56d4673f1b904c5a317d3670003000000183fb7d36e173044f4ab341d63afe57d9099"], &(0x7f0000000100)='GPL\x00'}, 0x48) 294.061555ms ago: executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661", 0x5c}, {0x0}, {&(0x7f0000000300)}], 0x3, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000100) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00002c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)=0x10000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0x1, 0x58, &(0x7f0000000180)}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="140100000000b2000500000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r8, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480), &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x0, 0xa1, &(0x7f0000000840)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x8000d0, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r9, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b40000004000000061173800000000001e070000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4}, 0x10}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000eeff840000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x3}, 0x8) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x3, 0x3ff, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x4, &(0x7f0000001700)={r11, 0x0, 0x0}, 0x20) 225.767186ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffa3}, 0x48) 221.407386ms ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x5, &(0x7f0000000480)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ldst={0x3, 0x2, 0x0, 0x1, 0x5, 0xffffffffffffffff, 0x8}], &(0x7f0000000000)='syzkaller\x00', 0x2, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', r2}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r3, 0x0, 0xc6, 0x2e, &(0x7f0000000780)="e0591cedca3b72d9c02d2dd5ff977c1d63022acb1f58e846013ab6d4e5600977f790f7face49470f01138f59a5ad1126713d2dedeefa1215714cda75b3a1bcc7aa7dfe2bc906bd96259503960cc71a93b87da6ce94801f602a1ddadb566b0cc8f6b66ee2da3afc8efdbd0af36e57fc61257e41b5bffffa14cf9160e26911b01cc412fbdd2c48ce28c253894770550599fda0400c119f176b8da7a0e413610754f08016c0021f54e3fc668807347c48532016625ba5f67cbd128ab4a652c5279fa3e2a0c0ef89", &(0x7f00000004c0)=""/46, 0x101, 0x0, 0xa3, 0x68, &(0x7f00000005c0)="cc8d42d6531a817b511e2edd004d0936ae6f30e6205d58e3115ffd95960db89772c0df1dae0f191b5e8de65b0b257570c56f08130d6b52efc2aae7425a5e58c2a29c47ed181923e49e510c02ec162d38aa19e9465edf9025a9a4ffc542eafdbdf0f94c33c362093e89092daeeba7ab16fbbc9c9e7fd54e0594549cd81dc755f25e7dfd9a5620cfca024975320709449b0cd10758090141e08a65dd8d4a79d9282e90ba", &(0x7f0000000500)="ca4cbb3f3a3a34a720f61036055620d86655ebd567acdf787e5187f3dd82fd9d5da7abfed80efd6f556c292a6f5d0d9319555a76091ce2b014579937c67c776844907551d5c0a2e474644b7be40629e4f46ce3ba1f61b0f8a828045f0030c95e7a0e7963f552a1a8", 0x2, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa000022eb"], 0xcfa4) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f00000002c0)=0x84005) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x4) write$cgroup_type(r8, &(0x7f0000000180), 0x2009) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711025"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000040)) 207.181079ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x20, 0x7, 0xa7, 0x0, 0x7, 0x18, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0xffffffff, 0x400}, 0x4, 0x7d, 0x9, 0x8, 0x7ee2, 0x9, 0x738, 0x0, 0x8001, 0x0, 0x2}, 0x0, 0x9, r2, 0xa) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0)=0x1000, 0x12) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1503"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) close(r4) ioctl$TUNSETOFFLOAD(r3, 0x4010744d, 0x20000000) close(r3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x45}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192}, 0x80) socketpair(0x0, 0x4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x4, 0xb, &(0x7f0000000400)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @map_idx={0x18, 0x1, 0x5, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @generic={0x0, 0x2, 0x7, 0x5}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}], &(0x7f0000000480)='syzkaller\x00', 0x1, 0x40, &(0x7f00000004c0)=""/64, 0x41000, 0x44, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x6, 0x10000, 0x6e}, 0x10, 0xffffffffffffffff, r0, 0x1, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r1, 0xffffffffffffffff, r0], &(0x7f00000006c0)=[{0x3, 0x3, 0x9, 0x9}], 0x10, 0x100}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={@ifindex, 0xffffffffffffffff, 0xc, 0x0, 0x0, @link_id}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r0}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000100)='cpu&\t0&\t\t') 81.936108ms ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x29, 0x80000, 0x82c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9e, 0xcb}, 0x0, 0xfffffffffffffffe, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20010, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xcb00, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xa6, 0x7f, 0x8000, 0x850, 0xffffffffffffffff, 0x4000005, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000380)='ext4_writepages\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001}, 0x48) 58.221491ms ago: executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1d, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, {}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @alu={0x4, 0x1, 0x5, 0x4, 0x3, 0x40, 0x4}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @ldst={0x1, 0x2, 0x2, 0x6, 0x7, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0x5, &(0x7f0000000140)=""/5, 0x41000, 0x6a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xa, 0x5, 0x4}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000200)=[{0x1, 0x3, 0xa, 0xc}, {0x0, 0x2, 0xe, 0x3}, {0x5, 0x1, 0x4, 0x6}, {0x1, 0x5, 0xb, 0x8}, {0x5, 0x5, 0xc, 0xa}], 0x10, 0x81}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x0, 0x99, 0xbe, &(0x7f0000000340)="0a04f43788406987383944da80267036eba9ba68d57f7afb8f0815787eb7eb776031b9d1a03d699f342a4e310122f2b9d92df188337606afc32c82dbc264d35de66f977105f8b58127b8b0c4027cf9b01b43b9b67dae80d3493a87c6852d5e9861328722cf271fcbd8e7c1c2d495fcebb2d4c3492e0305ce1a40e5b7aeffa9e219dde296a83c04533ddc556da8ceb8304be0f532a8f39f923e", &(0x7f0000000400)=""/190, 0x34cc, 0x0, 0xc5, 0xd3, &(0x7f00000004c0)="b8a7c00425736d0c8bda1855dea6548aea362b714a2ec4a2975ed613658e1d4375fb3a725db65644c104816f9e5ee0d84eb873157dcad39887d8732e2e7436ea3b155d76df2b547ce75db6ed5d0e91779506d9327641f6ced86be5fb384383f34606c3f80962b267127307f731cf80a9d2ec5bec3d6daca37c590f143f261074452d1879db6330284999de786f7c1ef7ee8ca831ba694bfc29092530dcec9b1b043168141596fe1d1947dc304c0d29a9aa6b61d57d8575051ac690d76549b5ec6235ed2327", &(0x7f00000005c0)="4d528293f493d3df0ec3cd6cb3c77af46bad68bd8467075e2e9d4ff7ea5486d5bcfec78d0c03028529f0a50c17d3fe80c8dc09b682340cb94b7e0100e70e41a42f3dfed4c80b39c9a79349ce5e47bac66366fc05c68fd9d7962a23b778a5448fbdb04268bd59a2fc6bfd220fb5485116eb9b01f1b0b2f7faab4e99d042dbd4c56e32bc31bc3faec78a56d8ce5d3cf685ac8c4993effd6baec2e350f4d7c67d78315f8fb7eb426b17c57b4d8b9d4480f1fd5b2fde75683e4593062cb398830836ed73706cf355eb65e8cf654b3c53593fd80fdd", 0x1, 0x0, 0x6}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000740)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x80280, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x10, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7a000000, 0x0, 0x0, 0x0, 0x648}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x1, 0x6, 0x5, 0x8, 0x128, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000840)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0x3, 0xffffffe1, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000900)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x5, 0x0, 0xa}, {0x1, 0x3, 0x0, 0xa}, {0x5, 0x3, 0xa, 0x2}], 0x10, 0x7}, 0x90) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000a40)=r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f0000000ac0)=r4, 0x12) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000b80)={r3, &(0x7f0000000b00)="36c2b86c422b975ce246bcaf63f00eb71eee8399e7762be3fc09ea1c1715f0a92d923ee8ba2b88f5b8b476d039c86efb08d31ce7af53e1f5aead3a27c24541cefa2fec4d0c257027a0dc137f86e5df546962b704c95e6b831468a75d9d0839b0ad65678d687d72ebb2e74856abfbb7"}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000c00)=""/205, 0xcd}, {&(0x7f0000000d00)=""/44, 0x2c}, {&(0x7f0000000d40)=""/25, 0x19}], 0x3, &(0x7f0000000dc0)=""/232, 0xe8}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={r3, 0x58, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001480)={r3, 0xe0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000011c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000001200)=[0x0, 0x0, 0x0], &(0x7f0000001240)=[0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000001280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000012c0), &(0x7f0000001300), 0x8, 0xc4, 0x8, 0x8, &(0x7f0000001340)}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x14, 0x11, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xe9e}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0xb, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001080)='GPL\x00', 0x40, 0x6d, &(0x7f00000010c0)=""/109, 0x41000, 0xc, '\x00', r7, 0x37, 0xffffffffffffffff, 0x8, &(0x7f0000001140)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001180)={0x5, 0xd, 0x7, 0x9}, 0x10, r9, r2, 0x3, &(0x7f00000014c0)=[r3], &(0x7f0000001500)=[{0x0, 0x1, 0x7, 0xb}, {0x0, 0x5, 0xf}, {0x2, 0x3, 0xd}], 0x10, 0x3}, 0x90) r11 = perf_event_open(&(0x7f0000001640)={0x5, 0x80, 0x5, 0x9, 0x4, 0x4a, 0x0, 0x2, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001600), 0x5}, 0x1442, 0x2, 0x6, 0xe, 0x4, 0xe9a, 0x7, 0x0, 0xc, 0x0, 0x4}, 0x0, 0xd, r3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001700)={r4, r5, 0x0, 0x1b, &(0x7f00000016c0)='blkio.throttle.io_serviced\x00'}, 0x30) r12 = perf_event_open(&(0x7f0000001740)={0x0, 0x80, 0x0, 0x1, 0x7, 0x3, 0x0, 0x3eb, 0x40000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x6, 0x6}, 0x100000, 0x100000001, 0xffffffff, 0x2, 0x8000000000000001, 0x3, 0x2, 0x0, 0x9, 0x0, 0x1}, r4, 0x6, r3, 0x9) r13 = openat$cgroup_type(r3, &(0x7f00000017c0), 0x2, 0x0) write$cgroup_type(r13, &(0x7f0000001800), 0x9) close(r2) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000001840)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002980)={&(0x7f0000001880)="f39a87ce9b0a8129d185cf1094048934f9b1cc067ceb77590fe7e068c2430f46b41763c9606517da483249850c103a6c5f75bd73747f767c68d98d6c4a0d9b5ce91a705744622db2cab7ece4", &(0x7f0000001900)=""/14, &(0x7f0000001940)="c5e762ec8e41f25ca1ea9fffacb12630432d02", &(0x7f0000001980)="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", 0x10000, r3}, 0x38) r14 = gettid() sendmsg$unix(r3, &(0x7f0000002e80)={&(0x7f00000029c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002d00)=[{&(0x7f0000002a40)="1d7ac393895305c2a01d60cdee2e90526c7b475601a6168e90411ea47329ae2ac353", 0x22}, {&(0x7f0000002a80)="ae6bc00c80d7209cf51b635ac9b1552def10c5ad0d3125fee69a85554ee04c5fecab8a", 0x23}, {&(0x7f0000002ac0)="527b07a6451384a617bcb2f287d65173604c0937133547c2072a94178118aa0cac410302e3956d27e6ab375aaeee7c2927b6031c157e674f39453ca99d93f040f02ac68673ce28970958f0b38b50a99b2ad2696f0411c6f2a6d9c3e09f8b6e7cbadd54d68ad938372e9c3f551d8353a9dbcfc00011bb19946c7d92c39825c7f56ddab0a6d987ab207d502c0aa096e9f2334a8f4708d78bcf251aad2acecc27e21e0755bb49dcae9d4af0b0807542a5774cfdf6e95756eccf42a1b64c7a27b8215f9a79711bc9a3a1ed7279768c45822c754b8e263bcf9efafc21b6d59b", 0xdd}, {&(0x7f0000002bc0)="c72fca0cc93af9ae75c5960b15e11d8961c0e77b99e5c6ec922f5a109b7390ef5018ecb39e69a4c58b710359e42a42cc8359f20059decab29abc67ead36acb04a3b45e5b4989ceb53f3677530a28dc8122ff865fa7b408528e8594d13dec5012d7431642bc6be7bdfc0297890f8dfa1d1b19d0ed35a5a2d3b3846e53f9a577871953f4884d4bef91f9106d4b", 0x8c}, {&(0x7f0000002c80)="d5f65eab9af33efce66430667d866d2fca56628c71404f76c3e09afa17596ce2f1383eddf9507f37408a2b50208d4e95ba18008e8a7b01c3087b3f226247bbd205fc5513045acd769b559d4f73796b7b04a6", 0x52}], 0x5, &(0x7f0000002d80)=[@rights={{0x18, 0x1, 0x1, [r11, r10]}}, @cred={{0x1c, 0x1, 0x2, {r14, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x28, 0x1, 0x1, [r0, r2, r3, r12, r0, r0]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, r2]}}], 0xf8, 0x40}, 0x4800) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ec0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x8, '\x00', r8, r3, 0x0, 0x3, 0x2}, 0x48) write$cgroup_freezer_state(r3, &(0x7f0000002f40)='FROZEN\x00', 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003080)={r3, 0x0, 0x21, 0x31, &(0x7f0000002f80)="416b156e2607a1509f42d92dc3184ba6606ff9b7187c1461bd0492b3cf805df88d", &(0x7f0000002fc0)=""/49, 0x933, 0x0, 0x3b, 0x3c, &(0x7f0000003000)="d0d6a52041934c7bf4eea68b2319f4ca6de677f7504a60f54fbc8c327ed5918c4a4d2d33e13216404611fe9c59084339b3f468266dc801bc166e9b", &(0x7f0000003040)="0dd7659cb29fa65326a666c8ecececfaf76b4cc9c608ced880e8be0314810abddf8bd4ee7a4e8a3aa4408c2eea8eeb20dcdb796ad59e137ad926976b", 0x3, 0x0, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000033c0)={0x17, 0x1f, &(0x7f00000031c0)=@raw=[@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x908}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}, @alu={0x4, 0x1, 0x0, 0xfc1e56dc82c1af84, 0x0, 0xfffffffffffffff4}, @tail_call, @map_fd={0x18, 0x7, 0x1, 0x0, r15}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @jmp={0x5, 0x0, 0xd, 0x7, 0xb, 0x20, 0x8}, @jmp={0x5, 0x0, 0xc, 0x9, 0x7, 0xfffffffffffffff0, 0xfffffffffffffff0}], &(0x7f00000032c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, 0x2, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003300)={0x2, 0x6, 0x6, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000003380)=[{0x3, 0x5, 0x9, 0x9}], 0x10, 0x5}, 0x90) 33.013335ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x8, 0x2, 0x4}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0xc}, 0x48) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x55}, [@call={0x6f}], {0x95, 0x0, 0xa}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x46, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f00000002c0), &(0x7f0000000300)=r3}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) 20.014637ms ago: executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000001040)={&(0x7f0000000d00)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000001000)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) gettid() perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000024c0), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001740)=""/228, 0x26, 0xe4, 0x1}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x34100) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000240)=[0x0], &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7d, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xd2, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"/2379], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x32600) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0xeffffff8, 0x6c, 0x5, 0x8, r6, 0x8001, '\x00', r2, r6, 0x0, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0xb, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x73}}]}, &(0x7f0000000600)='syzkaller\x00', 0x20, 0xc3, &(0x7f0000000640)=""/195, 0x41100, 0x0, '\x00', 0x0, 0x21, r6, 0x8, &(0x7f0000000ac0)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000012c0)={0x2, 0x0, 0x0, 0xff00000}, 0x10, r3, r6, 0x4, 0x0, &(0x7f0000001300)=[{0x0, 0x5, 0x4, 0x4}, {0x0, 0x1, 0x9, 0x6}, {0x1, 0x1, 0x9, 0x3}, {0x5, 0x1, 0x6, 0x4}], 0x10, 0x200}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xdc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="611299000000000061134c0000000000bf200000000000002600020007ffffffbd0305000000000095002000000000006916000000000000bf6700000000000004070000b964b01a4607feff00207000540700000ee61e00bf150000000000000f5700000000000065070000d23700002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c4ed68ecf264e0f84f9f17d3c30e3c7bdd2d17f2f175455000078af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd390700000500000000f18c30907d7bee45a0100000fe9de56c9d05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cac3f1d5af65727546e7c955ccefa1f6ab689ffffff7f63ede202fa4e0a2127b8b83c71a51445dc8dfd13ff15f852a39e5b2ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916fcecc8158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda30a673a6037ed8c85f21ec2c081bdce431e56723888fb126a19bc1172b84b3ebe174aba210d739a018f9bbec63222d207a370b0a3232ca50b640400990cecac4d03723f1c921b5bbf7949632cacfdd32b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7e090000000000000045eac1f2014f720e83b7838e3eede14308d582685e1becd6f35154bcb4000000000000000000000000000000bc3af2b170ad3e2b26539cebca8f4ddc211bc3ccf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d353887a5ad103649afa1769080584f800031e03a651bb04000000ab04871bc47287cd31cc43ea0ffb567b4040c1458d0320ce7d0000413a0000000000000000005f37983f84e98a523d80bd56a57fa82b82f639601ae899a559949702e119e36418f6cfc1cb26a0f6a5480a55d624a0c544ba0dc828c22fe30000aa391598000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac872ade9d1f2ab779b8dbe843aeeda0426c767c00327b8c95b2bb6ddb55117669d9598c0f3598073f3a921c76beceff7e4fbf909a2cabf5b8ea5011db9020823b83abe54346c7af0a99fa077ffe7000feb9e44023a1749eb1d0d572b77d6e0d0fcd74031c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d91741380000cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c7108ef0a7e59fd6d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb647cebd4d7a93a17bcbb6bae5ff876375d4fe39cc2d292691672cc18ca372104ceb83a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec905000000b13f4a2575fbe943a6c40000000000000000000000000000028026b80c3899543223a6079ee96198b9a326db3be3a48af415ca28ca68c502550044ed8e29af8d763ef9b1f31befcad2ce5394601c7cdc233bff7f0000000000009fb3ad650f77e339768924dfdbeead13b88371154d743544a6091ec93e0d3fd5b4dc42911c1ba322fd4d6fbf19e617d51f964727bfd5cc5ba15370f6e1141d2271eded0b15e4316a1e4623272beb249a0928c417720be14c898f397411c88a7bcf3df46ab3efe7cd5e160c2afd3cc945f75011a102d952c7ad17a58d9be691c334ea35bae71e76e160cc2260bd028162917807ce89e11b5f261052ee0dde18efa1d802af2b7bcf6f8af419bccf64ca1c81045153eafbefdb91fbdff9ee3307d4a1837963b2dc2a3698d90e7915b098f19392e792adaea86052f4e948184001b6494e906925a092483adc7e9c8f7a29d226763c100aecae7f00619c36bceb9fb6dd7e55487d8485e498fdfc377fd3d266d21d46ab2f6b2ce22cd0aebba9b0ffbfe8ec3143c3734967c90b16ebbeeae1ce2baaae05aed6bf0f40c8a323f9235dc99698bd0b800067a901a79daada03cc77e74feb98b1586946b452764ff917a8ecc10e529c5bea49cad70e22df522c2803b6ef65df70223c6e22c3433e322d8dbd6e9b040065a9d6b3d5ae276cffe935d559bea88e1aa36b4e6c19e78457904297e77370e013b705a96548d47c609a93c45f4d1382b39c05dcc07d5b49ad75ddb3ce5b5b9416e03995da04647aa5e6fc1a6f5d663380967ccef9de49a90ced031335e3219ebd9d06c257a50497ec523f5ff7361261ccfe239d603364a42e2e81fc068fcbb9792b673827fe7018a988fbce55bb74cdb327ced4b77b8743fb3cb72cc280b9f62e4f92f46a19600b802cba88b7d0a938d9e0e6cfe5d66b874c9a0c6c04b96360d6f499d004179e5b6025c0e1050faec7ecd9de190a975db2f8c06a551236278c4766d7e22e3b85168c9851de6266c791252f919b4f8b257b5a786734e5142e4666c67aef5b7b2f88c6640995434aa8636993089c73f196c54ae829ad4307132655b075ae534fa7f1ea9a17e62357b0bd2bd1d62d34bfc1364640250136729ba4f763ff25c33e8acc806611792add8254e705fefd2a44d5b15e3b36f6b75c97c9c04c511d8cf9e24c61c8284a913a381cb1a5628878040000000000000017b68afd95d4abf7920de9ebe1c89661f4adc3d83d72b1b778e30c2bf2efbbcd054cf51f4205ebf9a98a0d9f18135cb1d8d567c3436fa697b72c3b0200000000000079c0b3339debc78352b2e65299223d7ef2bd540e78167b3ac92a4c4f826f6d0e5c4ebf4f7a70c03e2f5ddbebf168586360c3663531eb5995d228f011a10ffc8b17d716b0c528dab6d0c4fe2ee402348104bc5d4012babedee898c6d3e1017be2e9bc759d3ab4d615f5000000000000000000000000000000000000000000007fff0000000000e693e314adf7dc9f517d04f1e6ca367d30d31d3647c6059db6e1e9529eb1623ef99e2d9ac2ab4872f8e784b07a31110bef6d000000a6f9e89e6d50ee06ce716f94da60f1f22d9669560d296287c13c92070000ee7553eb2df17839542fa88d09f000e88a90cf4406b9000000000000000000000000f441d6a6f516c235c6f5863e7f454ee0e16b9aa2593eb31fa3836703e7765aaeb77a8770e518efaa6d3dd85e03b3b133eb749057cea9af75a0e6f633532f2891b8e263cb6eecea691842827bc7c8c0130187081c8d320642389f5f0c42dba0ff75a257310f2d92cb1d1e16468949f5675262ee318e735930b01d8f586e34537bcff7d6196f494cdcf3a712078d745db0f5687a78ee6d000b3d171a0f08299b52d207f32e9da311ca090000003a42732808515eec574f892622c5be497fc3d9ca122d7c18b9e54637812c8debc61f0e42d838e44a819b74bce1a56108bb0fde97a02475920532309c55b2c9ae9f281391ec5cc72a5e94cca1cbf1ff01000000000000bdb537a0c52bd45a9f966c25616cec30c3ea3246cb8e6aac7cf273638e6656a3e4ccadc348f0172028c99cc5f6d5c6d09ed65aa54549e73c3bb7c8ad06ad3c5e3c27eec0eff1a6c84f1189919eefcee8072d1f88cb781e4cdb04af00ac92f1080211c4bee74381a0e31021918f27863fdbafb50f70857d52a1f7df51935a80b1980a4778d35f183ea517f55a98095305701ab3f3ae43f06e91bc7d85e3800b46926944fba9805a985e63e53a62232fcd3f01dbe1728f300e247a7ebe344f9749818ff3961b2a42664ccd680a90bbb6ab400e286acc8f9febef64594777f848ed1cf980a3da2f0f7745760a05887d0c28060d613dd6539d392fc21fee0b5131609664b821d7a994e6c5965a4fa1ec1790c54e54586907dcc5e8bac16e79da9c2444420900000000000000f888a94365b99b72796fca1b922fc9aefaf1546c17cbb1d2d2fd12cb1a49cad501a3ca218c595b667b634606c57987ebfb0783a4948e4561d5cda158fe74453ff4a837beeedba483842c57d6005b544b4f80003386edfd3d4a88a667bd41eefe0d808abed0ab29e6bc370a80cc0366fb4080bfbaaa946fd47ab662c794846e403950bbc3a48bb276cbb08a8eab145c06221ef16a238e3d50ad18aea9a2cec97d3c2d0569caabe2bffe02506bc9cb7294c5d020536dd5e7a6351642112df3b55d0215aaec7e45598995e79699e47567e353e68b03f82be860b188554b734e1192f9c1a867b815ef52cdc3307c0cc9be05a40fde69c350e59f11f1d26a4d04d8c8b2c4a4d23ec931d14bc7807db773a614b670acf46f83f7c65a0f8d43c5f64705f0d27c46d4b686e867e9b0be76a7978a8f962bb5a070df97f2bf7612115cfe5ebdc7ad0bc5a5f3ace25347d0e5c347279d55aa67a967380000000000000000000000000000000000000000000000ed0942d980c754c6c69ef65c375ad018824f78b260d5f51bc3feba504408a8c8141d84f3f417603b5081680f346ff0ffbe4ae19e936511966965ce268b6345a0001c0f26a32e0a999fc869292e939dcf89b9bfd794f9c12d41959a00688cca43015a9eec58f647796adea520cd2abeb0b55c22949d10e5a05fee4543fdc1e02554a55b5fef2427a6e5708edc38fac53c2f961945a3f83cdf01979939b49bc6b1aef8c733401bbe473de8d64efbe0d123739f387d1c0d9e74f2175c174ada1678c7db79492e8dd0f34e2ccf419cf7f14ffa408b50a52685b36aed14aa22ad928191d5a2697646edc52a1c0c5d720ae690add2b34aed161f51cc1cb424f76098e1e1921e5a405f9d298a8461f2da30e47b7c6ed7c95c84c745f58723e4cddffae3b53b5b947f9435e589f9ae55b30ecd3827b2de5df31976870823da8058c2538c04e397f3d0ef90c11c74da984fa558697ecb57224ce8fa6f79aadbd7dbf3678e74d790bc2ee72769a3ada1dd504f8e4133ce1effd446bc9a2f139e65cc4bd83912af3122352506c7c2191b3705116b2f4fc20d4e93882bdd6ccea97f3a08d3565b0000000000000000000000000000d35fb97c2d7a9374294dcec3da3df9a13c4fc63b00426682534d894caee0b9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.time_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40286608, &(0x7f00000005c0)=0x80000000) 18.148388ms ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1d, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @ldst={0x0, 0x3, 0x1, 0x8, 0x7, 0x30, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x84, 0x51, &(0x7f0000000340)=""/81, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58ba}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r3, 0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r5, 0x20, &(0x7f0000000640)={&(0x7f0000000580)=""/113, 0x71, 0x0, &(0x7f0000000600)=""/52, 0x34}}, 0x10) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000740)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r8, &(0x7f00000007c0)="8e5cf04d01a090b5b89e6f429336d11f986cebc5a5a117e2cf74c9d559a61df4f99a5e82b4110d37610709e3f5564f21fb97861c5f4aabe2148027333b26fcf4b125cb2814c604515c54ace539996dec3c11331d1482ca9ebc1b6ec52c8c492d7d8e6233260ebf74f3db9eef25353abcc6e0ba1eb901cbc75c47746805cfa85c1507562569d9a45c95360b9c8a337ad31baae40c0ce105ca9bc0404b2214cea16e001088bfe7d0bb8e36a7123fde090afd70eeb524adec6c7f43b9e16a09a15473f73aaa3cb043fb3e80f7905e15f0d643fbbfa761da2ab6cfff20f065b4954aea13fdf7ab04b31aee", &(0x7f00000008c0)=""/29}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r3, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2e, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x81, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xf, 0x1a, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x4e, 0x5, 0x0, 0x8000, 0xe5b1}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a40)='syzkaller\x00', 0x5, 0x5, &(0x7f0000000a80)=""/5, 0x41100, 0x4b, '\x00', 0x0, 0x13, r8, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xe, 0x401, 0x7d8}, 0x10, r9, r3, 0x8, 0x0, &(0x7f0000000e40)=[{0x1, 0x4, 0xb, 0x9}, {0x4, 0x3, 0xa, 0x8}, {0x4, 0x5, 0xf, 0x7}, {0x5, 0x2, 0xe, 0x7}, {0x5, 0x1, 0xf, 0x7}, {0x5, 0x3, 0x4, 0x6}, {0x0, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0x9}], 0x10, 0x3f}, 0x90) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000f80)=0x1) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x19, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @generic={0x5, 0x2, 0x0, 0x1ff, 0x9}, @generic={0x1f, 0x7, 0x9, 0xc000, 0x1f}, @jmp={0x5, 0x0, 0x2, 0x1, 0x4, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='syzkaller\x00', 0x4bcc, 0x53, &(0x7f0000001100)=""/83, 0x40f00, 0x13, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000001180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x6, &(0x7f0000001240)=[r8, r8, r10, r4], &(0x7f0000001280)=[{0x2, 0x3, 0x8, 0x4}, {0x1, 0x3, 0x2, 0xccd24bffa86ebc44}, {0x3, 0x1, 0x10, 0x7}, {0x2, 0x5, 0x6, 0xb}, {0x2, 0x4, 0x6}, {0x3, 0x5, 0xd, 0x1}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{r10}, &(0x7f00000013c0), &(0x7f0000001400)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r8}, &(0x7f0000001480), &(0x7f00000014c0)=r11}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001680)={@cgroup=r7, 0x2e, 0x1, 0x731, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@map=r8, r11, 0xf, 0x40, r11, @prog_fd=r11, r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001ac0)={{r5}, &(0x7f0000001700), &(0x7f0000001a80)}, 0x20) 0s ago: executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x10, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000100)='GPL\x00', 0x2}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000000000d0000d19fa80c1e6ffae0386d1900000000000001000006040000"], &(0x7f0000000500)=""/129, 0x3a, 0x81, 0x1}, 0x20) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)='l', 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900), 0x1, 0x0, 0xffffffffffffff84}, 0x810) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x22) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x13, &(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=0x1, @ANYBLOB="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"], &(0x7f0000000540)='syzkaller\x00', 0xf2d7, 0x1f, &(0x7f0000000580)=""/31, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x7, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000640)=[{0x5, 0x3, 0x6, 0x2}, {0x1, 0x0, 0x10}, {0x1, 0x4, 0xe, 0xb}], 0x10, 0x3f}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x3, 0x6, 0x0, 0x6, 0x197, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r4, 0x0, 0x2a, 0x0, &(0x7f0000000240)="259a534f65771194", 0x0, 0xf25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fffffff}, 0x50) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) r5 = perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x20802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1804}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1b, 0x12, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000003d050000000000100500000018110000ab80af354c6606afb6d2905d6e076d91c764cb9a7ad75896e489608ade02a6197fbb3c29e9d27aba90149829665c78d1d6f4fa819a8cfb5b66b118e833881d8ad260039da7a2e7175662275dbbc0001c19ef635232d8e82ab3a8f7c31b23501831cbfa9c05f57c744b69f4f2b050616232417ebb691584517c", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000004600000018390000010000000000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x42, &(0x7f0000000300)=""/66, 0x41100, 0x34, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x8, 0xd7c, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440), 0x10, 0x20}, 0x90) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.219' (ED25519) to the list of known hosts. 2024/06/24 13:48:16 fuzzer started 2024/06/24 13:48:16 dialing manager at 10.128.0.163:30002 [ 20.304728][ T23] audit: type=1400 audit(1719236896.859:66): avc: denied { node_bind } for pid=344 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.308542][ T23] audit: type=1400 audit(1719236896.859:67): avc: denied { name_bind } for pid=344 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.346725][ T23] audit: type=1400 audit(1719236896.899:68): avc: denied { mounton } for pid=352 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.348800][ T352] cgroup1: Unknown subsys name 'net' [ 20.375779][ T352] cgroup1: Unknown subsys name 'net_prio' [ 20.385780][ T352] cgroup1: Unknown subsys name 'devices' [ 20.392700][ T23] audit: type=1400 audit(1719236896.899:69): avc: denied { mount } for pid=352 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.416349][ T23] audit: type=1400 audit(1719236896.929:70): avc: denied { setattr } for pid=353 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9307 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.423472][ T360] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.444690][ T23] audit: type=1400 audit(1719236896.929:71): avc: denied { mounton } for pid=355 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.478583][ T23] audit: type=1400 audit(1719236896.929:72): avc: denied { mount } for pid=355 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.504007][ T23] audit: type=1400 audit(1719236896.949:73): avc: denied { unmount } for pid=352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.523952][ T23] audit: type=1400 audit(1719236897.009:74): avc: denied { relabelto } for pid=360 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.549305][ T23] audit: type=1400 audit(1719236897.009:75): avc: denied { write } for pid=360 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.591489][ T357] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.619964][ T352] cgroup1: Unknown subsys name 'hugetlb' [ 20.625614][ T352] cgroup1: Unknown subsys name 'rlimit' 2024/06/24 13:48:17 starting 5 executor processes [ 21.088585][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.095436][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.102859][ T369] device bridge_slave_0 entered promiscuous mode [ 21.111011][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.117950][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.125295][ T369] device bridge_slave_1 entered promiscuous mode [ 21.219120][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.225956][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.233501][ T372] device bridge_slave_0 entered promiscuous mode [ 21.242489][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.249467][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.256617][ T372] device bridge_slave_1 entered promiscuous mode [ 21.288065][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.294985][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.302611][ T373] device bridge_slave_0 entered promiscuous mode [ 21.309447][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.316273][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.323681][ T373] device bridge_slave_1 entered promiscuous mode [ 21.402365][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.412088][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.420676][ T374] device bridge_slave_0 entered promiscuous mode [ 21.431641][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.438490][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.445838][ T374] device bridge_slave_1 entered promiscuous mode [ 21.473923][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.482270][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.490135][ T371] device bridge_slave_0 entered promiscuous mode [ 21.519208][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.526235][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.535290][ T371] device bridge_slave_1 entered promiscuous mode [ 21.629424][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.636260][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.645096][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.653889][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.727217][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.734080][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.741291][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.748039][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.761501][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.769727][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.778721][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.787566][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.803691][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.811364][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.819726][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.827208][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.845450][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.852390][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.859500][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.866352][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.880018][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.888239][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.895178][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.902154][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.909678][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.916581][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.924112][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.931097][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.938496][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.945555][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.953601][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.961887][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.988914][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.998268][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.007001][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.028224][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.055585][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.066396][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.074670][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.081585][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.103568][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.113428][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.123914][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.134728][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.144168][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.152142][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.168500][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.176696][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.184985][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.191834][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.199636][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.206827][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.214122][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.222187][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.230314][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.237121][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.260309][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.269198][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.277170][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.284015][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.291442][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.299578][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.307490][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.314293][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.321509][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.333085][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.367552][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.375530][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.383470][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.392522][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.401114][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.408683][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.416633][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.424905][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.432783][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.440696][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.448600][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.456522][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.464384][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.473084][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.482372][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.489954][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.497147][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.505346][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.513685][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.520617][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.527876][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.535963][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.544156][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.550985][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.561334][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.569256][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.591144][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.605857][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.614500][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.623505][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.631580][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.647577][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.668034][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.676353][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.684529][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.692901][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.700701][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.708530][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.733073][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.743082][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.756528][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.766706][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.793097][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.801355][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.809404][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.817374][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.825337][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.833470][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.842122][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.850338][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.858308][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.866315][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.874483][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.883469][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.891622][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.923655][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.944748][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.954940][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.964550][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.974887][ T397] cgroup: syz-executor.1 (397) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.992068][ T397] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.011492][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.012456][ C0] hrtimer: interrupt took 10288 ns [ 23.021851][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.028732][ T397] syz-executor.1 (397) used greatest stack depth: 21080 bytes left [ 23.037825][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.050218][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.105812][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.126125][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.209882][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.223584][ T407] [ 23.226031][ T407] ********************************************************** [ 23.229021][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.236288][ T407] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 23.249641][ T407] ** ** [ 23.257042][ T407] ** trace_printk() being used. Allocating extra memory. ** [ 23.268031][ T407] ** ** [ 23.275445][ T407] ** This means that this is a DEBUG kernel and it is ** [ 23.287371][ T407] ** unsafe for production use. ** [ 23.304367][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.320586][ T407] ** ** [ 23.331039][ T407] ** If you see this message and you are not debugging ** [ 23.339385][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.394987][ T407] ** the kernel, report this immediately to your vendor! ** [ 23.405870][ T407] ** ** [ 23.413628][ T407] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 23.441774][ T407] ********************************************************** [ 23.794287][ T430] : renamed from pim6reg1 [ 25.558001][ T561] Y4`Ҙ: renamed from lo [ 25.718886][ T23] kauditd_printk_skb: 36 callbacks suppressed [ 25.718894][ T23] audit: type=1400 audit(1719236902.279:112): avc: denied { create } for pid=566 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 26.219127][ T595] Y4`Ҙ: renamed from lo [ 26.673226][ T619] syz-executor.3[619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.817573][ T622] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4095 (only 8 groups) [ 27.281163][ T23] audit: type=1400 audit(1719236903.839:113): avc: denied { cpu } for pid=651 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.464680][ T23] audit: type=1400 audit(1719236904.019:114): avc: denied { create } for pid=670 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.921869][ T702] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1025 (only 8 groups) [ 28.253105][ T23] audit: type=1400 audit(1719236904.809:115): avc: denied { create } for pid=710 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 28.527820][ T735] device lo entered promiscuous mode [ 28.570503][ T23] audit: type=1400 audit(1719236905.129:116): avc: denied { create } for pid=733 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 28.746038][ T756] device syzkaller0 entered promiscuous mode [ 28.873362][ T761] device syzkaller0 entered promiscuous mode [ 28.886652][ T23] audit: type=1400 audit(1719236905.439:117): avc: denied { relabelfrom } for pid=760 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.949487][ T23] audit: type=1400 audit(1719236905.439:118): avc: denied { relabelto } for pid=760 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.029680][ T23] audit: type=1400 audit(1719236905.579:119): avc: denied { create } for pid=781 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 29.150568][ T23] audit: type=1400 audit(1719236905.709:120): avc: denied { create } for pid=790 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 29.241667][ T786] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.248621][ T786] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.255976][ T786] device bridge_slave_0 entered promiscuous mode [ 29.266035][ T786] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.287751][ T786] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.296129][ T786] device bridge_slave_1 entered promiscuous mode [ 29.469449][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.477853][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.489295][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.497669][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.505738][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.512593][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.668973][ T807] device syzkaller0 entered promiscuous mode [ 29.682679][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.693269][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.702139][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.710195][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.717837][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.729470][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.754695][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.803325][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.812675][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.897993][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.921302][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.951294][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.975989][ T833] device syzkaller0 entered promiscuous mode [ 29.984169][ T833] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 30.027517][ T9] device bridge_slave_1 left promiscuous mode [ 30.035211][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.045334][ T9] device bridge_slave_0 left promiscuous mode [ 30.053098][ T842] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 30.057060][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.547571][ T372] syz-executor.0 (372) used greatest stack depth: 20216 bytes left [ 30.612099][ T892] device lo left promiscuous mode [ 30.664931][ T892] device lo entered promiscuous mode [ 30.912124][ T896] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.919183][ T896] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.926661][ T896] device bridge_slave_0 entered promiscuous mode [ 30.933813][ T896] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.946154][ T896] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.964154][ T896] device bridge_slave_1 entered promiscuous mode [ 30.996469][ T899] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.007092][ T899] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.018260][ T899] device bridge_slave_0 entered promiscuous mode [ 31.053623][ T899] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.061484][ T899] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.069386][ T899] device bridge_slave_1 entered promiscuous mode [ 31.215587][ T896] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.222443][ T896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.230185][ T896] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.236924][ T896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.279370][ T9] device bridge_slave_1 left promiscuous mode [ 31.285319][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.308699][ T9] device bridge_slave_0 left promiscuous mode [ 31.314926][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.379031][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.387990][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.407502][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.414822][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.449636][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.462218][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.475447][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.482930][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.492467][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.502098][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.510364][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.517470][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.524652][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.532627][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.556284][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.567927][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.614436][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.630941][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.672574][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.687343][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.706807][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.714167][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.724944][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.749168][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.757222][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.764241][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.772583][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.781099][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.817567][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.825076][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.846734][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.859545][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.871418][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.879333][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.890054][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.898042][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.905994][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.918091][ T969] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.926662][ T969] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.967601][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.977099][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.987209][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.997142][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.025625][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.034592][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.076145][ T980] device syzkaller0 entered promiscuous mode [ 32.088819][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.096856][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.134059][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.145885][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.163231][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.183958][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.203933][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.217034][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.349115][ T899] syz-executor.0 (899) used greatest stack depth: 20152 bytes left [ 32.444728][ T23] audit: type=1400 audit(1719236908.999:121): avc: denied { create } for pid=1007 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.489067][ T23] audit: type=1400 audit(1719236909.049:122): avc: denied { create } for pid=1010 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 32.529586][ T1013] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.536623][ T1013] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.555179][ T23] audit: type=1400 audit(1719236909.109:123): avc: denied { append } for pid=1014 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=9279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.589917][ T23] audit: type=1400 audit(1719236909.109:124): avc: denied { create } for pid=1014 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 32.607707][ T1013] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.616471][ T1013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.623614][ T1013] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.630375][ T1013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.639114][ T1013] device bridge0 entered promiscuous mode [ 32.671584][ T23] audit: type=1400 audit(1719236909.229:125): avc: denied { write } for pid=1012 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=9279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.710915][ T1018] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.717814][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.724932][ T1018] device bridge_slave_0 entered promiscuous mode [ 32.732897][ T1018] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.739924][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.747499][ T1018] device bridge_slave_1 entered promiscuous mode [ 32.852562][ T1018] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.859411][ T1018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.866536][ T1018] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.873314][ T1018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.920441][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.934563][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.942587][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.950709][ T9] device bridge_slave_1 left promiscuous mode [ 32.958791][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.966304][ T9] device bridge_slave_0 left promiscuous mode [ 32.974621][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.051275][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.064268][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.071134][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.086047][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.098001][ T1051] ip6_tunnel: non-ECT from fefd:ffff:ff00:0200:875a:2596:9ff5:7b00 with DS=0x31 [ 33.107503][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.114499][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.123766][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.184602][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.212392][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.228693][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.251130][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.268881][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.277975][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.526940][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.675224][ T1079] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.750128][ T1079] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.785572][ T1079] device bridge_slave_0 entered promiscuous mode [ 33.889142][ T1079] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.895984][ T1079] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.903999][ T1079] device bridge_slave_1 entered promiscuous mode [ 34.071699][ T1079] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.078652][ T1079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.085780][ T1079] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.092549][ T1079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.237564][ T1105] device syzkaller0 entered promiscuous mode [ 34.284586][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.293849][ T757] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.302071][ T757] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.320590][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.328984][ T757] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.335837][ T757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.345440][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.354099][ T757] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.360959][ T757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.378196][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.386231][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.485258][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.769521][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.832416][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.854031][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.883823][ T23] audit: type=1400 audit(1719236911.439:126): avc: denied { create } for pid=1120 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.941237][ T23] audit: type=1400 audit(1719236911.499:127): avc: denied { create } for pid=1122 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 35.007827][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.015870][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.044328][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.056047][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.075075][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.089750][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.148263][ T9] device bridge_slave_1 left promiscuous mode [ 35.154223][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.170504][ T9] device bridge_slave_0 left promiscuous mode [ 35.176541][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.190754][ T9] device bridge_slave_1 left promiscuous mode [ 35.196981][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.205465][ T9] device bridge_slave_0 left promiscuous mode [ 35.232061][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.393043][ T1151] device syzkaller0 entered promiscuous mode [ 35.419755][ T1079] syz-executor.0 (1079) used greatest stack depth: 20120 bytes left [ 35.788605][ T1177] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.798141][ T1177] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.807033][ T1177] device bridge_slave_0 entered promiscuous mode [ 35.820192][ T1177] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.828575][ T1177] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.847924][ T1177] device bridge_slave_1 entered promiscuous mode [ 36.035287][ T1177] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.042323][ T1177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.050045][ T1177] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.059538][ T1177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.123276][ T1204] device syzkaller0 entered promiscuous mode [ 36.173698][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.186421][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.206472][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.227417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.241409][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.248288][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.275476][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.284672][ T23] audit: type=1400 audit(1719236912.839:128): avc: denied { create } for pid=1214 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 36.305576][ T970] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.312436][ T970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.362084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.369959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.425726][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.465417][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.508628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.517746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.540198][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.548342][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.561234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.569549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.004147][ T9] device bridge_slave_1 left promiscuous mode [ 37.010290][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.018813][ T9] device bridge_slave_0 left promiscuous mode [ 37.024762][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.338055][ T1263] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.361919][ T1263] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.372707][ T1263] device bridge_slave_0 entered promiscuous mode [ 37.380525][ T1263] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.397939][ T1263] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.426123][ T1263] device bridge_slave_1 entered promiscuous mode [ 37.701078][ T23] audit: type=1400 audit(1719236914.259:129): avc: denied { create } for pid=1326 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 37.747553][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.754866][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.776258][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.784725][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.798537][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.806730][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.816467][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.833779][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.845266][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.855368][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.863588][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.871617][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.894856][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.907787][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.930601][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.107711][ T1342] device pim6reg1 entered promiscuous mode [ 38.167123][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.240012][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.261447][ T1355] device pim6reg1 entered promiscuous mode [ 38.301366][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.321214][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.332844][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.345988][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.363954][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.419120][ T1375] device sit0 entered promiscuous mode [ 38.465495][ T23] audit: type=1400 audit(1719236915.019:130): avc: denied { mounton } for pid=1263 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=12299 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.466953][ T9] device bridge_slave_1 left promiscuous mode [ 38.559652][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.572327][ T9] device bridge_slave_0 left promiscuous mode [ 38.580314][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.219437][ T1420] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.256783][ T1420] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.301185][ T1420] device bridge_slave_0 entered promiscuous mode [ 39.328728][ T1420] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.397482][ T1420] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.434809][ T1420] device bridge_slave_1 entered promiscuous mode [ 39.762304][ T1446] device syzkaller0 entered promiscuous mode [ 39.969870][ T1453] device pim6reg1 entered promiscuous mode [ 40.125558][ T23] audit: type=1400 audit(1719236916.679:131): avc: denied { create } for pid=1464 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.298812][ T1478] device syzkaller0 entered promiscuous mode [ 40.411383][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.418643][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.431848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.440799][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.448974][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.455913][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.463373][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.475215][ T9] device bridge_slave_1 left promiscuous mode [ 40.482933][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.490786][ T9] device bridge_slave_0 left promiscuous mode [ 40.496727][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.557692][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.565849][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.573972][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.580804][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.588005][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.595832][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.649119][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.663023][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.762838][ T1496] device syzkaller0 entered promiscuous mode [ 40.772769][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.802372][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.811602][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.846574][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.855183][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.957888][ T1507] device syzkaller0 entered promiscuous mode [ 40.969572][ T1511] device pim6reg1 entered promiscuous mode [ 41.413162][ T23] audit: type=1400 audit(1719236917.959:132): avc: denied { ioctl } for pid=1543 comm="syz-executor.2" path="pid:[4026532374]" dev="nsfs" ino=4026532374 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.613635][ T1542] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.633793][ T1542] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.651959][ T1542] device bridge_slave_0 entered promiscuous mode [ 41.678553][ T1542] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.695818][ T1542] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.716535][ T1542] device bridge_slave_1 entered promiscuous mode [ 41.899086][ T1565] device syzkaller0 entered promiscuous mode [ 41.925283][ T9] device bridge_slave_1 left promiscuous mode [ 41.947428][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.954793][ T9] device bridge_slave_0 left promiscuous mode [ 41.961023][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.063124][ T1542] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.070108][ T1542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.077216][ T1542] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.084001][ T1542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.095416][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.108247][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.136477][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.144277][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.201185][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.219531][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.237959][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.244906][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.252986][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.272333][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.280492][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.287344][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.358952][ T1589] device syzkaller0 entered promiscuous mode [ 42.379895][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 42.399314][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.426694][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.436712][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.497346][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 42.506910][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.567347][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 42.580941][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.634351][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.666038][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.752138][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.774474][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.811577][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.859882][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.260320][ T1631] bridge0: port 3(gretap0) entered blocking state [ 43.266654][ T1631] bridge0: port 3(gretap0) entered disabled state [ 43.273643][ T1631] device gretap0 entered promiscuous mode [ 43.279734][ T1631] bridge0: port 3(gretap0) entered blocking state [ 43.288156][ T1631] bridge0: port 3(gretap0) entered forwarding state [ 43.467872][ T1636] device syzkaller0 entered promiscuous mode [ 43.580380][ T1634] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.587214][ T1634] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.596529][ T1634] device bridge_slave_0 entered promiscuous mode [ 43.609685][ T1634] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.663225][ T1634] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.671539][ T1634] device bridge_slave_1 entered promiscuous mode [ 43.854686][ T1672] device syzkaller0 entered promiscuous mode [ 44.004059][ T9] device bridge_slave_1 left promiscuous mode [ 44.010331][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.038109][ T9] device bridge_slave_0 left promiscuous mode [ 44.068513][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.371470][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.379379][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.400107][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.418223][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.437938][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.444788][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.457006][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.466576][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.475988][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.482856][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.530954][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.539350][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.547625][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.578325][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.587114][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.598930][ T1691] syzkaller0: mtu less than device minimum [ 44.623501][ T1691] device syzkaller0 entered promiscuous mode [ 44.651984][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.661748][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.694556][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.705352][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.732664][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.740913][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.768122][ T1705] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.775298][ T1705] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.785332][ T1705] device bridge_slave_0 entered promiscuous mode [ 44.792545][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.858558][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.866790][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.874902][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.919815][ T1705] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.928195][ T1705] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.935965][ T1705] device bridge_slave_1 entered promiscuous mode [ 45.061379][ T1705] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.068863][ T1705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.077243][ T1705] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.085512][ T1705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.157846][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.171223][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.179651][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.204375][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.212886][ T420] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.219759][ T420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.227161][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.236971][ T420] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.243852][ T420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.253726][ T1734] bridge0: port 4(ip6gretap0) entered blocking state [ 45.261943][ T1734] bridge0: port 4(ip6gretap0) entered disabled state [ 45.273566][ T1734] device ip6gretap0 entered promiscuous mode [ 45.283431][ T1734] bridge0: port 4(ip6gretap0) entered blocking state [ 45.290363][ T1734] bridge0: port 4(ip6gretap0) entered forwarding state [ 45.327043][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.372298][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.381515][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.407496][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.419473][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.451341][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.459361][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.509925][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.519234][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.543906][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.562961][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.766003][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.800533][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.856714][ T1746] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.868219][ T1746] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.876271][ T1746] device bridge_slave_0 entered promiscuous mode [ 45.905453][ T1746] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.916421][ T1746] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.932615][ T1746] device bridge_slave_1 entered promiscuous mode [ 46.026385][ T1746] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.033477][ T1746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.040708][ T1746] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.047810][ T1746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.188953][ T9] device bridge_slave_1 left promiscuous mode [ 46.195170][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.202424][ T9] device bridge_slave_0 left promiscuous mode [ 46.208716][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.294556][ T1793] device bridge0 entered promiscuous mode [ 46.326549][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.338239][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.370435][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.385018][ T23] audit: type=1400 audit(1719236922.939:133): avc: denied { create } for pid=1796 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 46.408973][ T1776] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.416417][ T1776] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.426042][ T1776] device bridge_slave_0 entered promiscuous mode [ 46.435573][ T1799] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.445475][ T1799] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.459568][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.467852][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.475836][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.482806][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.491702][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.500261][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.508271][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.515079][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.525783][ T1800] : renamed from bridge0 [ 46.548479][ T1776] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.555355][ T1776] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.567252][ T1776] device bridge_slave_1 entered promiscuous mode [ 46.583615][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.592335][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.600583][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.608753][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.646283][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.659511][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.677557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.686001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.712848][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.723852][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.770839][ T1809] device syzkaller0 entered promiscuous mode [ 46.798762][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.806875][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.816004][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.825179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.899244][ T1815] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 4284481534 > max in inode 1938 [ 46.947467][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.954802][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.997712][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.008671][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.029790][ T420] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.036642][ T420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.078770][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.104977][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.126578][ T420] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.133569][ T420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.181943][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.206506][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.245437][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.275543][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.314446][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.357449][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.365869][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.412785][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.641143][ T1840] device syzkaller0 entered promiscuous mode [ 47.680391][ T1833] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.690318][ T1833] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.699354][ T1833] device bridge_slave_0 entered promiscuous mode [ 47.721588][ T1833] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.729050][ T1833] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.736548][ T1833] device bridge_slave_1 entered promiscuous mode [ 47.856385][ T23] audit: type=1400 audit(1719236924.409:134): avc: denied { create } for pid=1857 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.933322][ T1850] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.940935][ T1850] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.948418][ T1850] device bridge_slave_0 entered promiscuous mode [ 48.007569][ T1850] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.014662][ T1850] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.035034][ T23] audit: type=1400 audit(1719236924.589:135): avc: denied { tracepoint } for pid=1872 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.063618][ T1850] device bridge_slave_1 entered promiscuous mode [ 48.090885][ T9] device bridge_slave_1 left promiscuous mode [ 48.113117][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.139851][ T9] device bridge_slave_0 left promiscuous mode [ 48.156382][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.175876][ T9] device bridge_slave_1 left promiscuous mode [ 48.195593][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.216212][ T9] device bridge_slave_0 left promiscuous mode [ 48.224742][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.434384][ T1893] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 48.491266][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.501324][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.510946][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.521415][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.532472][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.539398][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.546599][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.554965][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.563110][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.569948][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.577499][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.641181][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.649354][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.658491][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.667182][ T1060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.733961][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.743279][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.766504][ T1906] syz-executor.4[1906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.766976][ T1906] syz-executor.4[1906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.782627][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.812018][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.853959][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.867846][ T23] audit: type=1400 audit(1719236925.419:136): avc: denied { create } for pid=1914 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 48.905351][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.957899][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.966393][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.004064][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.010930][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.018532][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.026750][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.036199][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.045067][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.053022][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.061444][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.105640][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.127037][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.144680][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.166413][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.180971][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.194307][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.202674][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.242983][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.252356][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.296249][ T1942] device syzkaller0 entered promiscuous mode [ 49.314829][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.337596][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.365166][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.665382][ T1964] device vxcan1 entered promiscuous mode [ 49.830271][ T1965] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.837145][ T1965] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.844347][ T1965] device bridge_slave_0 entered promiscuous mode [ 49.851409][ T1965] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.858327][ T1965] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.865809][ T1965] device bridge_slave_1 entered promiscuous mode [ 49.902106][ T1998] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 49.925594][ T1968] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.932469][ T1968] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.941697][ T1968] device bridge_slave_0 entered promiscuous mode [ 49.960869][ T1968] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.973113][ T1968] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.980649][ T1968] device bridge_slave_1 entered promiscuous mode [ 50.096476][ T1965] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.103336][ T1965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.110461][ T1965] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.117211][ T1965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.210567][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.218952][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.226196][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.264930][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.274853][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.281709][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.291442][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.299857][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.306675][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.314383][ T9] device bridge_slave_1 left promiscuous mode [ 50.321774][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.329087][ T9] device bridge_slave_0 left promiscuous mode [ 50.335084][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.353207][ T9] device bridge_slave_1 left promiscuous mode [ 50.359972][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.369690][ T9] device bridge_slave_0 left promiscuous mode [ 50.375633][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.518974][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.532680][ T23] audit: type=1400 audit(1719236927.089:137): avc: denied { attach_queue } for pid=2039 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 50.558056][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.566640][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.599712][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.627460][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.650116][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.665513][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.674808][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.681677][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.708091][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.715648][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.724949][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.733085][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.739944][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.758689][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 50.769371][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.780208][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 50.788168][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.797737][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 50.808522][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.816575][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.824260][ T23] audit: type=1400 audit(1719236927.369:138): avc: denied { create } for pid=2058 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 50.845891][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.867629][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 50.876001][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.884835][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 50.892595][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.930475][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.938730][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.948632][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.956693][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.964923][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.973486][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.981938][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.990297][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.016886][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.025485][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.034889][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.044144][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 13:48:47 SYZFATAL: executor 0 failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67