last executing test programs: 6.381504377s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) 4.906829324s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) 3.597157256s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) 2.153986988s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) 1.742946521s ago: executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000002000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000002b703000000000000850000000600000085000000000000009500000000000000615d29e501fa2538707bdbd4e8938bf680a7d61d1c98f78a94b6b2c2cbc5c4bf6316d5843232300d7f115693a0fde927c8348671552b8436"], &(0x7f0000000000)='GPL\x00', 0x2, 0xd2, &(0x7f0000000040)=""/210}, 0x70) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0xff}, 0x48) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1}, 0x6d) 1.485695291s ago: executing program 4: perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x9120c, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x7f}, 0x104c10, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r3, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x4, 0xfd, 0x3, 0x0, 0x0, 0x27d61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0xb0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc020660b, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd632080fc020c2f0adb5b686158bbcfe8875a060500000023000000000000000000000000ac1414aa3a2008"], 0xfdef) 1.220053852s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) 1.125935786s ago: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id, @generic={0x0, 0x0, 0x0, 0x101}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.1070067s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffc}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffffe}, 0x42) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000780), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000202000000000000000000000a03000000000000000000000d00000000000018b190c9aecaca09a9163fb56afe8c7629bde1a0c713aeb19c7a86b273221bbcab22e019f723bcff4f4c390b86ada02ba0ee41c705e02dd7f91f940001c492849ccee4b2b063362ef744a8ed00"/154], &(0x7f00000000c0)=""/196, 0x3e, 0xc4, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x9c186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) sendmsg(0xffffffffffffffff, 0x0, 0x80) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/269], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) 1.057157717s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0x11, &(0x7f0000000cc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@jmp={0x5, 0x0, 0xa, 0x4, 0x5, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x0, 0x6, 0x5, 0x10, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000400)=""/155, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0x81, 0x1ff}, 0x10, 0xd24, r1, 0x0, 0x0, 0x0, 0x10, 0xfffffbff}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x36}}) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@map=r0, 0x13, 0x1, 0x7, &(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@ifindex=r2, r3, 0x25, 0x28, 0x0, @link_fd=r6, r8}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES8=r7], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='ext4_evict_inode\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xa, 0x8400, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r11, &(0x7f0000000380), 0x20000000}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x10, &(0x7f00000003c0), 0x0, 0x0, 0x6f, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100301}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 897.775771ms ago: executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r1, &(0x7f00000001c0)='FROZEN\x00', 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xed, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r1, 0x3, '\x00', r2, r1, 0x0, 0x0, 0x4, 0xa}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1442}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @jmp={0x5, 0x0, 0x4, 0x8, 0xa, 0x2, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, r3, 0x3, &(0x7f0000000c80)=[r1, r1, r4, r3, r3, r1, r3], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) 879.382464ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x1, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x2, 0x1000, 0x0, 0x100000000, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x0, 0x12, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x4, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000000723400009500000000000000e8d142c9af2f6dd626088b324fe5541eaca9a0169ee218818cec54fde89f083751c3af92047c9cbdf7a3d8e5164775d6178735cf2e97665175992f811ee465c0cee796d43f7100"/110], 0x0, 0x3f, 0xaf, &(0x7f0000000780)=""/175, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6997}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8000000}]}]}}, &(0x7f0000000080)=""/227, 0x32, 0xe3, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000000000000000000085"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x12804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8e4, &(0x7f00000017c0)=[{}, {}], 0x10, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000001380)=[{0x0, 0x2, 0xa, 0xa}, {0x1, 0x4, 0x0, 0x3}, {0x0, 0x1, 0xc, 0x3}, {0x5, 0x0, 0xd}, {0x0, 0x5, 0xd, 0xa}, {0x2, 0x2, 0x2}, {0x2, 0xda10, 0x4}]}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0xc5d7, 0x0}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x4028, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x39260dff053e910a, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x5, 0x6, 0x6, 0xffffffffffffffc0, 0xffffffffffffffff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x4a, &(0x7f0000000480)=""/74, 0x41000, 0x40, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x7fffffff, 0x10001}, 0x10, r4, 0xffffffffffffffff, 0x3, &(0x7f0000000680)=[r5, r6, r7], &(0x7f00000006c0)=[{0x0, 0x5, 0x7, 0x5}, {0x1, 0x1, 0xf, 0x8}, {0x5, 0x5, 0x4, 0xc}], 0x10, 0x2}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="b400000000000000dd0a0000000000006301a4000000000095000000000000006681fabfa7afdea451352385fd277a26b1928972a90713774dee000000008abeded0f241d9e16380276de7f845fb77f3942b1b2f835d2704d284651cec42865a01e610e1d8ebed3bca771dd8dfc94bf8454e0ba5feb0a8fb9c709340a7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r8}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 813.633615ms ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x30, 0xfffffffc}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'macvtap0\x00', 0x1}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000004c0)={[{0x2d, 'hugetlb'}, {0x2d, 'net_prio'}, {0x2d, 'net'}, {0x6, 'net'}, {0x2b, 'net_cls'}, {0x2d, 'rlimit'}, {0x0, 'cpu'}]}, 0x33) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000002e000000b70000000000000095000389e452fbf6"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r5) write$cgroup_subtree(r5, &(0x7f0000000540)={[{0x2d, 'freezer'}]}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1708) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x21) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) 803.457516ms ago: executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x7e52, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000b40)="a2", 0xfffffd2a}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000041) close(r1) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000002c000000d8cb11bb180000000000000000000000000000009500000000000000a60a000000000000180100002020782500000000102020207b1af8ff00000000bca10000000000000701000000feff03b702000008000000b703000000000000850000002d00000095000000000000000fdaccdbf6ebfa1b66645fd13a164a50b0866ea14d0a12c53aaa5516eb0251ad6a8b36b645d9c2e85a5e9456c105eea392cf3f52feace59abc41d153dcc732c509748567c75f8f6deb6db93725a7a1379f24f9f2f630270c453941a976baa7217666f4451ab2fe84eee1d1f463aba3d8edd04a8dde"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffccc}, 0x23) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x3e}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) 736.557606ms ago: executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/16, 0x10, 0x0, &(0x7f0000000040)=""/249, 0xf9}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r0, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x420800, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'veth0_vlan\x00', 0x200}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x1c, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x200}, @ldst={0x1, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffff8, 0x10}, @alu={0x7, 0x0, 0xc, 0x6, 0x8, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0x2, 0xa, 0x5, 0x7}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xe}, @exit, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}]}, &(0x7f0000000380)='syzkaller\x00', 0x8, 0xd1, &(0x7f00000003c0)=""/209, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000004c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xd, 0x3, 0x4}, 0x10, r0, 0x0, 0x1, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x4, 0xa}], 0x10, 0x379}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={r4, 0x8, 0x8}, 0xc) r6 = perf_event_open$cgroup(&(0x7f0000000800)={0x4, 0x80, 0x0, 0x0, 0x3, 0x7, 0x0, 0x400, 0x10208, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x37}, 0x110088, 0x24, 0x7fffffff, 0x0, 0x4, 0x7ff, 0x0, 0x0, 0x1f, 0x0, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000780)={0x610119099ca505f9, 0x80, 0x7, 0x20, 0xfc, 0x1, 0x0, 0x1, 0x34456, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_config_ext={0x7fff, 0x3f}, 0x900, 0x22e, 0x1, 0x2, 0x0, 0x6, 0x6, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x8, r6, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c00)={r3, 0x0, 0x50, 0xd4, &(0x7f0000000880)="73635a8e5422fa41e6e4bc84dbad063c6dd89dcc76b5e63e9912a094ea638dc0ab1124a8ffcf7c1ff6f3500d1bc02315bed09f18f1d8250ed0ba22e8cbc7fa22e0c0d176c93b306ac6332ff4f86447f8", &(0x7f0000000900)=""/212, 0x800, 0x0, 0xf3, 0xea, &(0x7f0000000a00)="6381fbf3c1940832a527a8edd08da4bc8f60ca29b25e4e56d7d41318f65df2901a4d6f8abc6e2ee2cb829b57b6d20b81861c322ea23c7f65b7a09067e94338ce1a37c3c48ce0d274501b705d43454d837861984d01e3be4a15917e416d81ff81cf55e535d583bc9f851c2f6bcf0c23047512c56b1f74247f1001c92f95ee83878f748c6294271a931dd1f6bc084cdf5c4a49c79b5bd9d848dd0a290df4224066e60647ea41c2a52e546407cd868196e307d48263c010da9fa37e37661198a75c386d4bac9f7ffc2ebf408e83ff29c2a978139588ed8bc7c4ab328e4f60124aa65173803722f80fad996f35bc7076defca2a4f9", &(0x7f0000000b00)="e00cf4f646a0b48bde691a43e1fc0957279ef8a155f9fdeb9525766f6789943eafffaa333fe6de4660a44e5adf62da333263e3790d3524550ade3bec3c30a545e52d6b5a7a731e0afebbe6d23fe2503d35aee9ea0e8c6b798f73f4f1684ac7875168dff3c9039e1cab14ea49e8ae41bd69ce13e3bd25186df78458fd4402fbfda7b32a4b018e1588ba2f28b139b02da01d9ade528eb835807109e90f73046ab53a5f5c403e88933eab741c32164ed054729f5f10652c3240f26d4e00dc06245fe354adad5808567323b23e9347cd4393d58dc9e96e647d6aac6b01c3d969cf70dcb5f74aac0342a8669b", 0x2, 0x0, 0x6}, 0x50) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000000c80)=0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000cc0)=0x6) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000d00)={'veth0_macvtap\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d40)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000d80)) sendmsg$tipc(r8, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000dc0)="cab8bd2568d358a19d4cc01f6cf2f4f0e42aded0baf78f87e0999142d93a75b5729b0d8f1440a327fbb4830afe12", 0x2e}, {&(0x7f0000000e00)="017129e07235c5a2b8602109414b5ae0dbedad05d53a6fba77fb6d4e8c40add4ffe43d2a8b7bcc9e82cde1c124d5b48018328e9e8731de52d3ad32c2c2c23435b189e0fe6871dc192714797798c403ff66416813e68f9219035201f13bdf8e266e90ea03fa87ed06b54f2105b1e4ed0cb0759c487d9c1bd45ad9519eab1f8d07dd77dbd3e7e42801", 0x88}, {&(0x7f0000000ec0)="ff04b0b54eb57d34341cb3665549c52cce482762cc1fced1d4e3dee262df18cf48f8931e8d1d9e627d91e15d77b24824d5a5eee6a993964227e49371c5f754ce43df7a9f2c4807d183b0a6af3c78cd85b6193a022ad30fe4c36074ad9a9a375544e3615b7979698ecf642acf6ebee0f1e7279554184dce40f3f8b9b15c1f098de939ff0ff82d4756564bcdaf39c0c25fddf0138b3c3118225cefbf48fb26f08be043", 0xa2}, {&(0x7f0000000f80)="9c8736a5097e44cf3c9f79f5ac6dbe63c1d59b5db26aef036a40a5b71bbf073630af319329b4726a2eb0cea89f4afdb42d065f03f2391d4a4e84c40adb4b52929124cb495f3bc67599f3fb9521e4fb3cdd04e73ca78e0147079acbbeedacfb932c3c5b3081953c3057c82b543d98f782914952c1fd0622cad3b37297cf0c00cc9c8faa86cb2d8ae5a4887f6a6e6ae8ba511d3ef46f59461388ea0e3c1bc28b9be03829c2481862f7d11351aa76ca6f0c86dd8006b19fdedcc0e9dc40cd3aba51fe793481173f549da738b8d6cde8916e14324f3c9e8c7c0648ed346c4d9905f24bc719642e01418f4d6647638f6f0e2ce9a40306c0e791", 0xf7}, {&(0x7f0000001080)="c156fd1ede43f95681f5b4905d94", 0xe}, {&(0x7f00000010c0)="7dd53362d3d66c412e35915ede617e78b36b62e0597150e9dc00d966a387753fb789e34808a75a90a4c8ef562bcb50ba10f4f92bd9a1da0b353d61f39546bcd2504a891f5277cf4e56c52bd948427ab51f6bd564136e6ba36f6d86e0d4", 0x5d}], 0x6, &(0x7f00000011c0)="8121e1ac1d0c3bc4a15eae6445d13fc31941975dc4fa5c3951901f251dd4a5ad765d336f5d8693a50eb8333f35c68d314f5c76982fee65bb908b2da0edda89ba5ba9ca6913bc0c11a77119b7ff7313565a2b19258aba119cba17f527a2edb825673007da1fd04e1760f9a234b67681b16aeb75af0c77afe11dfc032f4f6dc3d95b334398888eeffef7a0c639e3", 0x8d, 0x1}, 0x44040) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000012c0)='cpuset.memory_migrate\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000001300)=r3, 0x4) r9 = openat$cgroup_subtree(r8, &(0x7f0000001340), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000001380)={[{0x2d, 'net_cls'}]}, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup.net/syz0\x00', 0x1ff) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001540)={@ifindex=r5, 0x20, 0x1, 0x7, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000001480)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) ioctl$TUNSETLINK(r10, 0x400454cd, 0x303) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001580)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, r7, 0x0, 0x1, &(0x7f00000015c0)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001640)={@cgroup=r8, r10, 0xe, 0x2000, r3, @prog_id=r12, r11}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001700)={{r10, 0xffffffffffffffff}, &(0x7f0000001680), &(0x7f00000016c0)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{r13}, &(0x7f0000001740), &(0x7f0000001a40)}, 0x20) 721.485849ms ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8995, &(0x7f00000000c0)=':d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c25000000006cc020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_ext_rm_leaf\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xc3, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x3, '\x00', r7, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000002c0)=ANY=[], 0x7) write$cgroup_int(r8, &(0x7f0000000280), 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x6f}, [@ldst={0x5}]}, &(0x7f00000006c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r4}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 630.408203ms ago: executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40800000000000061151002000000000400000e000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000140)="8cadac68686c8e70aeaa203b25af4dab041c6166b3eb9e9845554092258e83543f2b3e459d81c27b31d9dabcc72ad2273e103fb74a36483997956e79826bf2bab3fe1ff83c88216c756433a6f338c64d91d68f81f0daaa6e26fb6d5219f58725896a55324dac8622a3446423663eb3b0658872ebea0bde40db812d2221d8151069febf34650d9b5a2e5532f6e78c0a3cd63c16a36174dbe15189fb89621798ca0d715b98ca19ce34a64f7c", &(0x7f0000000200)=""/241, 0x4}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 626.051534ms ago: executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x6, r0, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00'}) perf_event_open(0x0, 0x0, 0x40000d, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='+cpu +memory \vfreezer +cpu ls \x00'/40], 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/mnt\x00') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003740)='ns/mnt\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b70800020000000018ff5dae41f9365382a594ddb97b8af8ff00000000bfa200000000859a2d3500000000fffffc03000000000b00b7040000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1ff}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) 601.366917ms ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id, @generic={0x0, 0x0, 0x0, 0x101}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 563.650033ms ago: executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0xbc, &(0x7f0000000a00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0x5, 0x2, 0x0, 0x3962, 0x1, 0x0, '\x00', r0, r2, 0x4, 0x2, 0x5, 0xe}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES16=r1, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b7a900000000000085000000190000009500000000000000f8"], &(0x7f0000000000)='GPL\x00', 0x0, 0xea, &(0x7f0000000c40)=""/234, 0x0, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0x68, &(0x7f0000000580)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x14, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x8000000000000001}, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_es_remove_extent\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gretap0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x48) openat$cgroup_ro(r7, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="41ddc8f0c02918f8afbb29fb667dad89b758a0d65bf0699a33b03e3d2f48674efdb129f0ae", @ANYRES32=r8, @ANYRES64=r5], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="186b0000010000000000000009000000182a0000", @ANYRES32=r3, @ANYBLOB="00000000ac000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008ffffffff000000000000008500000006000000"], &(0x7f0000000040)='GPL\x00', 0x101, 0x9c, &(0x7f0000000240)=""/156, 0x0, 0x40, '\x00', r5, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x80000000, 0xfff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0, 0x10, 0x1}, 0x90) 548.264195ms ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079109200000000007b0ae8ff"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffdcc}, 0x90) mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'geneve1\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x8, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x84, 0xfffffffffffffffa}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000380), 0x20000000}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000de5e8db995c78d56fbe6ec1320893c789b629b973583f0c6c690e7138f08f8442262c0bf3586886666a4662173ea73e4294dbf54c093e1e1487be44f8227dda66b599410ea1d773b", @ANYRES64=r2, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000050000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0xbf25}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000000c0)={r6, &(0x7f00000000c0), 0x20000000}, 0x20) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x19, 0xaf, 0x80007f, 0x362, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000700000018620000050000000000000001000000185100000b0000000000000000000000180000000000000000000000000000008500000000000000a600500000000000180100002020782500000000002020207b12f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xec, &(0x7f00000006c0)=""/236}, 0x90) 506.131582ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x7, 0x10001, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000180000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000280)='consume_skb\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000008000000000000000004000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000540)='ext4_ext_convert_to_initialized_enter\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000100)="b9ff0b076859268cb89e14f0655847", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000022c0)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x8, 0x7fe2, 0x2}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff8000}, {}, {0x7, 0x0, 0xb, 0x9}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r7, @ANYRESDEC=r8, @ANYRESDEC=r6], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r8, &(0x7f0000000180)=ANY=[], 0x36) 484.670335ms ago: executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x17}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f00000001c0), &(0x7f0000000080)=""/52, 0x9}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, &(0x7f0000000540)=0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)=@l2tp={0x2, 0x0, @broadcast, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000740)}, {&(0x7f0000000840)="b7f288b4933840e94be22db3751e4a8fbf8164f6c27fa39dbc789be4ac59d401d45fae2958f17129c738cce3412f759f4ec4729255bf08", 0x37}, {&(0x7f0000000200)="7c9525267bc44033411820a6b25d82", 0xf}], 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x188}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x28, 0x5, 0x7, 0x100, r3, 0xffffff22, '\x00', 0x0, r3, 0x1, 0x3, 0x0, 0x7}, 0x77) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x202, 0x1, 0x6, 0x20, r6, 0x10000, '\x00', 0x0, r0, 0x0, 0x1, 0x4, 0xa}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="660a0000000000007910a8000000000018100000", @ANYRES32=r7, @ANYBLOB="ff070080000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) 465.165538ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1d, 0x16, &(0x7f0000000800)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRES64=0x0, @ANYRES64], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x2000}, 0x10}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000022851000000600000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000660000000000000018000000000000000000000000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x10, 0x0, 0x7, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a700000095"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1e, &(0x7f0000000000)='/proc/?\x00u\x95\x89t\xf3\xcc\xb4_\xf9aK\a0\x04\x00\x00\x82q\xee\xe0 \x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r3, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x26e1, 0x0) ioctl$TUNSETPERSIST(r5, 0x800c6613, 0xfffffffffffffffe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xfc2, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r4, r5, 0x4, 0x1, 0x2}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000540)={&(0x7f0000000300)="ac16872bc8d25ecc0fae741b56df6c624fbacc56e8c4f08751b78d989acb6a6db62becd4c323d3201ecd84e488fbab044d3c89ae7a7ca3460b70840c1a9cdbe4dabde3dbe31f94cd4774a77d6343c8cf6c3438af278fcc71be2c34f6b5c50608edf7273c1e14547974f606d75a3a939ed4fc1de23567cfa0a22cab4bb8d95465411baba958b2013cd66022bdd1d5c168902a06f0a5184a40a4f71b15fdd847b6c30579fc862b29cb5ea8a00aabcfef171de5b0b678db60a5", &(0x7f00000003c0)=""/145, &(0x7f0000000480)="be030642c915fb0b91d34241c2bd4dee9bbe0d64c802060b574eb65093cf975fbff7200d3f856b704c63c2a992f0a4b54184adb2d6ef2e029de5b83491055cf121219b1fe5ca31decdef2bd91e9260fae1a3ed7209e3c046fc083a3604482d5a7854f7e260dbf4dff8ebf643954ee460461fc181d606949002dbf467d0b8c0aff5f124908427efaf5cd4031a4f1acc205c546274f705c31f7dd55a", &(0x7f0000000140)="2653dc706ebee55d4821323f2abdff6bf6c1c5919d6cf1bf084e213048b7c84965fa830ec9faa2cb39adc762d3a8fa07f7565e61acffebc668de3169c9e8a504233c54884bb2e9e360969c47cee3514e64b36b1265e30894", 0x4, r3}, 0x38) socketpair(0x0, 0x2, 0x0, &(0x7f0000000200)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x16, 0x0, 0x8, 0x10002}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r6}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) getpid() r8 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) 385.64343ms ago: executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_freezer_state(r1, &(0x7f00000001c0)='FROZEN\x00', 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xed, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r1, 0x3, '\x00', r2, r1, 0x0, 0x0, 0x4, 0xa}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1442}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1e1}}, @jmp={0x5, 0x0, 0x4, 0x8, 0xa, 0x2, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, r3, 0x3, &(0x7f0000000c80)=[r1, r1, r4, r3, r3, r1, r3], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) 378.464291ms ago: executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x0, 0xb3, 0x0, 0x411}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x0, 0x0, 0x60, 0x9, 0x0, 0xffffffffffffffff, 0x42, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={0x0, 0x0, 0x4f}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x6a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b408000000000000791090000000000061004000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xd2, &(0x7f00000001c0)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff, 0x5b, 0x4, 0x10, 0xffffffffffffffff, 0x75, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x80005, 0x4, 0xb}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1c442, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/109}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003000000001000007ed0c77c659e9000000000000000000008300000000050000f803b309fe051813b908c3de33d135090000000000000d00000000000000"], &(0x7f00000004c0)=""/155, 0x4a, 0x9b, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 259.870859ms ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdbfffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd57d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5a9cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e58f91f5d762bd8e89b495e3094af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8aed43e392955f4f979ea13201bafe4f0f6ea508004000a0c548552b571bed5647323478a99681cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b304723177d356c46e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2befabd4e79d425395740bb56525e0a1b1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31809053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4d2a3453602003f0001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea020000000000000027834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f8790c95dde218446a1f1eca93bd115e986c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177dbe810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d0681d9b447dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af5010000000000000089ac3943562b530db5240bd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910cd643d1a0425c8442e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcffb35eb0422b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b52c9cfdaf6695cd4a5ad562cc5d080fa4d8c5891959b761eec6dc988532782fda13239c6300000000000000000000000000000000000033c5579a437471344bcf412eecf71e1f17e77602c540164d3686294840c9b298ad29bd80cfa2343bd2d2d340a4749487fea0977023ef684b80aa8c0000a6308f3be8c61c620dc4d705d4259095de5cb8be54e8d76b7e28e0adc637f33292bd393b432847383ad9cdc4cc0feb6bef5ccdca500b8b84c82e003c3047d435ee894d7ec2c610e333ccf8c95011be0f1645c2773d0b5e4eb2a0eb8d2465c28de4a7d2100d01f8b2"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000700)=[{&(0x7f00000003c0)=""/157, 0x9d}, {&(0x7f0000000300)=""/23, 0x17}], 0x2, &(0x7f0000000740)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x6100) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={r3, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x101, '\x00', r5, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x5d}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {0x3, 0x0}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x6a}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 122.589231ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1f, 0x9, 0x10001, 0x9, 0x81, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x7fe2, 0x5}, 0x48) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000001300)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0xfe, 0xd, 0x77, 0x6, 0x0, 0x106, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x1000000}, 0x0, 0x4, 0x0, 0x0, 0xfffffdffffffffff, 0x1, 0xc5, 0x0, 0x5, 0x0, 0x4000010000080000}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4048, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x4000, 0x3, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x6, 0x3, 0x3, 0x0, 0x0, 0x58, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000bc0), 0x1}, 0x92c46, 0x3, 0xa16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0xe, r2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x0, 0x0, &(0x7f0000000d40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x11}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x902}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x9, 0x800, 0x4002, &(0x7f0000000880)) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x19, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="0000cf0432b7000000000000b70200000000000085000000860000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000048000000b70300000180ffff8500000006000000239400002020732500000000082020207b00000080000000bfa10000", @ANYRES64=r3], &(0x7f0000000440)='syzkaller\x00', 0xb65, 0x61, &(0x7f0000000e00)=""/97, 0x40f00, 0x78, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x5, 0x28, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f00), 0x0, 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x13, 0xb, &(0x7f0000001500)=ANY=[], &(0x7f0000001140)='syzkaller\x00', 0xb9f, 0x91, &(0x7f0000000b00)=""/145, 0x41100, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x8, 0xfffffffc}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x20000b, 0x8, 0x100000}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000640)=[r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff], &(0x7f0000000d80)=[{0x0, 0x4, 0x4, 0x6}, {0x2, 0x3, 0xf, 0x2}, {0x3, 0x84, 0x0, 0x4}, {0x2, 0x4, 0x10, 0x9}, {0x0, 0x5, 0x9, 0x2}], 0x10, 0x1}, 0x90) r6 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x50002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4cea, 0x6}, 0x88000, 0x0, 0x0, 0x6, 0x5, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40d, 0x84104, 0xf, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000300), 0x23bd72fde44a5d0}, 0x690, 0xffff, 0x6e, 0x9, 0x80000402, 0x6, 0xca, 0x0, 0x9, 0x0, 0x8000000000000001}, 0xffffffffffffffff, 0x0, r6, 0x1) getpid() bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r5}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) recvmsg$unix(r3, &(0x7f0000000a80)={&(0x7f00000007c0), 0x6e, &(0x7f0000000940)=[{&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000001080)=""/144, 0x90}, {&(0x7f0000000840)=""/3, 0x3}], 0x3}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000b7d895ba9e2a37b900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='ext4_writepages\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 105.754203ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd52}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x19000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xd6, &(0x7f0000000240)=""/214, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000001c0), 0x10}, 0x90) write$cgroup_int(r0, &(0x7f0000000000), 0x12) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'batadv0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100}, 0x100620, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100180000000002000000000000000000000d0000000000000000520000000000e1c097b5ddd5ff122e9ac6db7e8b3e87c06122813c32ef5c148b5719f6b6e3ba70861d44cdace9e18fb67d7ab7d80e6ac765b2ad28ccaf0b98b068ae16b46aca5aa3ca0af3e9d001dfebe0c2d941936005599cd9061ddd89e53da4c43f0008d4c2b63cdc845037718baedbe314c36eb1e84d1edbf02f6f3fe30ba869ecae052721d0"], &(0x7f0000000100)=""/223, 0x32, 0xdf, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xb}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES16=r1, @ANYRES64=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5dd}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061120000000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x9, 0x5, 0x20009, 0x7}, 0x48) 0s ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063110c0000000000851000000200000c85000000000d7c00000095000000000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1802000000c000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca95309ba96d5a45bbbdb5fa529d139d075b3f51be98db7efbb05983cba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d3822002fbeb1ed99dd0ce92f32d420bfcc2635421d739ad621d6953b1136b506d000000000000002dbee528678eb47efb7bbf19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d86dcc8a40a9e819c8afbba368f5456cced8af245d500100000fba2d0b57605c7a70000000047dad5142856c93a667c282198392f13c57075779d4dade4fbffb23cae63a4d0a7138d9fd81aeffd1958aab4b28cd6384db3a2a2ab5481a4d4e26be0574964393190891b25ad9257a56fd5653133e568783b9b8ac3bcdc3c0841621414ab389b5580cd083a228e4307a1c13005b68b46a8e7002a0436b2789de09fb4d3aba52222d9339a2139c5d63e25ec86eef10aad1d05ac034b582a9254446ce64a2f60a9555878942537c0027b2b1861851fe2276c8d211382574705cb757cf1f84aae47289bee5aa9c12f350f754617298e8f9993579b08aafd4e58772d139173e588a778f14dd174c556e175ed926cc11dd7649b97cdcc3272bfdffc8e21bc6da503e4c351966964f57652cd9ed90addaa69630c77359c7bf0ddab9b43b71a75e079"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106}, 0x18) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000100)="77de52074c9bbd246c00bab8b36871beff9d1fda88aa1ae374dfd31203b40fd931262a943fa86987a3b992bde3af3491ce111c620ebd0df74907b616d0013285c3f0084f2a06de752535315874e003c697f98ad5802c79e2", &(0x7f0000000240)=""/50}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc52}, 0x28) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.14' (ED25519) to the list of known hosts. 2024/06/24 17:58:34 fuzzer started 2024/06/24 17:58:34 dialing manager at 10.128.0.163:30002 [ 21.843635][ T23] audit: type=1400 audit(1719251914.340:66): avc: denied { node_bind } for pid=345 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.864094][ T23] audit: type=1400 audit(1719251914.340:67): avc: denied { name_bind } for pid=345 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.916034][ T23] audit: type=1400 audit(1719251914.410:68): avc: denied { mounton } for pid=353 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.918165][ T353] cgroup1: Unknown subsys name 'net' [ 21.943070][ T23] audit: type=1400 audit(1719251914.410:69): avc: denied { mount } for pid=353 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.944987][ T353] cgroup1: Unknown subsys name 'net_prio' [ 21.971246][ T355] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.971550][ T353] cgroup1: Unknown subsys name 'devices' [ 21.988720][ T23] audit: type=1400 audit(1719251914.480:70): avc: denied { setattr } for pid=359 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.011897][ T23] audit: type=1400 audit(1719251914.480:71): avc: denied { unmount } for pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.031829][ T23] audit: type=1400 audit(1719251914.490:72): avc: denied { mounton } for pid=361 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.056836][ T23] audit: type=1400 audit(1719251914.490:73): avc: denied { mount } for pid=361 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.080585][ T23] audit: type=1400 audit(1719251914.490:74): avc: denied { relabelto } for pid=355 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.105956][ T23] audit: type=1400 audit(1719251914.490:75): avc: denied { write } for pid=355 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.135719][ T353] cgroup1: Unknown subsys name 'hugetlb' [ 22.141569][ T353] cgroup1: Unknown subsys name 'rlimit' [ 22.155405][ T354] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/24 17:58:34 starting 5 executor processes [ 22.630479][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.637486][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.645082][ T371] device bridge_slave_0 entered promiscuous mode [ 22.653512][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.660338][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.667816][ T371] device bridge_slave_1 entered promiscuous mode [ 22.820298][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.827175][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.834502][ T378] device bridge_slave_0 entered promiscuous mode [ 22.850837][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.857706][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.865055][ T378] device bridge_slave_1 entered promiscuous mode [ 22.914245][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.921081][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.928497][ T376] device bridge_slave_0 entered promiscuous mode [ 22.942651][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.949488][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.956889][ T379] device bridge_slave_0 entered promiscuous mode [ 22.966991][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.973861][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.981230][ T379] device bridge_slave_1 entered promiscuous mode [ 22.987749][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.994698][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.001912][ T376] device bridge_slave_1 entered promiscuous mode [ 23.033969][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.040819][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.048565][ T373] device bridge_slave_0 entered promiscuous mode [ 23.059106][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.066185][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.073588][ T373] device bridge_slave_1 entered promiscuous mode [ 23.094598][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.101676][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.109127][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.115863][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.252236][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.259078][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.266221][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.272976][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.311616][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.319109][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.326498][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.333530][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.341501][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.348844][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.382502][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.390471][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.397318][ T363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.413424][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.421394][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.428272][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.448428][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.455769][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.483394][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.491363][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.498210][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.505763][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.513975][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.520788][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.528089][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.535850][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.558114][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.566341][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.573179][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.580655][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.589203][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.596045][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.603393][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.611207][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.619395][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.632864][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.640290][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.648232][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.656853][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.665205][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.672059][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.697690][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.705333][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.713315][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.721113][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.729318][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.737492][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.744327][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.751448][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.759316][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.789774][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.797778][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.805848][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.813767][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.821467][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.828910][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.837533][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.845854][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.853877][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.860848][ T363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.868297][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.876440][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.884756][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.893130][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.901323][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.923689][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.931476][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.941056][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.949483][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.957322][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.965482][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.989730][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.998027][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.006334][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.015765][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.024118][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.032331][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.040419][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.048907][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.057221][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.065518][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.073752][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.080563][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.088079][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.096576][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.104870][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.112868][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.135612][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.144511][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.152476][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.160209][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.168087][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.176227][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.205258][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.213572][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.221869][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.230702][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.238866][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.246714][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.254451][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.262624][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.270714][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.279025][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.304577][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.326274][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.334087][ T401] cgroup: syz-executor.1 (401) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.334091][ T401] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.381219][ T397] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.388298][ T397] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.401850][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.417837][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.427090][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.435428][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.443727][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.451864][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.460207][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.468777][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.477439][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.485814][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.510745][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.517722][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.524897][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.531836][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.554907][ T397] device bridge0 entered promiscuous mode [ 24.594063][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.603314][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.619053][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.627800][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.640979][ C0] hrtimer: interrupt took 29671 ns [ 24.892953][ T435] syz-executor.0[435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.893689][ T435] syz-executor.0[435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.918564][ T435] syz-executor.0[435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.783876][ T466] device syzkaller0 entered promiscuous mode [ 25.891404][ T476] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 25.993929][ T482] [ 25.996075][ T482] ********************************************************** [ 26.003309][ T482] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 26.010718][ T482] ** ** [ 26.017935][ T482] ** trace_printk() being used. Allocating extra memory. ** [ 26.025136][ T482] ** ** [ 26.032705][ T482] ** This means that this is a DEBUG kernel and it is ** [ 26.039940][ T482] ** unsafe for production use. ** [ 26.047270][ T482] ** ** [ 26.054622][ T482] ** If you see this message and you are not debugging ** [ 26.061824][ T482] ** the kernel, report this immediately to your vendor! ** [ 26.069174][ T482] ** ** [ 26.076688][ T482] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 26.083928][ T482] ********************************************************** [ 26.661190][ T499] device syzkaller0 entered promiscuous mode [ 26.886466][ T23] kauditd_printk_skb: 35 callbacks suppressed [ 26.886475][ T23] audit: type=1400 audit(1719251919.380:111): avc: denied { create } for pid=530 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 27.169460][ T371] syz-executor.1 (371) used greatest stack depth: 19800 bytes left [ 27.247326][ T23] audit: type=1400 audit(1719251919.740:112): avc: denied { read } for pid=563 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.336768][ T23] audit: type=1400 audit(1719251919.830:113): avc: denied { ioctl } for pid=565 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=9265 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.446948][ T23] audit: type=1400 audit(1719251919.860:114): avc: denied { create } for pid=575 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 27.726548][ T574] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.754596][ T574] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.785114][ T574] device bridge_slave_0 entered promiscuous mode [ 27.809126][ T23] audit: type=1400 audit(1719251920.300:115): avc: denied { setopt } for pid=611 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.812310][ T574] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.846913][ T574] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.854739][ T574] device bridge_slave_1 entered promiscuous mode [ 28.304229][ T179] device bridge_slave_1 left promiscuous mode [ 28.310280][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.322275][ T179] device bridge_slave_0 left promiscuous mode [ 28.354443][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.495559][ T632] Y4`Ҙ: renamed from lo [ 28.501145][ T634] bridge0: port 3(gretap0) entered blocking state [ 28.507732][ T634] bridge0: port 3(gretap0) entered disabled state [ 28.528901][ T634] device gretap0 entered promiscuous mode [ 28.536311][ T634] bridge0: port 3(gretap0) entered blocking state [ 28.542575][ T634] bridge0: port 3(gretap0) entered forwarding state [ 28.601649][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.609506][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.641572][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.651291][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.659650][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.666509][ T408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.675149][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.683429][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.691456][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.698315][ T408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.708412][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.716908][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.719480][ T23] audit: type=1400 audit(1719251921.210:116): avc: denied { create } for pid=646 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 28.747705][ T647] bridge0: port 3(gretap0) entered disabled state [ 28.754064][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.761107][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.772775][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.781257][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.791704][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.801691][ T647] device gretap0 left promiscuous mode [ 28.807393][ T647] bridge0: port 3(gretap0) entered disabled state [ 28.814332][ T647] device bridge_slave_1 left promiscuous mode [ 28.820702][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.839685][ T23] audit: type=1400 audit(1719251921.330:117): avc: denied { create } for pid=654 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 28.859463][ T647] device bridge_slave_0 left promiscuous mode [ 28.868966][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.913745][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.930995][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.965529][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.132344][ T23] audit: type=1400 audit(1719251921.620:118): avc: denied { create } for pid=661 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 30.243044][ T23] audit: type=1400 audit(1719251922.740:119): avc: denied { write } for pid=729 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=9265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.795713][ T742] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.822824][ T23] audit: type=1400 audit(1719251923.320:120): avc: denied { create } for pid=757 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 30.827840][ T742] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.856073][ T742] device bridge_slave_0 entered promiscuous mode [ 30.865219][ T742] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.872294][ T742] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.886134][ T742] device bridge_slave_1 entered promiscuous mode [ 31.095327][ T781] device syzkaller0 entered promiscuous mode [ 31.107810][ T742] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.114678][ T742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.121770][ T742] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.128552][ T742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.201088][ T782] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.208552][ T782] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.276518][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.286983][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.304871][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.313211][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.336826][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.343720][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.352105][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.361819][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.372135][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.378963][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.421374][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.437406][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.450057][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.460588][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.496956][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.523149][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.624822][ T802] device pim6reg1 entered promiscuous mode [ 31.645079][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.654441][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.717928][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.730148][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.766352][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.799167][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.850003][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.872945][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.955115][ T23] audit: type=1400 audit(1719251924.450:121): avc: denied { relabelfrom } for pid=821 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.999340][ T23] audit: type=1400 audit(1719251924.470:122): avc: denied { relabelto } for pid=821 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.030273][ T824] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 32.345025][ T833] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.354980][ T833] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.363618][ T833] device bridge_slave_0 entered promiscuous mode [ 32.376193][ T833] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.383220][ T833] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.391368][ T833] device bridge_slave_1 entered promiscuous mode [ 32.635461][ T833] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.642367][ T833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.649448][ T833] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.656221][ T833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.710843][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.722804][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.755024][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.810174][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.818964][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.825858][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.834128][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.842320][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.849168][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.856473][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.872506][ T399] device bridge_slave_1 left promiscuous mode [ 32.878721][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.887086][ T399] device bridge_slave_0 left promiscuous mode [ 32.895303][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.975186][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.018942][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.065927][ T893] device sit0 entered promiscuous mode [ 33.143914][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.180945][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.199519][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.229244][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.273898][ T23] audit: type=1400 audit(1719251925.770:123): avc: denied { create } for pid=911 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 33.404716][ T926] syz-executor.1[926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.404767][ T926] syz-executor.1[926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.457338][ T923] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.492826][ T923] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.507645][ T923] device bridge_slave_0 entered promiscuous mode [ 33.527592][ T923] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.544736][ T923] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.562418][ T923] device bridge_slave_1 entered promiscuous mode [ 33.589861][ T934] device sit0 entered promiscuous mode [ 33.903565][ T923] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.910413][ T923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.917567][ T923] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.924318][ T923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.010092][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.027908][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.036959][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.119270][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.130134][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.137100][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.156941][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.166811][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.173703][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.205494][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.258995][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.268492][ T399] device bridge_slave_1 left promiscuous mode [ 34.275583][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.284280][ T399] device bridge_slave_0 left promiscuous mode [ 34.290231][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.359682][ T964] device sit0 entered promiscuous mode [ 34.461349][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.470964][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.489906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.498181][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.514719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.524630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.564518][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.573066][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.619658][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.641660][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.745304][ T23] audit: type=1400 audit(1719251927.240:124): avc: denied { create } for pid=988 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 34.991065][ T1008] device sit0 left promiscuous mode [ 35.000284][ T23] audit: type=1400 audit(1719251927.490:125): avc: denied { tracepoint } for pid=1000 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.068469][ T1012] device sit0 entered promiscuous mode [ 35.201924][ T1009] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.239238][ T1009] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.269288][ T1009] device bridge_slave_0 entered promiscuous mode [ 35.307157][ T1009] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.323126][ T1009] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.340791][ T1009] device bridge_slave_1 entered promiscuous mode [ 35.577959][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.586587][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.596887][ T23] audit: type=1400 audit(1719251928.090:126): avc: denied { create } for pid=1044 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 35.639077][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.665112][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.678176][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.685140][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.707768][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.730566][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.754396][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.770821][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.777712][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.800697][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.818092][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.887700][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.907223][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.921343][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.989476][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.001474][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.063282][ T399] device bridge_slave_1 left promiscuous mode [ 36.069576][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.081882][ T399] device bridge_slave_0 left promiscuous mode [ 36.085291][ T23] audit: type=1400 audit(1719251928.570:127): avc: denied { create } for pid=1080 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.107612][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.189591][ T1081] 7: renamed from syzkaller0 [ 36.222124][ T1090] syz-executor.3[1090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.222172][ T1090] syz-executor.3[1090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.319731][ T1073] device syzkaller0 entered promiscuous mode [ 36.447355][ T23] audit: type=1400 audit(1719251928.940:128): avc: denied { create } for pid=1104 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.576888][ T1116] device syzkaller0 entered promiscuous mode [ 36.766475][ T1117] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.775331][ T1117] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.784014][ T1117] device bridge_slave_0 entered promiscuous mode [ 36.794541][ T1117] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.812078][ T1117] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.825456][ T1117] device bridge_slave_1 entered promiscuous mode [ 37.215840][ T1143] device syzkaller0 entered promiscuous mode [ 37.274314][ T1117] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.281207][ T1117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.288329][ T1117] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.295174][ T1117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.393367][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.405200][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.447490][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.455295][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.465691][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.475467][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.483983][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.490831][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.498570][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.507233][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.515607][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.522551][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.561437][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.580405][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.592441][ T399] device bridge_slave_1 left promiscuous mode [ 37.598414][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.609017][ T399] device bridge_slave_0 left promiscuous mode [ 37.618374][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.783048][ T23] audit: type=1400 audit(1719251930.280:129): avc: denied { create } for pid=1183 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 37.834878][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.846196][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.863440][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.873414][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.902574][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.911137][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.946724][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.955766][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.964955][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.974262][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.982825][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.991323][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.328059][ T1205] device syzkaller0 entered promiscuous mode [ 38.353511][ T1218] device wg2 entered promiscuous mode [ 38.843004][ T1234] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.849926][ T1234] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.857499][ T1234] device bridge_slave_0 entered promiscuous mode [ 38.996509][ T1240] device syzkaller0 entered promiscuous mode [ 39.007162][ T1234] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.014494][ T1234] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.025630][ T1234] device bridge_slave_1 entered promiscuous mode [ 39.236354][ T1234] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.243222][ T1234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.250321][ T1234] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.257143][ T1234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.315712][ T399] device bridge_slave_1 left promiscuous mode [ 39.321975][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.337373][ T399] device bridge_slave_0 left promiscuous mode [ 39.343653][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.434807][ T1280] ip6_tunnel: non-ECT from fefd:ffff:ff00:0200:875a:2596:9ff5:7b00 with DS=0x31 [ 39.507442][ T1263] device syzkaller0 entered promiscuous mode [ 39.517205][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.524896][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.542257][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.549599][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.573527][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.589823][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.598310][ T782] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.605198][ T782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.633664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.642399][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.650455][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.657343][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.682177][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.690110][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.698313][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.706443][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.717471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.726565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.744298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.752439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.772094][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.781981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.820365][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.829429][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.838991][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.847543][ T787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.231616][ T1322] device syzkaller0 entered promiscuous mode [ 40.448901][ T1326] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.456309][ T1326] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.464240][ T1326] device bridge_slave_0 entered promiscuous mode [ 40.474082][ T1326] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.481177][ T1326] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.490433][ T1326] device bridge_slave_1 entered promiscuous mode [ 40.738038][ T7] device bridge_slave_1 left promiscuous mode [ 40.759852][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.790843][ T7] device bridge_slave_0 left promiscuous mode [ 40.818280][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.996942][ T1382] device syzkaller0 entered promiscuous mode [ 41.036436][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.045109][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.050892][ T23] audit: type=1400 audit(1719251933.540:130): avc: denied { append } for pid=1387 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=9265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.053276][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.083855][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.091342][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.099982][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.108421][ T782] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.115303][ T782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.123388][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.131758][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.140864][ T782] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.147748][ T782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.155141][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.171010][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.182321][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.200496][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.314835][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.324572][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.802567][ T1436] syz-executor.4[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.802617][ T1436] syz-executor.4[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.818391][ T1435] device sit0 left promiscuous mode [ 41.855304][ T1436] syz-executor.4[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.855363][ T1436] syz-executor.4[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.955358][ T1426] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.981415][ T1426] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.991614][ T1426] device bridge_slave_0 entered promiscuous mode [ 42.013038][ T1426] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.020181][ T1426] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.030176][ T1426] device bridge_slave_1 entered promiscuous mode [ 42.155626][ T1426] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.162592][ T1426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.169721][ T1426] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.176475][ T1426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.214143][ T23] audit: type=1400 audit(1719251934.700:131): avc: denied { create } for pid=1468 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 42.238336][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.246733][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.254986][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.286856][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.295600][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.302484][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.310134][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.319320][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.326283][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.340281][ T23] audit: type=1400 audit(1719251934.830:132): avc: denied { create } for pid=1475 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 42.360438][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.372413][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.412092][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.424567][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.445518][ T7] device bridge_slave_1 left promiscuous mode [ 42.452810][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.468043][ T7] device bridge_slave_0 left promiscuous mode [ 42.474787][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.575422][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.590252][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.600181][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.640922][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.650793][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.021849][ T1520] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.028953][ T1520] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.064706][ T1520] device bridge_slave_1 left promiscuous mode [ 43.071053][ T1520] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.078729][ T1520] device bridge_slave_0 left promiscuous mode [ 43.085248][ T1520] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.222132][ T1513] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.229186][ T1513] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.237063][ T1513] device bridge_slave_0 entered promiscuous mode [ 43.254246][ T1513] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.261369][ T1513] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.271575][ T1513] device bridge_slave_1 entered promiscuous mode [ 43.420768][ T1513] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.427806][ T1513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.435034][ T1513] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.441866][ T1513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.551230][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.561445][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.574976][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.596940][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.610368][ T782] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.617345][ T782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.631827][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.645852][ T782] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.652727][ T782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.668314][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.681104][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.689475][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 43.697934][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.754711][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 43.764461][ T936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.791765][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 43.806831][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.840679][ T7] device bridge_slave_1 left promiscuous mode [ 43.847153][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.865598][ T7] device bridge_slave_0 left promiscuous mode [ 43.876647][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.959763][ T1585] device wg2 entered promiscuous mode [ 43.981819][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 43.991071][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.019001][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.028767][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.037459][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.046398][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.477633][ T1610] device syzkaller0 entered promiscuous mode [ 44.594750][ T1617] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.601591][ T1617] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.609688][ T1617] device bridge_slave_0 entered promiscuous mode [ 44.629480][ T1617] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.644103][ T1617] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.652205][ T1617] device bridge_slave_1 entered promiscuous mode [ 44.793577][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.801044][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.823313][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.831681][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.840174][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.847060][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.854952][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.863208][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.871295][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.878159][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.885423][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.907226][ T1649] device syzkaller0 entered promiscuous mode [ 44.923008][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.932510][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.955503][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.967186][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.981843][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.997198][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.016237][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.222354][ T7] device bridge_slave_1 left promiscuous mode [ 45.239373][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.247743][ T7] device bridge_slave_0 left promiscuous mode [ 45.267511][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.327858][ T1671] : renamed from pim6reg1 [ 45.394670][ T1672] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.401623][ T1672] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.409039][ T1672] device bridge_slave_0 entered promiscuous mode [ 45.431752][ T1672] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.444906][ T1672] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.451791][ T23] audit: type=1400 audit(1719251937.940:133): avc: denied { create } for pid=1680 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 45.475432][ T1672] device bridge_slave_1 entered promiscuous mode [ 45.577660][ T1672] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.584583][ T1672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.591650][ T1672] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.598440][ T1672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.634858][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.652557][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.678864][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.690497][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.715098][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.724231][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.732805][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.739658][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.757669][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.767730][ T782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.784779][ T782] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.791644][ T782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.837293][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.855577][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.872720][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.880791][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.922179][ T1711] device syzkaller0 entered promiscuous mode [ 45.962177][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.971392][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.011616][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.029780][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.066081][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.086476][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.108773][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.135890][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.187966][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.201163][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.244591][ T23] audit: type=1400 audit(1719251938.740:134): avc: denied { create } for pid=1722 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 2024/06/24 17:58:58 SYZFATAL: executor 2 failed 11 times: executor 2: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67