last executing test programs: 2m22.130890364s ago: executing program 0 (id=3178): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000001c0)="0daadb59", 0x0}, 0x20) sendmsg$unix(0xffffffffffffffff, 0x0, 0x24040014) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x0, 0x9f, 0xd4, 0x0, 0x0, 0x2010e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x4, @perf_config_ext={0xead6, 0x8c}, 0x806, 0xc8, 0x0, 0x4, 0x400, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40002100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r3) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_int(r3, &(0x7f0000000180)=0x6, 0x12) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xfdef) 2m21.989396666s ago: executing program 0 (id=3179): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000020000000000000014085000000050000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) recvmsg$unix(r3, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000c00)=""/216, 0xd8}, {&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000001d00)=""/50, 0x32}, {&(0x7f0000001d40)=""/55, 0x37}, {&(0x7f0000001d80)=""/40, 0x28}], 0x5, &(0x7f0000001e40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x10002) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f00000004c0)=""/149, 0x95, 0x0, &(0x7f0000000580)=""/104, 0x68}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) close(r7) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfa, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r7, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x18, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0x2, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}, @generic={0x5, 0x1, 0x7, 0x6e, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x0, 0xa, 0x3, 0x8, 0x4, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f0000000700)='syzkaller\x00', 0x5, 0xc5, &(0x7f0000000740)=""/197, 0x41000, 0x40, '\x00', r6, 0x1b, r7, 0x8, &(0x7f0000000a40)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0xe, 0x2, 0x6}, 0x10, r5, 0x0, 0x1, &(0x7f0000000ac0)=[r0, r4, r4, r0, r4, r4, r0, r4, r4, r4], &(0x7f0000000b00)=[{0x0, 0x1, 0xf, 0x6}], 0x10, 0xfffffff7}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x2}, {}, {}, {0x1}, {}]}, @fwd, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x6}]}}, 0x0, 0x96}, 0x28) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val, @exit]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9}, 0xc) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r11, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007110bd00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 2m21.107671265s ago: executing program 0 (id=3183): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x6, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r3}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 2m20.891473244s ago: executing program 0 (id=3186): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b0f, &(0x7f0000000000)={'bridge_slave_0\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000008000000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000060000850000001b000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r3, &(0x7f0000000240)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 2m19.63095282s ago: executing program 0 (id=3198): perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000ff0f00000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), &(0x7f0000001280)=r0}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r2}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35"], 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000000100000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000051984ab1716d3445746c80f70001000000000000000000"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r4, &(0x7f0000000040), 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2000000000000137, &(0x7f0000000040)=ANY=[@ANYRESOCT=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 2m18.998175188s ago: executing program 0 (id=3200): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m4.00679334s ago: executing program 32 (id=3200): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.64352483s ago: executing program 1 (id=4913): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, r0, 0x24}, 0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6b106c6383c1919f}, 0x8b001, 0x0, 0xfffffffd, 0x5, 0x1ff, 0x0, 0x3, 0x0, 0xffffbffe, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'veth0_macvtap\x00', 0x600}) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 3.571281866s ago: executing program 1 (id=4917): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000014c0)}, 0x113008, 0x2000000, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11c03a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async) close(r3) (async) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001500)=ANY=[@ANYRES16=0x0, @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001180)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="84a90f16d1706a3e61f305119f5e971eb41147cb1f86883d6910e68a3a966551800b36c64b77f8440300255a0f8b178eeeba0cde7319a5a46bfe", 0x3a}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_tos_u8={{0x11}}], 0x18}, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000001080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000013c0)) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1e0000000492b46b166a8b5a150000003b6791ab1490b6e315d518cb01e61cba9291374373cc7926b0f39f19115b3b1656f718212fe27affd2d30671018b8df2878e09f18131195f8a6699ae323087c0", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) 3.567916746s ago: executing program 1 (id=4919): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="720ac4ff000000007110b7000000000095000000000000b5449de7e6375b682bc6b54bd9472541056ba076c336dc6a74894e3e96aa21bcb58835c749daf743d727f2512f622bb080ba16ac2564e3f6c11a67d2dbcaccdc6b07a70a515a5f2761d7f4fd2c31605c802fa71d35071f3a43e3fe61dba7b2b3abd06c359b4acc199bf9f313423682bd93d42071d01234f9e86db312f088ebee9e415c71e3b1850386c6a4775d3618646254990d677647f418d1ab2ce2c0347d972666a82efa3a43c1f88a65a3db5be6427c36a03d4399ce0e2e87c1ea273011a4c1c15801d7a2cf914d569b5a2717569123482ca7078de80df9b8776ab2f0e5dfc0b4f1928eafef67d6f4a34c4e6860"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x1f00, 0x0, '\x00', 0x0, @sock_ops}, 0x3e) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x2, 0x0}, 0x8) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="b702000003462000bfa30000000000001702000000feffff7a0af0ff14ffffff61a4f0ff00000000b7060000ff0800007e640200000000005502faff037202000404000001007d60a6040000001000006a0a58fe39000f008500000019000000bc600000000000009500000000000000a81bbfa32d51a7d0679fd43041097666ab982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c4580034fb000000e3a94bd24d2eb3860d808922433e3e0f242a46b3009a54f4077db0d4968a384b0559c7919b893d3b72cd6c832e986440ff0a7e8620cb231ccd00000000000000000000007777e2704653f620b2272c3c7fea60491073847c4b7bbaed91f33fb382d91ae8e18c9b6c9f0322ec5f1c7cc5869ff455896712198c4e2ddf8b86e714229527ca40b24cfd6a1f00e891728807982d90e116bba29bb70900000000000000c63ad2e7402f9cb424ac416e66af9ebbfea905d37cf226312cb81e48439cea06e7fa5e5b3596301460142f83b464d9e57dfdb06dcf9101000100130033d649d2110cf2e1f4682c24a314447c5e0807f0b1766ebdecbd061772daa52a38539295d3fea7a7e669441e1ff04114dfa904fb43897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd3339d32a5796cbe8925efd0c81af69a3e97588878d7ce18b68bc37e061d33357d6a39d33c702576cc2a8891663e3776c7a37c5c962e12102f237bbf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d432e968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b51949b7d4b67300580d854c280206bfb93122fc776aadec51a367658100000000000000b148a90000000000a2a283801ff218538cb12c72b56ffb6b7a062581ec749f5700000000009f1f5ab2e02739ccffff0000360300005cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb933d81967c4d0e6d5244c1ffb0e97628a88a5e37032f1e8f6c893e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2816e301fc8a24dba6fca8b270d44fe65e7bd90a5fc16387bcb5e3df18d7d2a33c72cfda827b8926a6dc6bc19ce398cb8fe48b11b7f93e6fdfb040283c9627bd40909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9598eb067b21111dbaa58b19a52f3f12880128d08eb477ad349ca214bc7f80000000000ffb52da89cff41552996e20a585c7d265bd749eeba040fa7111c84142757709d7c475fac2839beb833327db41c6b647c7ee9ad419a6c68dd5c2ce4fa23c280518fc6e54d1b055cae5492e8c4cdd314a49631a15de2bffc920dd74e670794c3133bdfa17d809bf956f1af51cf3c0711792d3071dfdaec3c66053cdb00028f6fba8da8f53de39a5999e56fc26ae866674627c8a53d3fd245050060ed40782d1d98bf1e1f5dfd4d1fb399624c12732e300818b222ce029ce01055f941721226e3e5f05d2837240f8f6831b6ef2a02ec64aae1eea9cfac06d8b7042e8ebdc69a0d4a14281e631d06afc99d397c5b67b290344e347c953806b298f288884335f624378b3748a4a86bbd0a62127b2c28ce3737661b98bd45965b537ece7bd4e365ffd5567df4d02034c8d488a49c6fb1a0a02eaab2f271d3a14e44211e4ff602d146f72355972860bdd14719d65301964d022819b75696ce47534c9d989d69a445095ff8fbebd2c84635acc333f2aca4623cfe9f9e6c3f9fbb4374c08e1be5eec12c329a87d335fd7a52a4e4e7c2e57fa2f0df9500347b300f84230783cb665f3fa44f5d6fa987aa93c2619ef4977f9e4d38adec323778f3bc987533ffd85fe5417398a3001b394fccbd2faee83b5e2b8a2dd18cf067b6198366283c531b3ef336a84e825c63b9bc7b98b4ad6a471692224adef86f4c9930169dfa133e22929d5a27e10bfbcfe7c02ca451afd74d26f489e0e09cf1b596ae0c959cf26cb0c8114a9311b7f2fe2ad977074ff5f62f6777a20700414ed03ba3d7404eadd43a62ad1173491a5c099290393e1f85aeb3886fbb7f6646212054a850d58a71c6d6027cd3a5ff22e98672349f9bddb23622e2f19b39e51ced84524567ec1fcb233a2fb85371e9b08b6fd4adcd4db148ed26757123a0e604bcf6ffdcc303956e1805f1746361bd3eeb55d3fefe6ac274c2e6c78963430118942d62a465698e600dadd81a53ffd29358746e8db2499e3fca62b0ff660b0aaeedadeb194a9217e9fed2ce04cc24451871d5bcd76173ab7123cc27eef33dbb4d3c3bf1fc2df68a98345c15667388c5000000000000000000000015000000c0459f900702908d4979288d06c7159ef2663dc7ea9302b10bf2da21e3990ddf20a38adc1fd15124310daf2461224cfbfd5e6265d012d60fc9e39209ce3209720f8d7bf39bf71d0d46ed6d51eede797da70cf0b7463cffc8557f9a2e15483dbafb146a3221c20d51f172cf2eefe1e6b28cffc1e40a789d5513626f5c4fbf65a2b5a093634b806b7ee570f70f624ce8c02d4c1ec7a9370f42a807f1d46fe77be0637a8007343b7771788f64b36cab94a99243bc780702f98f34a80f81aeb853f97c3e9586805d1a240d7e870b15defbc6b21fdc98a79759c9b8375313deea0000000009e38e9539d6b9507b6f3f8d29992d080a13aed8879a1f2cb3475be3376427f89d432f7fe7c0cad2ce38427fc773cef47e00000000000000000000000000000000000d09b8ee6321377ffcb6cc386f8704ae9ce6c11b4bb91d0097ef2b77e0cd28af1222e68c2745eca64fa40db07f6e5925224069d14395f7170ab9c2d396f7510f65ce5b0405d8951a70a37117d13c5b2f684c52bff2dc895f5e06e497adee9de0012dd140c592137c90319f8a578007b57aaba3fb93d29a6584313e5b58f8a71cebf77a0891f3633dba69588ec728e785e6e4431fce5a143451c7a51c22b1b605347db811eb9a461f4ef2612181aa8cafc33a4552d4550a717339bdcae1d5c2e78d0a2f550a865811c0162d6dd0b5f834b6295f2a2b0045d8b0033a878daae3db955f2689e3e13842a6219da4e38dc4a14e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x27, '\x00', 0x0, r1, 0x3, 0x0, 0x4}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@fwd={0x1}, @ptr={0xd, 0x0, 0x0, 0x2, 0x4}, @typedef={0x5, 0x0, 0x0, 0x8, 0xfffffffc}]}, {0x0, [0x30, 0x30, 0x30, 0x61, 0x0, 0x30]}}, &(0x7f0000000380)=""/82, 0x44, 0x52, 0x0, 0xc}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x5, 0x0, r2, 0x1ff, '\x00', 0x0, r3, 0x1, 0x5, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000040000873113500000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000a00000002000000000000010200416c806c00010800000001000084090000000400000001000000010000000061615f5f0000305f"], &(0x7f0000000000)=""/138, 0x4a, 0x8a, 0x1}, 0x28) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000000)=0x10000000000fe) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071118400000000008510000002000000850000000500000095000000d3009500a505000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r9, 0xc008744c, &(0x7f0000000180)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)=@generic={&(0x7f00000005c0)='./file0\x00', 0x0, 0x14}, 0x18) 3.287508804s ago: executing program 1 (id=4920): socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2c, 0x43, 0x44, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x10f0, r1}, 0x38) (async, rerun: 32) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x34}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_freezer_state(r2, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) write$cgroup_freezer_state(r2, &(0x7f0000000200)='FROZEN\x00', 0x7) (rerun: 64) 3.078392675s ago: executing program 1 (id=4922): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) ioctl$TUNSETDEBUG(r5, 0x400454c9, &(0x7f0000000180)=0x9) close(r5) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xd) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1, 0x10, 0x0, 0xfffffffffffffcda}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000f34279e645765f5f"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x9, [@enum64={0x1, 0x2, 0x0, 0x13, 0x0, 0xb, [{0xc, 0x8, 0x80000001}, {0xf, 0x5, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x6}}, @const={0xa, 0x0, 0x0, 0xa, 0x2}, @enum64={0xb, 0x1, 0x0, 0x13, 0x0, 0x9, [{0xe, 0x5, 0x7}]}]}, {0x0, [0x30, 0x30, 0x41, 0x0, 0x2e, 0x5f, 0x0]}}, &(0x7f00000007c0)=""/236, 0x81, 0xec, 0x1, 0xe2f}, 0x28) r7 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800000008, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4ab8, 0x5}, 0x0, 0x0, 0x80000004, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r7, 0xa) 3.003319182s ago: executing program 4 (id=4923): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="7a0a00ff0000000071104e0000000000950d00000000000000800ce4fec932d6326d33527587032d2d4ea9da80a0828332f52f4b295f9217389b80b3eba35e48036857ab32eed3ee4a9fbdd6ebcf7aac9d4324c946da0d69237cee916f2937287b2ae776dac4ebc213ccd1cb12f2fe2679abc44f3a88452392b163654664aab9b36c67796b340bb8dcf98e9acd39ae64369faee1d461e9a11cdba9148b3914a401e0c1bcdb22bab237bdfa0f08bb661745e1101f276cd8bdef3ea8d7744eb8a27f9a22026972266e63084d415a832cc0e9f4174c89d9b2e1fd33025cb5b26350c2da96a29f4e"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x26, 0x80000, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0xa, [@struct={0x8, 0x1, 0x0, 0x4, 0x1, 0x2, [{0x1, 0x2, 0x5}]}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x5, 0x5}, {0xc, 0x4}, {0xa, 0x1}, {0x2, 0x1}, {0x0, 0x3}, {0x9, 0x4}, {0xe, 0x3}, {0xf, 0x2}, {0xe}, {0xc}]}]}, {0x0, [0x61, 0x5f, 0x0, 0x61, 0x30, 0x30, 0x2e, 0x6f]}}, &(0x7f0000000280)=""/69, 0x96, 0x45, 0x0, 0x5}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)=r0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x6, r6, 0x4}, 0x38) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2077, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd94}, [@tail_call]}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x31, &(0x7f00000000c0)=""/49, 0x40f00, 0x20, '\x00', r1, 0x1b, r2, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xb, 0x10000, 0x8}, 0x10, r3, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r6, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r7]}, 0x94) 3.002409712s ago: executing program 4 (id=4924): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x4, 0x8c4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x1, @perf_config_ext={0x7, 0x2}, 0x0, 0xc8, 0x10005, 0x9, 0x1, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f0000000000)={'team_slave_1\x00', @random="2b0400839f71"}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.981344738s ago: executing program 5 (id=4925): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0], 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x31, 0x0, &(0x7f0000000200)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x10, 0x3, 0x6, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) 2.767425479s ago: executing program 5 (id=4928): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000100)="77dd84ee1cd2ed72c3e42e626f614d2cb5c8387cb1aa", 0x16}], 0x1}, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x10, 0x6, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000580), 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 2.766177559s ago: executing program 5 (id=4929): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x2d, &(0x7f0000000040)=r1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_devices(r4, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x13bb711e) 2.765641228s ago: executing program 1 (id=4930): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001280)=@base={0x4, 0x4, 0x4, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_clone(0x1000, &(0x7f0000000180)="8b78edb8e47ce336a23fb374149020683aa60a084e6317866724cb8c10c4eed813ba6a6286fdb1943f18bcee169b86c7f2d90017669987a0b6ca1a0da94f28bc2e82f47aa399f5b23f003b6d0aa4cb3278f0fc", 0x53, &(0x7f0000000340), &(0x7f0000000540), &(0x7f0000000740)="3e67643931307aa1539e4c6cab06401b7b80814f605bc62263ef6e9be5c8612c7e661fb60e39f7e0620280db3864aaba7e4fbfc386f897074e9490dfc3c932c5e0a0a9533695fa36872df7809444e0ecf65e4801705a102de1326f8c98f3e5ed046503f154e5bdc180733a1e5a21d147fe63cc1c6b2c6988442e1c755014030fb99ca4f4d0741cf17343eada2b53d8e91b15545c256ce8d60b04dec2a0a2bd3d08") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r4, r3, 0x0, 0x5, &(0x7f0000000580)='\\\xd2--\x00'}, 0x30) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x800, r6}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)=r1}, 0x20) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000711058000000000005000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd96, &(0x7f0000000080)=""/201, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd56, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 2.363484204s ago: executing program 5 (id=4937): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f0000000000)="a29b6b75db73a1a9ef0d6cd7182629cbb536f7ce4eec2447a0952a1cbb41ced4bd1e58d3fa7689ac9165061625b4cae8f0901a0031a6", &(0x7f00000000c0)=""/173, &(0x7f0000000180)="e26c421082cc3588588e0cf0c98fefa6194215f76f6fb39f98e684ab1d436546ee66ba276e88f0874bf11a4eb67fe9d3e25627235951009f5373b395c748f35c8251135b129ab69e96ab1b6d82c0da65ae088f7d7aa1a9acf8d9e0995ac4a8a3898efb4b758841b1f2378a84b8a7b7e6daadb388439ef1d3e44da9eab76abae5e2e4da9543922502ba0c1ac5511f4981690e4b3bbba4a2f5bd361051bebcfdc939c2372decacc31c2cc81d3b845be4eec2fc41ee3ead118cbef474538d52ce11f5e7264499b7a7c8541e21a0729bcee47c0f496f3b9421720a3908d34713ef", &(0x7f0000000340)="b4f8821fddaa1f16f264924e39f0729663226c260686d8c6756ad00d549c471cef3cf276319634015af38db8a9354dd2ade1445b953a7bfea06ab863c613bdb5659a1ecd97b7cbed5042b4a13a6d57b47b8878b7ce88e12d5b9ba35adb79738a2ae40e54dbd2883b2a8d8bbf2402b376db4ad060cfc139a3cb2a0db65da020bc383600a9d059e9da8fc8e0908a8e351ad1dc48a079", 0x2, r0, 0x4}, 0x38) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000840), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000008c0)={'veth0_to_batadv', 0x32, 0x37}, 0x12) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047440, &(0x7f0000001200)) 2.168428229s ago: executing program 4 (id=4939): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) 2.055018888s ago: executing program 2 (id=4941): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="ab10000000000000000011000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xf, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x8800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x12030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b7000000000000009500001000000000a80501363034fdb117168bd07ba00af739d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945f105d802f5132143c0a9fc7a84452569957c1002ed7d4d8e17f791f4798c8eb483e9973320d046c3126c6afcfd84de03352c69b3edff5be26f8ffa5f8f2879021c2ea53ea79acd7fb38dd1abb75aa393cea26d465637d11f705000000473e7b7c4ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057844f226ef4e912f01a201e694e3806e8c70e8b69524cd19f7525d8d66bb766f7f3f918c86a70252236800001897133af94a5a4cfc794d8b9d7c33632152c48eaf302f0b2e0c252b00000000000000006f1bbefbe08de65e3762e194ba4cae8b13535d7d11ee917bca4885bbf597a14ab2458efce78510d86272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36bed435000025ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b9d86329bd5b4697336112b0b8754ce3574046bf6114d1a88597850b77378fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f3faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4f189edbf9fb7c42b1f435ccd4d96822e6b70100912c92e3943e9c4f45d8bcd528fa8a3ea847f10e9b2506f3bb506f1d7fbde8010000000000a073d0de5538ab42e170b3baae34c35987b0dda497ac3f5e97e6e6aeea15c6d5ed24310100000003bb6030f84b63aaf8690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc65315896f88a8fb1dd679fb4c515f8b7a5b7aca6a251a89d47b728502f7e621cc0e3ba04000000c149ee6601728c750d304197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133dad58037fda65885a15a429edfe3027a5ebf95254744f10fd607bc3300b94932b8d944e0b083bbd86b19cb074577a25ff581d92af08a06f857310a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6a1def886c95676dce6a8194479700a02b92bdc8d05eae1f24fdd7b80d1bb404c22f681594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4c2d7acf1dfe79d6771903b76e21190c22d641030e1ddacf006c3116e1803af20a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f0001000077339b4200000000108a3c87b19d5b9a00c75d84a92d6dcf00ba96edf35ede0e2b57c26e94801b498924166bde57d5f24258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548971d5d16296dd08e020000007a27310d5d01f8a8a0f5212d7f628f554afea715ccbc66cbb1016490f5d579308cb3188cf2fcaf67e0c16443d526ba4b968f07ae362c2133c168313e84beb871203880dd453c45d0a137d7f5a8b039dbfa62fb2b4214f8e69f967bf1fbd89e77fcca110000000800000000000000f8877994ebdc35f7efd41e3babd9b3782edd6776d5b6cb4ecd72c9de9b5503747d71440378cf2c2c7ea2dc5febb654a867f853713cf4c0bb322fbbe446d18dee4c821275ef18259cafc346c8b3b9fb0f3adcf6ea310a6b9a3f59e29a5909ea047fb61affb4bc8bbea1fb761b8933795b1a91358a7791aa843d07020e8bb6fc18458c49ac6313e7165b7d9f65e94a62b69f1011b94340cdb7303f01e5cdb5682ddf73d65c3de1d88dd7496d6345d5b9de0223988056a53e19a8b96b9640bc6c09d3c2ff894d626b57c776ed53f94d5e22ff148061b37f72bd92924cb1d0a725e19b264346b7cae0251a850de78316503f3c3d395c7e3f04fc8d52583327cd2341ce4b2d092815376299686f41353b2823814563011a2223b9dd00000000000000000000003a131374a3371cb3e2a9bb4d798b91cefa444501f40b7c9589e8c0bb6c82123d2b45ce905d0903b32ecf30e828c71a07a83f3275f3d661d1af0ffbd5d7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b1109000000000095"], 0x0}, 0x90) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x20) (async) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) (async) gettid() 1.802093922s ago: executing program 2 (id=4942): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = syz_clone(0x4080, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0)=r3, 0x12) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c000000090000000d0000000000000e03000000000000000600000000000012090000000f0000000000000700000000000000000000000d000000000200000000000009050000000f0000000000000c0100000000300000305f5100006564594f407a5f8d546f6782321588148ad2abf1da49a8488d8164ca6246b4f3443b2f5b46a99133b6380973bbd44e81e59582201893a701bdd81c75770076e15b91237c61d31eb84f1262b43a707fbed9a4e699b33e55d21f9116efb8c29993d4aec2538ce44b0eff008a7970feafe12126c32e32ee027ffe000000000000000000009255f39fb0d9170824ab276663d62129173d2044694784a0f7131f76bc4f12723fc79e6858ce5176270047b3b0b26d49d147919895ece7445684941618d8798540b5200bcb013299baa7e15210fda8e5c56f88ab061a82518a9970173ada2a93c705a523bf13d800712389f3f5fc623ca97a3360a38fb39d6fb53cb7205f4551e66d0b65a7083f66426676ff958a703db53068f1e0a93035836e5d5df23cb2"], &(0x7f0000000440)=""/201, 0x6d, 0xc9, 0x1, 0x8001, 0x10000}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, r6}, 0x50) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r6, 0xe0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0x88, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000640), &(0x7f00000009c0), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) sendmsg$inet(r7, &(0x7f0000000a80)={&(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)="e03efc0fee6bcf14594e9443d43f1e927960e4b4a6d10fc5acb5c57d81a62571ce599b0dea8907eba69d60b63eaf3ad34ce9c1003721d339a8274c99cda58013ace2bfd723e270950e070d4102d1e8652b981881d2ba8c7a10e7b75b9f43f39f83260edb9702218ed82ead2b174064b7b7ec71d1bbf54c86bcc42ccd7481e3c3", 0x80}], 0x1, &(0x7f00000014c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @rand_addr=0x64010101, @remote}}}, @ip_retopts={{0x60, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0xc, 0x43, 0x0, 0x7, [0x5, 0xfffffff9]}, @rr={0x7, 0x13, 0x5f, [@local, @local, @multicast1, @multicast2]}, @ssrr={0x89, 0x2b, 0x4a, [@dev={0xac, 0x14, 0x14, 0x3c}, @empty, @broadcast, @remote, @broadcast, @private=0xa010102, @broadcast, @remote, @multicast2, @broadcast]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xf5800}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffbff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}, @ip_retopts={{0x30, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x2e, 0x3, 0x8, [{@remote, 0x81}]}, @generic={0x44, 0x12, "efde4bd74a477f09e7bc419e41b6b63e"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfff}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0xdc, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x94, 0x0, 0x4, [0xfffffff9, 0x10]}, @cipso={0x86, 0x71, 0x2, [{0x2, 0xc, "0c94d81dc77cb86ebd55"}, {0x5, 0x5, "6ed798"}, {0x1, 0xa, "97516f5771f05dbc"}, {0x0, 0xf, "46a1a198bace37b85ac022955b"}, {0x1, 0x12, "6f0f4d0bd3f5e8895cb1483273d066a0"}, {0xc45deb433ffa8d59, 0xb, "c4029f38e3944179ce"}, {0x7, 0x3, '&'}, {0x7, 0xc, "94bf685074f857a6d3eb"}, {0x2, 0xd, "6ea343973ac6bcda4a4f5d"}, {0x2, 0x8, "45e669e90a91"}]}, @end, @generic={0x88, 0x6, "0f84280f"}, @timestamp={0x44, 0x4, 0xa7, 0x0, 0x3}, @cipso={0x86, 0x27, 0x0, [{0x1, 0xc, "3424afb8a36828d9a97e"}, {0x2, 0xa, "0c7cadae37b810f9"}, {0x2, 0xb, "9d84b41f7ec986f12d"}]}, @timestamp_prespec={0x44, 0x1c, 0x4e, 0x3, 0x6, [{@multicast2, 0x4}, {@local, 0x1}, {@broadcast, 0x7}]}]}}}], 0x220}, 0xd1df9c823623c146) (async) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x2, 0x0}, 0x8) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00'}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="851000000c000000186000000000000000000000000000008510000000000000184000000000000000000000000000000100000000000000186000000000000000000000000000001860000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000001800"/40], &(0x7f0000000080)='GPL\x00', 0x3, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1b, 0x0, r12}, 0x80) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000bc0)={r10, 0x20, &(0x7f0000000b80)={&(0x7f0000000ac0)=""/164, 0xa4, 0x0, &(0x7f0000001700)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@generic={0x0, 0x0, 0xc}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x100}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x6}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1000}]}, &(0x7f0000000040)='GPL\x00', 0x81, 0xb5, &(0x7f0000000180)=""/181, 0x41000, 0x19, '\x00', r9, @fallback=0x12, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0x1, 0x5d66, 0x4e3}, 0x10, r11, r4, 0x0, &(0x7f0000000380)=[r0], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) (async) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) (async) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000000f000007"], 0x48) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c00), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r15, 0x400454d0, 0x13) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r14, &(0x7f00000002c0), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000008a00000095000000000000003cb06a5528dbf30ed3e93416"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000000007b9af8ff0000000075090000030000007bcbf0ff00009894b73900000000000007080000fffdffffbfa400000000000007040000f0ffffff740200000800000018220000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000006e9800000000000056080000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.693442862s ago: executing program 5 (id=4943): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6e, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x73, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff, '\x00', r0, r1, 0x5, 0x4}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000340)={&(0x7f0000000000)="4686736530d45bba5f2aa3c8fce84789606bee7c3cfd371e5fb3e0dd39cbafb3e5b22bf9ef73efac9d8e2e524807a5cd6d", &(0x7f0000000040)=""/103, &(0x7f00000000c0)="e747582db0612261751da25aed56882432d5c7005723e093ee0804887ed02d127900652b10d333cb4fd0318a94637d322ffe07d561d78a93a67b4481df3f9ea24e00b8c04118c0586371d508f7753e434f25b92a11484e8c3bf160ca9d9491f26fd4560a65135d7131a86bc317e97368481ef99dd877cad482c74d46533dd120018b8334c6fd19f14635e5bf9b26abac7df15f03ed206e24b1a12ad50fa12ec5", &(0x7f0000000180)="c01a8061beda80a3f30efbdb3a7f6a297ee8f4d452ea97287e93f8792ea2c472e99367c996bad93a981a207e52262c68e83df635857275b268c9d73d3eb96c6d7efb5df3591e8c870c8f500ed9ab72048a21781518c728dd79a15a972712cc1c7b6169dac6aa8caa33814740aef64cfee50a4ac12661dbfc67d5a921999174743c04dc973491531f882a323ccc74941430216b7f8fe7edd97920c981e91c104a5493c98c4fb877d22fb3e76a396398c9de412192a22f6cfdb698480734fa08a8d26c4573bbfd31a214059475146a17dee4968ede53423a", 0x2, 0xffffffffffffffff, 0x4}, 0x38) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r2, r4]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x58}, 0x0) perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x7, 0xd, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x80020, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000700), 0x1}, 0x0, 0x7fff, 0xffffff17, 0x9, 0x8001, 0xffff, 0x9, 0x0, 0x8, 0x0, 0x7ff}, r3, 0x6, r1, 0x0) 1.671000278s ago: executing program 5 (id=4944): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r1 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000005c0)=""/258, 0x26, 0x102, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val, @exit]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x3}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x420}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000040000000c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000780)="8cf15ca433029a36b2f23ea4ae1c9f449069aeb08a463c89ae4dec680656e7b4bd91689ecf4ee380b1e26842ecf3371cb6a6448f207c5a87b7ca4300e3a30ba1d62c58a425146225a6f7e120cf0e8743037740f69d51848cdf5fbd6face71976b4402431037883384d989da3e647e567fcacc90eb165cdce4e365c112ab34cd8c9abbb4d0a9b6dde7322", &(0x7f00000000c0)=""/66}, 0x20) close(0x3) 1.654954155s ago: executing program 2 (id=4945): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) r1 = bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000540)={&(0x7f0000000480)=""/112, 0x70, 0x0, &(0x7f0000000500)=""/58, 0x3a}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r1, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000180)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}], &(0x7f0000000000)='syzkaller\x00', 0x3, 0xfa, &(0x7f0000000200)=""/250, 0x41000, 0x11, '\x00', r2, 0x1b, r3, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xb, 0x7, 0x9}, 0x10, r4, 0x0, 0x2, &(0x7f0000000600)=[0x1, r5, r1, r0, r6, r1, r1, r1, r1], &(0x7f0000000640)=[{0x4, 0x3, 0x6, 0x1}, {0x4, 0x4, 0x2, 0x5}], 0x10, 0x80000000}, 0x94) 1.481105043s ago: executing program 2 (id=4947): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) (async) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x14100}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0xffffffff, 0xff, 0x5, 0x820, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0x6}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x1fab4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22101, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg(r3, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) (async) close(r2) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x25) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xa, 0x4, 0xfff, 0x7}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x0, 0x4, 0x8000, 0x241}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000005000000000400000ade000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1e, 0x2, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) syz_clone(0x104300, 0x0, 0x0, 0x0, 0x0, 0x0) 1.267210433s ago: executing program 4 (id=4949): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000a0000007b8af8ff00000000bfa26e3f85ff8b2c7eef44f44000000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfdae, &(0x7f000000cf3d)=""/195, 0x0, 0x9, '\x00', 0x0, @sock_ops}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYBLOB="0000fea4ffffe8ffffeffffffffd5f1f"], 0x48) (async) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0780000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d40)={0xffffffffffffffff, 0xe0, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001a80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000001ac0)=[0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000001b40)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x206, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2f}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r5, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8943, &(0x7f0000000080)) (async) close(0x3) 1.263728123s ago: executing program 2 (id=4951): r0 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x6105, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfeffffffffffffff, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="2d0000000000000000000000000000007919b000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="2d0000000000000000000000000000007919b000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x80) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x105c, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000003000000020000000000000700000000000000000500000d0000000005000000010000000700000005000000160000000000000010000000000000000000000002000000070000000000000b000000000030007dca0421337794014541d8631c3ba48fe5c26aa32d73e7ef27"], &(0x7f0000000480)=""/110, 0x67, 0x6e, 0x1, 0x1, 0x10000}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000de69a9ad670700000000000000000000000000002ff4f745dc48ba0735355fa130dae16878d2c5fabf721bbd37be171aa3ea1d85999976f37c0ae3af8b15a3ca31c180ca9a6f1a310df61b6b382ba82c616a976aae688a43eded21"], 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000de69a9ad670700000000000000000000000000002ff4f745dc48ba0735355fa130dae16878d2c5fabf721bbd37be171aa3ea1d85999976f37c0ae3af8b15a3ca31c180ca9a6f1a310df61b6b382ba82c616a976aae688a43eded21"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xc5bf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x20, 0x80, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x100, 0x0, 0x1, 0x0, 0x4000000000000, 0x8, 0x0, 0x0, 0xa, 0x0, 0x20000000000}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) (async) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x38, 0x0, &(0x7f0000000500)="2077e7dedda60fb505e6394d02d95ae1583b0f97782b80bb0e15fd51433a497e67474911a70c77e53c2086485135099591ce5d5bd6fc4e68", &(0x7f0000000000), 0x0, 0x0, 0xfffffffd}, 0x50) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 1.260249032s ago: executing program 4 (id=4952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x17, &(0x7f0000000700)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @jmp={0x5, 0x0, 0x6, 0x2, 0x0, 0x18, 0x10}, @exit, @map_fd={0x18, 0x5, 0x1, 0x0, r2}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000001c0)=r1, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000d40)={r1, &(0x7f0000000b80)="53448a81b4b34eb06868a4bed78442bc4919f0065f7a80e33a249d71d551d7a92d151c4c721fc5b8d4cedafad530c98e151555f774c32e7b7ae27420dc635a03bb84cbd513ea06b66bd3bc204ef746e0320958c8f13aab262db32c4e0df9a2c09fc9da6bee63dc81a7aa168c951be389e1b3f32b32041eecf05704809a8b24d92a8cd89d83935f29e5629cc8b233f687f1d919366a7d512e7732e0439b1f8d038a8226989ce05cd3244bca4acddd5fa569c420910b7b93bb1a1e560914500e498a8a90090544bd123ef6f4f5600f95", &(0x7f0000000c80)=""/142}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r6, &(0x7f0000000580)={&(0x7f0000000340)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="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"], 0x168}, 0x4000012) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x20000000, '\x00', 0x0, r1, 0x1, 0x0, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r1, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)=r5}, 0x20) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x49c, 0x0, r2, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@generic={0xff, 0x5, 0xa, 0x7, 0x400}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='GPL\x00', 0x8, 0x63, &(0x7f00000007c0)=""/99, 0x41000, 0x3, '\x00', r7, 0x1c, r1, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x9, 0x8, 0x5}, 0x10, 0xf804, r4, 0x2, &(0x7f0000000a40)=[r3, r8, r9, r2, r2, r3, r1, r10, r1], &(0x7f0000000a80)=[{0x1, 0x2, 0xb, 0xa}, {0x0, 0x3, 0xa, 0x7}]}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x76}}, &(0x7f0000000480)='GPL\x00'}, 0x80) sendmsg$tipc(r12, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0xfff5) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r11, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 883.217873ms ago: executing program 2 (id=4955): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000400000000500000041000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000ff20c4176b89ad31fb580b8ab68150b954853dc47a407de8cece74a34b8d72438c99d13b3efadd2f6a2be6d237f56646000000000154fc85c29af9214ac72c9e8af69aa6d3fcca954157c0e9e37e3baa9ff3c804015c1f37", @ANYBLOB="20479adc0db520e414cf4ccbbe81a7b351ded3a096f8ccef3c536476a2701e71b5652bbd27b8f0d85059796ce909c007aada3d2cd3f3ff78d1149ae55375a7354b6030ea80fa1edc5e8fa5f7e674d1fdf0470a36ea1ef5523d29cc91b627c05cd67d44baef03e2f0e66a7885dc39c44a0cde0438ee0d81d7283bbf34bcd1921c539bfd677f137447cdf99f1cbcdf63881b2cb3c2135fe819a682b973912c34cc3899ed9efd7470c471aa56", @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r5) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0500000005000000fd09000085"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r8}, 0x38) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x10, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f00000000c0)=r12, 0x4) sendmsg$unix(r11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 681.306776ms ago: executing program 4 (id=4956): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x1c, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a652}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x49002300, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x49002300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xa, 0x42, 0x40, 0xc0, 0x1, 0x1}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xa, 0x42, 0x40, 0xc0, 0x1, 0x1}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="12000000040000000800000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xff12}, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xff12}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000140)="e0b95bec00c600000000001b0000", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r3) (async) close(r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r2}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r2, &(0x7f0000000080), &(0x7f0000000080)=""/40}, 0x20) socketpair(0x13, 0x3, 0x8, &(0x7f0000000000)) 598.73848ms ago: executing program 3 (id=4957): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="000000001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f00000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x6, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x7ff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000001c0000000093281ddfd02c424a85643dfdff3ea2daf6542194240c9b0783f5113af1196250f98fabe46e9170415d033c3f8fb0429e15c9201598a3c8121b6a7cdb034ae08dd68799e01f22cf5c4762a9294cd8d281408820a7cf2d97915137552bec249d341fab10150dfb01be87cfb8e3876c48d7ac1d41bcdf4b36d0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 359.576457ms ago: executing program 3 (id=4958): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0xc6, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0x2c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='memory.oom.group\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x17, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000004000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020702500000000002020207b1af8ff00000000bda100000000000097010000f8ffffffb702000008000000b70300000000000015000000060000006100000000000000bf91000000000000b5020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 354.921376ms ago: executing program 3 (id=4959): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="cd0800000000000073112e00000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x24) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x37}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 323.96067ms ago: executing program 3 (id=4960): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, 0x0}, 0x20) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000110000000800000000000000000000003000000000100000002"], 0x0, 0x4e}, 0x20) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe80000000008847875a65059ff57b00000000000000000000000000ac1414aa00006558"], 0xcfa4) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x66) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000600)=ANY=[@ANYBLOB="2b63707520f1796a0a96b5aaa356499c67417858ac6abf8e4908bb3d87ba9bd4d216e181830d1af715eefa10b586114b5272a603f7f95caa2a74f1376e25f8468513e1a3ed32ee8ec5b69aa1a1c7614922bba3ac897c2857e2578d82e94668a0e9f827ccff9cf0abf53206930079645c2371009970608c87cc7a67de8e8fbcd205df2a0fea90ea091fae6b"], 0x5) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r2, 0x0, 0x63, 0x0, &(0x7f00000008c0)="791b5cbd9543057476c254d749681eef9f656db2a9cf9f90d654c5991694441c8886b8396706aeef006d2703aaebde6c6f7873ac70fd9eb6478a0dcab75f12228adbf869803175a3bf4972d0b171579ba9a9f2775ac8db72a646b987f875d32133079b", 0x0, 0x8001, 0x0, 0xd5, 0x0, &(0x7f00000009c0)="261339ae52644e3f43a5209fd4fe0eded2f9b85e4b0b6371d62ce3390057c349efa1c5d8df7603d42c97ffd784310e79d58e6683b849c640bacbbcbe9fe537d3e3e8e9cf761ed6b96b07cb4142ba450666ecee67b92be9b78763d11d78d6fdc9923dba54d05f049f144b9dff1e5b822fc45cd45d0a9a6fbaa17b8cf99bab77f1b163cac26156b229c4bfc4330fc53a8e42386f89911060b8da8be5226a00a226ff29bc678a82ee2fb1c127090e31b215ee7eb5b6025cfdb4f677dd5fa2060691a6bb9bb516584436142e91ae10059c9a7107fdb42a", 0x0, 0x2, 0x0, 0x4}, 0x50) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) (async) openat$cgroup_ro(r7, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) 95.497658ms ago: executing program 3 (id=4961): perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880bd320d98a61a90401e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC=0x0, @ANYBLOB="43da2e5f"], 0x48) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x6) 0s ago: executing program 3 (id=4962): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = getpid() r2 = syz_clone(0x8100, &(0x7f00000006c0)="3bed5f53a78366f71704636fad057f351026f98ea20eb1f06cc3280512e5ddb537067723cea8e1818181d871ea1021b208724a9988f63db26d62c30d873a1dd0d4998d28e219252d0934446f0986daafdb454f1f2ccbd3cefd29c64a6b18cbaf5988e249a6fbd654fed0a75c8da3ffea0e8a960171553be31ebc2c1c79e22d0a55313a0835fa91fbd30e178a4956c40d0462ef81d46ede916b02f6f5e7b3821850be0233962c6e536938a690d326bbfdcd9f7c5c6a7b4e86d68e6024de4b3a7eefa706367d34f97de48b8bdeb4365f3d790c49cbcae5da4fc49d3441cfa7ed137cf34d042f338d54eea6", 0xea, &(0x7f0000000600), &(0x7f00000007c0), &(0x7f0000000800)="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") r3 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, r4, 0x0, 0x0, 0x0}, 0x30) sendmsg$unix(r0, &(0x7f0000001880)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="6373c5d01f753a515259931080e4174ffc75844a491e64eca58590199a242c83f104681d936723f2781dc3e649981b36f62dc7c93f6ae29da6654dacfe4d1a550e4080c450694390ebe99517e661196e14cf1bd647ab0ad05b92588dbe27a8040dee01f7fecbe749385c7cb919ecb54cb32cddbb8acde54c84b5db7e7fc726ec56440d2abc3e399d1f2afc39a33b13386f0a70b430866de39525f51d62d6fbc333e8e2c0016b01", 0xa7}, {&(0x7f0000000240)="ac73a6b3cd46a70bca6e7ecf51dd33aa15c7dadd16fbcd629ed2c1ff7a1d72ac0237d700ba5a0d5348652296625294871cd67a01b2619ea050e6518823b14be933b26ab4642b5fd77d2c60c46b16c0be5edcfdf33b4cf062608803f253da8396e34ef9b48ad6d5f0d0bee5a0f481d302499fa8244f3fd27a503591fb8da1a41c3ca8fc47495f3a7f93aae3dd32205f450207beb01da706b3e1dcc99e1a30eeab9a7b25bc5299d96be105a76aed3d41a234f9249a63eb3316270cb6", 0xbb}, {&(0x7f0000000300)="99921b2198e8acc4f18427b26d319d0d1416923e807a6fd3116589223c5ee9ed9581ece3b2c99de2dd03f2adff6383086a512149ac4e41cd00786e8e0b4b4958fefd27d5758bee6b240cbba72c54b9848f5ff49ab35454acc3159e834aeecef7cef69ab41c63b0fd8946e9c497a76af9093a394ff29515b0c68bef4805cec63b18b7b935706cbe2c1d6f367e79b50eda4fda774cc0d96212de620c45e55e2aec6f24f86c7d76bec2b320dfec50e7587c9d586758736fd3bf668af656e4ae057eb0edb06c90d35a", 0xc7}, {&(0x7f0000000400)="cc8ebdfba63ffce92664d67c13ab9e131f5ce1f80af03bdc0982fa7dd4493e06c9eb90c69d0e0d09605e901263b60d9e3c", 0x31}, {&(0x7f0000000440)="bb4097d4b3b4dd3cea5f60b761712a1b49504d2aacb645c46c9dc85aa2bb199023162bd7fcdcd79cb16601d92fc88c1ffb9052e32eea31cc1eab225dc7431742f46ef1006908abc5bd559c1c4eb53a161ca5ea568be6fc1d90fc5a2603b973139ef2e00b190d8669a007d8a0d02951303b52aca975197b435006429670a502d14489230673dd8a06cd85bb373f1fce72b15c610dd41b0c6b2ff214003038e97b5aae96fb4e1d008e20091da8d18a14363c5e9785ecd24994718c2552f3a1ecca04ca28a08f3f582ecae013aef018ed46009905ccc32a6e4235f90128171e17e0ad", 0xe1}, {&(0x7f0000000540)="9b91193ba773821b3f7f214d0ecbaf99b8067536cac4ab9f8ecddee3a020a4f1575a121ae939a6de5c21a26f638e43", 0x2f}], 0x7, &(0x7f0000001800)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xee00}}}], 0x60, 0x40}, 0x41) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.119' (ED25519) to the list of known hosts. [ 17.970672][ T24] audit: type=1400 audit(1773236007.039:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 17.971674][ T267] cgroup: Unknown subsys name 'net' [ 17.974342][ T24] audit: type=1400 audit(1773236007.039:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.978017][ T24] audit: type=1400 audit(1773236007.039:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.978147][ T267] cgroup: Unknown subsys name 'devices' [ 18.191521][ T267] cgroup: Unknown subsys name 'hugetlb' [ 18.197109][ T267] cgroup: Unknown subsys name 'rlimit' [ 18.393211][ T24] audit: type=1400 audit(1773236007.459:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.416361][ T24] audit: type=1400 audit(1773236007.459:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.438896][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.441263][ T24] audit: type=1400 audit(1773236007.459:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.472674][ T24] audit: type=1400 audit(1773236007.509:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.498145][ T24] audit: type=1400 audit(1773236007.509:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.498188][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.523684][ T24] audit: type=1400 audit(1773236007.559:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.557805][ T24] audit: type=1400 audit(1773236007.559:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.941726][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.948768][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.956272][ T275] device bridge_slave_0 entered promiscuous mode [ 18.964399][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.971442][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.978769][ T275] device bridge_slave_1 entered promiscuous mode [ 19.039317][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.046416][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.053858][ T276] device bridge_slave_0 entered promiscuous mode [ 19.060675][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.067688][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.075069][ T276] device bridge_slave_1 entered promiscuous mode [ 19.127357][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.134468][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.141948][ T279] device bridge_slave_0 entered promiscuous mode [ 19.148685][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.155823][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.163356][ T279] device bridge_slave_1 entered promiscuous mode [ 19.202259][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.209287][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.216635][ T277] device bridge_slave_0 entered promiscuous mode [ 19.223403][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.230448][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.237864][ T277] device bridge_slave_1 entered promiscuous mode [ 19.272145][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.279183][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.286760][ T278] device bridge_slave_0 entered promiscuous mode [ 19.293621][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.300648][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.307977][ T278] device bridge_slave_1 entered promiscuous mode [ 19.354697][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.361742][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.368990][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.376013][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.384488][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.391597][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.398866][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.405903][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.468484][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.475532][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.483076][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.490089][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.510255][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.517290][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.524543][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.531566][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.540015][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.547232][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.554601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.562187][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.569262][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.576935][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.584154][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.591875][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.599130][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.606572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.613973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.632379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.640523][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.647526][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.655328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.663833][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.670852][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.678121][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.686241][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.693244][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.700607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.708652][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.715664][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.723000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.730947][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.744757][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.768545][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.782732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.791277][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.798273][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.805716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.814043][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.821074][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.829419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.845498][ T276] device veth0_vlan entered promiscuous mode [ 19.853043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.860716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.868941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.877440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.884871][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.892568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.901034][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.908039][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.915400][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.923529][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.930541][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.952684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.961493][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 19.969510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.977839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.987022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.995099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.002595][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.010472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.018635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.026772][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.033784][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.041245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.049597][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.057777][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.064791][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.072329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.089461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.097500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.105534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.114738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.123106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.130948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.138794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.146280][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.157590][ T276] device veth1_macvtap entered promiscuous mode [ 20.166558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.174675][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.182647][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.190980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.199666][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.207851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.215935][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.224026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.232401][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.241133][ T279] device veth0_vlan entered promiscuous mode [ 20.250418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.258284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.272850][ T278] device veth0_vlan entered promiscuous mode [ 20.281456][ T275] device veth0_vlan entered promiscuous mode [ 20.289405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.297348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.304914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.313218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.321410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.329110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.337155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.345443][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.353815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.362071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.370424][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.377855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.393897][ T275] device veth1_macvtap entered promiscuous mode [ 20.402331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.411571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.420142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.428161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.436437][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.445488][ T277] device veth0_vlan entered promiscuous mode [ 20.457809][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.465926][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.466057][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 20.474562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.489941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.498248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.505780][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.505792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.532036][ T279] device veth1_macvtap entered promiscuous mode [ 20.546653][ T278] device veth1_macvtap entered promiscuous mode [ 20.557323][ T277] device veth1_macvtap entered promiscuous mode [ 20.564326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.573768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.582910][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.591415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.600099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.607779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.616137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.624708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.633908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.642212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.735854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.753148][ T307] cgroup: syz.0.1 (307) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 20.773498][ T307] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 20.791981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.812991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.821445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.829962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.838242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.847695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.856340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.865199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.873671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.886984][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.895618][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.040907][ T316] €Â0: renamed from pim6reg1 [ 21.049811][ C0] hrtimer: interrupt took 32031 ns [ 23.768725][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 23.768734][ T24] audit: type=1400 audit(1773236012.829:113): avc: denied { create } for pid=394 comm="syz.3.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 24.541584][ T24] audit: type=1400 audit(1773236013.599:114): avc: denied { create } for pid=435 comm="syz.2.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 25.576070][ T24] audit: type=1400 audit(1773236014.639:115): avc: denied { ioctl } for pid=484 comm="syz.0.52" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.890273][ T24] audit: type=1400 audit(1773236014.959:116): avc: denied { create } for pid=501 comm="syz.2.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 26.127711][ T24] audit: type=1400 audit(1773236015.189:117): avc: denied { create } for pid=519 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 26.180225][ T24] audit: type=1400 audit(1773236015.229:118): avc: denied { read write } for pid=519 comm="syz.0.62" name="cgroup.subtree_control" dev="cgroup2" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 26.254566][ T24] audit: type=1400 audit(1773236015.229:119): avc: denied { open } for pid=519 comm="syz.0.62" path="" dev="cgroup2" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 26.414349][ T24] audit: type=1400 audit(1773236015.479:120): avc: denied { create } for pid=557 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.439367][ T24] audit: type=1400 audit(1773236015.479:121): avc: denied { create } for pid=557 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 27.209128][ T24] audit: type=1400 audit(1773236016.269:122): avc: denied { relabelfrom } for pid=630 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.252084][ T680] device syzkaller0 entered promiscuous mode [ 28.301361][ T699] ------------[ cut here ]------------ [ 28.306986][ T699] trace type BPF program uses run-time allocation [ 28.318024][ T699] WARNING: CPU: 0 PID: 699 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 28.335649][ T699] Modules linked in: [ 28.349762][ T278] cgroup: fork rejected by pids controller in [ 28.350940][ T699] CPU: 0 PID: 699 Comm: syz.3.108 Not tainted syzkaller #0 [ 28.354962][ T278] /syz2 [ 28.369057][ T699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.379842][ T278] [ 28.395565][ T699] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 28.404602][ T699] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 20 cd 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 28.424896][ T699] RSP: 0018:ffffc900013c7448 EFLAGS: 00010246 [ 28.431972][ T699] RAX: 7df70d5bdf860900 RBX: 0000000000000001 RCX: ffff888130e30000 [ 28.453898][ T699] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 28.474375][ T699] RBP: ffffc900013c7490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 28.482599][ T699] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff88811e144000 [ 28.499968][ T699] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881262f5000 [ 28.507980][ T699] FS: 00007f8f941036c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 28.518063][ T699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.537456][ T699] CR2: 0000000000000000 CR3: 000000011e26d000 CR4: 00000000003506b0 [ 28.569862][ T699] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.671044][ T699] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 28.696607][ T730] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.729990][ T699] Call Trace: [ 28.733355][ T730] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.743474][ T699] ? __fdget+0x1a1/0x230 [ 28.747726][ T699] resolve_pseudo_ldimm64+0x55e/0x1060 [ 28.758012][ T730] device bridge_slave_0 entered promiscuous mode [ 28.785750][ T730] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.805267][ T699] ? bpf_check+0xdb10/0xdb10 [ 28.810132][ T730] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.822163][ T699] ? kvmalloc_node+0x88/0x130 [ 28.827281][ T730] device bridge_slave_1 entered promiscuous mode [ 28.859221][ T699] bpf_check+0x9058/0xdb10 [ 28.909712][ T699] ? bpf_get_btf_vmlinux+0x60/0x60 [ 28.979535][ T699] ? 0xffffffffa002a85c [ 29.052380][ T699] ? is_bpf_text_address+0x177/0x190 [ 29.145767][ T699] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.151278][ T699] ? __kernel_text_address+0xa0/0x100 [ 29.156954][ T699] ? unwind_get_return_address+0x4d/0x90 [ 29.162610][ T699] ? stack_trace_save+0xf0/0xf0 [ 29.196251][ T699] ? arch_stack_walk+0xee/0x140 [ 29.256254][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 29.256263][ T24] audit: type=1400 audit(1773236018.319:124): avc: denied { create } for pid=730 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.270184][ T699] ? stack_trace_save+0xa6/0xf0 [ 29.389575][ T699] ? stack_trace_snprint+0xf0/0xf0 [ 29.438413][ T24] audit: type=1400 audit(1773236018.319:125): avc: denied { write } for pid=730 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.466105][ T699] ? __kasan_slab_alloc+0x69/0xf0 [ 29.504735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.514439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.526262][ T699] ? pcpu_block_update+0x451/0x900 [ 29.542677][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.555188][ T24] audit: type=1400 audit(1773236018.319:126): avc: denied { read } for pid=730 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.577176][ T699] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.583982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.598705][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.605905][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.613986][ T699] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.624877][ T699] ? __kasan_kmalloc+0xec/0x110 [ 29.630073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.643614][ T699] ? __kasan_kmalloc+0xda/0x110 [ 29.648827][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.662267][ T699] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 29.668026][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.675072][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.688986][ T699] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.694802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.708049][ T699] ? security_bpf_prog_alloc+0x62/0x90 [ 29.713994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.741448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.752140][ T699] ? bpf_prog_load+0x9d8/0x14a0 [ 29.759434][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.771819][ T699] ? __se_sys_bpf+0x49a/0x740 [ 29.777078][ T699] ? __x64_sys_bpf+0x7b/0x90 [ 29.781727][ T699] ? do_syscall_64+0x31/0x40 [ 29.781745][ T730] device veth0_vlan entered promiscuous mode [ 29.786312][ T699] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.798343][ T699] ? memset+0x35/0x40 [ 29.798768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.802390][ T699] ? bpf_obj_name_cpy+0x193/0x1e0 [ 29.802399][ T699] bpf_prog_load+0xfca/0x14a0 [ 29.802409][ T699] ? map_freeze+0x320/0x320 [ 29.802423][ T699] ? selinux_bpf+0xc7/0xf0 [ 29.802432][ T699] ? security_bpf+0x82/0xa0 [ 29.802440][ T699] __se_sys_bpf+0x49a/0x740 [ 29.802448][ T699] ? __x64_sys_bpf+0x90/0x90 [ 29.802457][ T699] ? do_user_addr_fault+0x797/0xc90 [ 29.802470][ T699] ? debug_smp_processor_id+0x17/0x20 [ 29.802480][ T699] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 29.802489][ T699] __x64_sys_bpf+0x7b/0x90 [ 29.802496][ T699] do_syscall_64+0x31/0x40 [ 29.802507][ T699] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.802515][ T699] RIP: 0033:0x7f8f956c9799 [ 29.802525][ T699] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.802531][ T699] RSP: 002b:00007f8f94103028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.802544][ T699] RAX: ffffffffffffffda RBX: 00007f8f95943090 RCX: 00007f8f956c9799 [ 29.802550][ T699] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 29.802556][ T699] RBP: 00007f8f9575fc99 R08: 0000000000000000 R09: 0000000000000000 [ 29.802562][ T699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 29.802569][ T699] R13: 00007f8f95943128 R14: 00007f8f95943090 R15: 00007fffda254448 [ 29.802578][ T699] ---[ end trace 22f9e41cb97e3606 ]--- [ 29.954032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.961504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.982489][ T730] device veth1_macvtap entered promiscuous mode [ 29.991849][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.001564][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.009723][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.039778][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.048148][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.057465][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.066056][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.255043][ T24] audit: type=1400 audit(1773236019.319:127): avc: denied { create } for pid=786 comm="syz.4.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 30.813733][ T7] device bridge_slave_1 left promiscuous mode [ 30.839970][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.924718][ T7] device bridge_slave_0 left promiscuous mode [ 31.019729][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.046705][ T7] device veth1_macvtap left promiscuous mode [ 31.060264][ T7] device veth0_vlan left promiscuous mode [ 31.212643][ T829] IPv6: pim6reg1: Disabled Multicast RS [ 31.278891][ T857] syz.3.151[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.278967][ T857] syz.3.151[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.293963][ T857] syz.3.151[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.305320][ T857] syz.3.151[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.589826][ T24] audit: type=1400 audit(1773236021.649:128): avc: denied { create } for pid=918 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 32.866400][ T949] tap0: tun_chr_ioctl cmd 1074025677 [ 32.883680][ T949] tap0: linktype set to 6 [ 33.077991][ T24] audit: type=1400 audit(1773236022.129:129): avc: denied { create } for pid=975 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 33.132173][ T990] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 33.156013][ T990] dvmrp1: tun_chr_ioctl cmd 1074025673 [ 34.620629][ T24] audit: type=1400 audit(1773236023.689:130): avc: denied { create } for pid=1052 comm="syz.1.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 34.680789][ T1056] device syzkaller0 entered promiscuous mode [ 34.771450][ T24] audit: type=1400 audit(1773236023.839:131): avc: denied { create } for pid=1064 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 35.122125][ T24] audit: type=1400 audit(1773236024.189:132): avc: denied { create } for pid=1087 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 35.389413][ T24] audit: type=1400 audit(1773236024.449:133): avc: denied { create } for pid=1105 comm="syz.4.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 35.511682][ T24] audit: type=1400 audit(1773236024.519:134): avc: denied { create } for pid=1114 comm="syz.0.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 35.553624][ T24] audit: type=1400 audit(1773236024.539:135): avc: denied { create } for pid=1116 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 35.599014][ T24] audit: type=1400 audit(1773236024.549:136): avc: denied { write } for pid=1118 comm="syz.2.221" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.658138][ T24] audit: type=1400 audit(1773236024.689:137): avc: denied { create } for pid=1104 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 35.707543][ T1123] device wg2 entered promiscuous mode [ 35.717333][ T1128] device sit0 entered promiscuous mode [ 36.463279][ T1202] IPv6: pim6reg1: Disabled Multicast RS [ 36.797977][ T1230] device syzkaller0 entered promiscuous mode [ 37.429341][ T1238] device syzkaller0 entered promiscuous mode [ 37.456085][ T1239] device sit0 left promiscuous mode [ 37.529165][ T1241] device sit0 entered promiscuous mode [ 38.728742][ T1289] device veth1_macvtap left promiscuous mode [ 39.042660][ T24] audit: type=1400 audit(1773236028.109:138): avc: denied { create } for pid=1310 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 39.088612][ T24] audit: type=1400 audit(1773236028.149:139): avc: denied { create } for pid=1322 comm="syz.4.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 39.132723][ T1329] device wg2 entered promiscuous mode [ 39.872626][ T24] audit: type=1400 audit(1773236028.939:140): avc: denied { ioctl } for pid=1396 comm="syz.0.299" path="pid:[4026532281]" dev="nsfs" ino=4026532281 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 42.596051][ T1573] erspan0: refused to change device tx_queue_len [ 43.553774][ T1651] device pim6reg1 entered promiscuous mode [ 45.775270][ T1792] device syzkaller0 entered promiscuous mode [ 46.291124][ T1839] device syzkaller0 entered promiscuous mode [ 46.790703][ T1867] device wg1 entered promiscuous mode [ 47.970602][ T1921] device syzkaller0 entered promiscuous mode [ 48.423626][ T1941] device veth0_vlan left promiscuous mode [ 48.549794][ T1941] device veth0_vlan entered promiscuous mode [ 50.217660][ T1999] device syzkaller0 entered promiscuous mode [ 51.341494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 51.350348][ T2045] device syzkaller0 left promiscuous mode [ 52.674010][ T2109] device syzkaller0 entered promiscuous mode [ 52.874414][ T24] audit: type=1400 audit(1773236041.939:141): avc: denied { create } for pid=2116 comm="syz.3.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 53.697325][ T2138] device syzkaller0 entered promiscuous mode [ 53.820816][ T2138] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 54.473477][ T2155] tap0: tun_chr_ioctl cmd 1074025677 [ 54.484816][ T2155] tap0: linktype set to 778 [ 54.489964][ T2157] device wg2 left promiscuous mode [ 54.495326][ T24] audit: type=1400 audit(1773236043.559:142): avc: denied { append } for pid=2154 comm="syz.2.512" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 54.530073][ T2157] device wg2 entered promiscuous mode [ 55.063884][ T2195] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 55.085236][ T2191] device syzkaller0 entered promiscuous mode [ 56.267439][ T2232] +: renamed from team_slave_1 [ 58.023238][ T2280] device bridge0 entered promiscuous mode [ 59.638739][ T24] audit: type=1400 audit(1773236048.699:143): avc: denied { create } for pid=2335 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 59.696950][ T2339] device syz_tun entered promiscuous mode [ 60.239935][ T2372] syzkaller0: mtu less than device minimum [ 60.364867][ T2387] device syzkaller0 entered promiscuous mode [ 61.318825][ T2427] device syzkaller0 entered promiscuous mode [ 62.969710][ T2535] device syzkaller0 entered promiscuous mode [ 63.546295][ T2564] device syzkaller0 entered promiscuous mode [ 63.766507][ T24] audit: type=1400 audit(1773236052.829:144): avc: denied { create } for pid=2576 comm="syz.3.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 63.984676][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 64.175711][ T2630] device syzkaller0 entered promiscuous mode [ 64.193777][ T24] audit: type=1400 audit(1773236053.259:145): avc: denied { attach_queue } for pid=2619 comm="syz.0.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 64.253008][ T2640] device syzkaller0 entered promiscuous mode [ 64.445039][ T2642] device syzkaller0 entered promiscuous mode [ 68.984570][ T24] audit: type=1400 audit(1773236058.049:146): avc: denied { create } for pid=2826 comm="syz.3.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 69.200001][ T2838] device veth1_macvtap left promiscuous mode [ 69.244441][ T2838] device veth1_macvtap entered promiscuous mode [ 69.250977][ T2838] device macsec0 entered promiscuous mode [ 69.559022][ T24] audit: type=1400 audit(1773236058.619:147): avc: denied { ioctl } for pid=2896 comm="syz.3.745" path="socket:[23434]" dev="sockfs" ino=23434 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 69.819574][ T2908] device syzkaller0 left promiscuous mode [ 70.804595][ T2952] device veth0_to_batadv entered promiscuous mode [ 70.962423][ T24] audit: type=1400 audit(1773236060.029:148): avc: denied { create } for pid=2962 comm="syz.0.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.831455][ T3021] device sit0 entered promiscuous mode [ 73.188104][ T3076] device syzkaller0 entered promiscuous mode [ 73.715081][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 74.281303][ T3124] device wg2 left promiscuous mode [ 74.313908][ T3126] device syzkaller0 entered promiscuous mode [ 75.012458][ T3167] device syzkaller0 entered promiscuous mode [ 75.460438][ T3216] device syzkaller0 entered promiscuous mode [ 75.712070][ T3219] device veth1_macvtap left promiscuous mode [ 75.885610][ T3233] device veth1_macvtap entered promiscuous mode [ 75.893048][ T3233] device macsec0 entered promiscuous mode [ 75.914397][ T3240] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 77.050134][ T3303] device wg2 entered promiscuous mode [ 77.642008][ T3378] syz.1.874 (3378) used obsolete PPPIOCDETACH ioctl [ 77.874264][ T24] audit: type=1400 audit(1773236066.939:149): avc: denied { create } for pid=3393 comm="syz.0.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 78.060912][ T24] audit: type=1400 audit(1773236067.119:150): avc: denied { create } for pid=3395 comm="syz.3.880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 78.665521][ T3431] device syzkaller0 entered promiscuous mode [ 78.676831][ T3431] tap0: tun_chr_ioctl cmd 2147767520 [ 79.154444][ T3469] device syzkaller0 entered promiscuous mode [ 80.174425][ T3540] tap0: tun_chr_ioctl cmd 1074812118 [ 81.044635][ T3609] tap0: tun_chr_ioctl cmd 35108 [ 81.174924][ T3622] device syzkaller0 left promiscuous mode [ 81.263366][ T3624] device veth1_macvtap left promiscuous mode [ 81.282678][ T24] audit: type=1400 audit(1773236070.349:151): avc: denied { create } for pid=3626 comm="syz.2.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 81.398537][ T3624] device veth1_macvtap entered promiscuous mode [ 81.408542][ T3624] device macsec0 entered promiscuous mode [ 81.562201][ T3654] syz.0.950[3654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.562235][ T3654] syz.0.950[3654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.623999][ T3658] device syzkaller0 entered promiscuous mode [ 81.642113][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 81.660921][ T3658] syzkaller0: mtu greater than device maximum [ 82.073079][ T3708] device syzkaller0 entered promiscuous mode [ 82.294640][ T3721] device syzkaller0 entered promiscuous mode [ 83.537352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 83.915285][ T24] audit: type=1400 audit(1773236072.979:152): avc: denied { create } for pid=3887 comm="syz.0.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 85.586834][ T3998] device syzkaller0 entered promiscuous mode [ 86.317563][ T4050] device syzkaller0 entered promiscuous mode [ 86.797429][ T4073] tap0: tun_chr_ioctl cmd 2147767520 [ 88.126991][ T4142] : port 1(ip6gretap0) entered blocking state [ 88.145787][ T4142] : port 1(ip6gretap0) entered disabled state [ 88.201586][ T4142] device ip6gretap0 entered promiscuous mode [ 88.211157][ T4147] device ip6gretap0 left promiscuous mode [ 88.216948][ T4147] : port 1(ip6gretap0) entered disabled state [ 88.629700][ T4189] device veth1_macvtap left promiscuous mode [ 88.648861][ T4189] device macsec0 left promiscuous mode [ 88.709851][ T4195] device veth1_macvtap entered promiscuous mode [ 88.717434][ T4195] device macsec0 entered promiscuous mode [ 89.089890][ T4214] : port 1(ip6gretap0) entered blocking state [ 89.096162][ T4214] : port 1(ip6gretap0) entered disabled state [ 89.143582][ T4214] device ip6gretap0 entered promiscuous mode [ 89.173472][ T4217] device ip6gretap0 left promiscuous mode [ 89.179271][ T4217] : port 1(ip6gretap0) entered disabled state [ 89.553653][ T4239] device syzkaller0 entered promiscuous mode [ 90.154590][ T4294] device syzkaller0 entered promiscuous mode [ 90.439340][ T4328] device syzkaller0 entered promiscuous mode [ 91.153406][ T4360] tap0: tun_chr_ioctl cmd 1074025680 [ 91.175891][ T4360] tap0: tun_chr_ioctl cmd 1074025694 [ 91.264393][ T4385] tap0: tun_chr_ioctl cmd 35108 [ 91.340356][ T4394] device syzkaller0 entered promiscuous mode [ 91.379639][ T4406] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 92.136160][ T4429] device syzkaller0 entered promiscuous mode [ 92.152750][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 92.444739][ T4423] device syzkaller0 entered promiscuous mode [ 94.668638][ T4538] pimreg0: tun_chr_ioctl cmd 35111 [ 96.055552][ T4608] : port 1(syz_tun) entered blocking state [ 96.070279][ T4608] : port 1(syz_tun) entered disabled state [ 96.076535][ T4608] device syz_tun entered promiscuous mode [ 96.321299][ T24] audit: type=1400 audit(1773236085.389:153): avc: denied { create } for pid=4624 comm="syz.4.1224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 97.877768][ T4761] tap0: tun_chr_ioctl cmd 35108 [ 97.922153][ T4761] device syzkaller0 entered promiscuous mode [ 97.943887][ T4768] geneve1: tun_chr_ioctl cmd 1074025684 [ 97.949706][ T4768] geneve1: tun_chr_ioctl cmd 1074025672 [ 97.955572][ T4768] geneve1: ignored: set checksum enabled [ 98.205186][ T4778] device syzkaller0 entered promiscuous mode [ 98.324898][ T4793] device syzkaller0 entered promiscuous mode [ 98.502725][ T4796] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 98.520372][ C1] syzkaller0: tun_net_xmit 76 [ 98.608816][ T4807] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.616056][ T4807] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.665603][ T4802] device bridge_slave_1 left promiscuous mode [ 98.672053][ T4802] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.682403][ T4802] device bridge_slave_0 left promiscuous mode [ 98.688616][ T4802] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.817851][ T4802] syz_tun: tun_chr_ioctl cmd 3221758986 [ 99.076584][ T4838] device syzkaller0 entered promiscuous mode [ 99.110720][ T4838] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 99.117276][ T4838] syzkaller0: tun_net_xmit 1280 [ 99.661661][ T4856] device syzkaller0 entered promiscuous mode [ 102.676447][ T4920] device syzkaller0 entered promiscuous mode [ 102.759558][ T4928] device syzkaller0 entered promiscuous mode [ 104.473750][ T4973] device syzkaller0 entered promiscuous mode [ 104.725313][ T5006] nr0: port 1(macsec0) entered blocking state [ 104.731471][ T5006] nr0: port 1(macsec0) entered disabled state [ 104.738075][ T5006] device macsec0 entered promiscuous mode [ 107.283745][ T5139] erspan0: refused to change device tx_queue_len [ 107.425236][ T5154] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 107.450070][ C1] syzkaller0: tun_net_xmit 76 [ 107.741823][ C1] syzkaller0: tun_net_xmit 76 [ 109.444722][ T5301] nr0: port 1(macsec0) entered blocking state [ 109.451050][ T5301] nr0: port 1(macsec0) entered disabled state [ 109.451295][ T24] audit: type=1400 audit(1773236098.519:154): avc: denied { create } for pid=5304 comm="syz.3.1422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.547102][ T5365] device syzkaller0 entered promiscuous mode [ 111.761126][ T5419] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 111.789869][ C1] syzkaller0: tun_net_xmit 76 [ 111.852768][ T5423] tap0: tun_chr_ioctl cmd 1074025692 [ 112.759910][ T5481] device syzkaller0 entered promiscuous mode [ 113.546366][ T24] audit: type=1400 audit(1773236102.609:155): avc: denied { create } for pid=5504 comm="syz.3.1478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 114.054733][ T24] audit: type=1400 audit(1773236103.119:156): avc: denied { create } for pid=5556 comm="syz.2.1495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 114.901166][ T5648] device syzkaller0 entered promiscuous mode [ 115.480602][ T5682] device syzkaller0 entered promiscuous mode [ 115.862311][ T5720] device syzkaller0 entered promiscuous mode [ 116.370889][ T5767] tap0: tun_chr_ioctl cmd 1074025675 [ 116.377312][ T5767] tap0: persist disabled [ 116.401107][ T5767] tap0: tun_chr_ioctl cmd 1074025675 [ 116.408873][ T5767] tap0: persist disabled [ 116.557315][ T5778] +: renamed from team_slave_1 [ 116.834354][ T5824] device syzkaller0 entered promiscuous mode [ 117.210957][ T24] audit: type=1400 audit(1773236106.279:157): avc: denied { create } for pid=5861 comm="syz.4.1587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 117.918095][ T24] audit: type=1400 audit(1773236106.979:158): avc: denied { read } for pid=5879 comm="syz.3.1590" dev="nsfs" ino=4026532372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.069849][ T24] audit: type=1400 audit(1773236106.979:159): avc: denied { open } for pid=5879 comm="syz.3.1590" path="net:[4026532372]" dev="nsfs" ino=4026532372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.615210][ T5952] device syzkaller0 left promiscuous mode [ 119.093938][ T5976] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.101093][ T5976] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.168890][ T5976] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.175964][ T5976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.183291][ T5976] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.190416][ T5976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.228352][ T5976] device bridge0 entered promiscuous mode [ 120.092845][ T24] audit: type=1400 audit(1773236109.159:160): avc: denied { create } for pid=6014 comm="syz.3.1628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 120.318341][ T6033] device syzkaller0 entered promiscuous mode [ 120.356186][ T6033] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 121.338885][ T6086] device wg2 entered promiscuous mode [ 123.627096][ T6202] +: renamed from team_slave_1 [ 125.710326][ T6287] device syzkaller0 entered promiscuous mode [ 126.053977][ T24] audit: type=1400 audit(1773236115.119:161): avc: denied { create } for pid=6296 comm="syz.3.1704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 126.465151][ T6322] device syzkaller0 entered promiscuous mode [ 126.722351][ T24] audit: type=1400 audit(1773236115.789:162): avc: denied { create } for pid=6339 comm="syz.0.1715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 127.408280][ T6372] device syzkaller0 entered promiscuous mode [ 127.429855][ C0] syzkaller0: tun_net_xmit 76 [ 127.458609][ T6376] device syzkaller0 entered promiscuous mode [ 127.464769][ C0] syzkaller0: tun_net_xmit 76 [ 127.529858][ C0] syzkaller0: tun_net_xmit 76 [ 127.995387][ T6400] device veth1_macvtap left promiscuous mode [ 128.025760][ T6400] device macsec0 left promiscuous mode [ 128.122614][ T6400] device pim6reg1 entered promiscuous mode [ 130.220460][ T6473] device syzkaller0 left promiscuous mode [ 130.937861][ T6543] device veth1_macvtap entered promiscuous mode [ 130.964209][ T6543] device macsec0 entered promiscuous mode [ 131.032509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.148725][ T6563] device xfrm0 entered promiscuous mode [ 131.304876][ T6561] device syzkaller0 entered promiscuous mode [ 131.817833][ T6592] device syzkaller0 entered promiscuous mode [ 132.139072][ T6605] device syzkaller0 entered promiscuous mode [ 132.838419][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 132.838871][ T24] audit: type=1400 audit(1773236121.899:163): avc: denied { create } for pid=6634 comm="syz.3.1797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 134.092246][ T6706] tap0: tun_chr_ioctl cmd 1074025677 [ 134.139523][ T6706] tap0: linktype set to 805 [ 134.381283][ T6732] device syzkaller0 left promiscuous mode [ 135.360141][ T6798] device syzkaller0 entered promiscuous mode [ 136.160099][ T6844] device syzkaller0 left promiscuous mode [ 136.451222][ T6883] device syzkaller0 entered promiscuous mode [ 136.631449][ T24] audit: type=1400 audit(1773236125.699:164): avc: denied { ioctl } for pid=6909 comm="syz.3.1879" path="net:[4026532372]" dev="nsfs" ino=4026532372 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.947799][ C1] Illegal XDP return value 16128, expect packet loss! [ 138.213447][ T7014] device syzkaller0 left promiscuous mode [ 140.580909][ T7187] device syzkaller0 entered promiscuous mode [ 141.332974][ T7237] cgroup: fork rejected by pids controller in /syz4 [ 141.376473][ T7230] device syzkaller0 entered promiscuous mode [ 143.615839][ T7372] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.630463][ T7372] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.651015][ T7372] device bridge_slave_0 entered promiscuous mode [ 143.674917][ T7372] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.684644][ T7372] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.699137][ T7372] device bridge_slave_1 entered promiscuous mode [ 144.130771][ T7372] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.137812][ T7372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.145085][ T7372] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.152114][ T7372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.513885][ T827] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.521306][ T827] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.528646][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.536273][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.561278][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.569470][ T827] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.576588][ T827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.584004][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.592303][ T827] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.599332][ T827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.606669][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.614602][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.661036][ T7372] device veth0_vlan entered promiscuous mode [ 144.688282][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 144.699327][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.720262][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 144.728173][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.736702][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.761951][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.795835][ T7372] device veth1_macvtap entered promiscuous mode [ 144.832123][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 144.862822][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.928029][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.010695][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.027491][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.038059][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.046675][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 145.670915][ T7] nr0: port 1(macsec0) entered disabled state [ 145.691392][ T7] device veth1_macvtap left promiscuous mode [ 145.706349][ T7] device veth0_vlan left promiscuous mode [ 146.084136][ T7545] ªªªªªª™™: renamed from vlan0 [ 148.109007][ T7664] nr0: port 1(macsec0) entered blocking state [ 148.120425][ T7664] nr0: port 1(macsec0) entered disabled state [ 148.183127][ T7664] device macsec0 entered promiscuous mode [ 149.313391][ T24] audit: type=1400 audit(1773236138.379:165): avc: denied { create } for pid=7765 comm="syz.0.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 149.424867][ T7771] device syzkaller0 entered promiscuous mode [ 151.003222][ T7915] device syzkaller0 entered promiscuous mode [ 151.322383][ T24] audit: type=1400 audit(1773236140.389:166): avc: denied { create } for pid=7955 comm="syz.2.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 151.435891][ T7958] : renamed from bond_slave_0 [ 151.771887][ T7993] syzkaller1: tun_chr_ioctl cmd 21731 [ 151.810618][ T7993] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 152.841725][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 153.265441][ T8073] device syzkaller0 entered promiscuous mode [ 153.773937][ T24] audit: type=1400 audit(1773236142.839:167): avc: denied { create } for pid=8104 comm="syz.4.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 153.904456][ T8119] device syzkaller0 entered promiscuous mode [ 154.109569][ T8125] device sit0 entered promiscuous mode [ 155.296650][ T8176] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.303756][ T8176] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.329860][ T8176] device bridge0 left promiscuous mode [ 155.582450][ T8191] ÿÿÿÿÿÿ: renamed from vlan1 [ 155.934791][ T8217] device syzkaller0 entered promiscuous mode [ 156.185320][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 157.072766][ T8261] device syzkaller0 entered promiscuous mode [ 157.203462][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 157.214788][ T8271] tap0: tun_chr_ioctl cmd 1074025681 [ 158.359264][ T8327] device veth0_vlan left promiscuous mode [ 158.410059][ T8327] device veth0_vlan entered promiscuous mode [ 158.485549][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.493847][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.501322][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 158.542905][ T8360] device syzkaller0 entered promiscuous mode [ 159.443610][ T8405] device xfrm0 entered promiscuous mode [ 159.653510][ T8424] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 160.304994][ T8473] IPv6: pim6reg1: Disabled Multicast RS [ 162.782846][ T8662] device syzkaller0 entered promiscuous mode [ 166.100534][ T8808] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.518297][ T8815] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 166.661225][ T8815] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 166.708452][ T8821] syzkaller0: tun_net_xmit 1280 [ 166.785105][ T8820] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 169.788654][ T8907] device bridge_slave_1 left promiscuous mode [ 169.812267][ T8907] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.864777][ T8907] device bridge_slave_0 left promiscuous mode [ 169.876386][ T8907] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.064544][ T24] audit: type=1400 audit(1773236159.129:168): avc: denied { ioctl } for pid=8919 comm="syz.0.2433" path="" dev="cgroup2" ino=149 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 171.016384][ T8967] device syzkaller0 entered promiscuous mode [ 172.160056][ T9036] tun0: tun_chr_ioctl cmd 2147767506 [ 173.970082][ T9098] device wg2 entered promiscuous mode [ 174.768161][ T9117] @ÿ: renamed from bond_slave_0 [ 175.139613][ T9147] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 175.166102][ T9147] syzkaller0: tun_net_xmit 1280 [ 175.210144][ T9148] syzkaller0: tun_net_xmit 1280 [ 175.225252][ T9146] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 175.239703][ T9153] device pim6reg1 entered promiscuous mode [ 175.639847][ T9196] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 176.346852][ T9227] device syzkaller0 entered promiscuous mode [ 176.698586][ T9253] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 176.730631][ T9253] syzkaller0: tun_net_xmit 1280 [ 177.825356][ T9332] device syzkaller0 left promiscuous mode [ 178.379828][ C0] syzkaller0: tun_net_xmit 76 [ 178.630174][ C0] syzkaller0: tun_net_xmit 76 [ 178.670080][ C1] syzkaller0: tun_net_xmit 76 [ 178.711496][ T9373] device syzkaller0 entered promiscuous mode [ 179.683095][ C0] syzkaller0: tun_net_xmit 76 [ 181.566022][ T9444] device syzkaller0 entered promiscuous mode [ 182.242488][ T9454] device syzkaller0 entered promiscuous mode [ 182.502334][ T9474] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 183.381094][ T9519] ÿ: renamed from team_slave_1 [ 183.725672][ T9562] device syzkaller0 entered promiscuous mode [ 185.271632][ T9663] tap0: tun_chr_ioctl cmd 1074025681 [ 186.021199][ T9704] device syzkaller0 entered promiscuous mode [ 188.016037][ T9785] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.023224][ T9785] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.229750][ T9899] device syzkaller0 entered promiscuous mode [ 191.235921][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 191.686405][ T9951] device syzkaller0 entered promiscuous mode [ 192.479735][ T9973] device veth1_macvtap left promiscuous mode [ 192.487864][ T9973] device macsec0 left promiscuous mode [ 193.481086][T10065] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.488131][T10065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.495431][T10065] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.502485][T10065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.529851][T10065] device bridge0 entered promiscuous mode [ 193.721421][ T24] audit: type=1400 audit(1773236182.789:169): avc: denied { create } for pid=10076 comm="syz.4.2773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 194.347075][T10108] device wg2 left promiscuous mode [ 194.386681][T10110] device syzkaller0 entered promiscuous mode [ 194.463724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.798975][T10129] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 194.819823][ C0] syzkaller0: tun_net_xmit 76 [ 194.840260][T10129] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 194.860089][T10129] syzkaller0: Linktype set failed because interface is up [ 195.307862][T10155] device pim6reg1 left promiscuous mode [ 196.067605][T10277] device syzkaller0 entered promiscuous mode [ 196.331375][T10288] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 196.344419][T10288] syzkaller0: tun_net_xmit 1280 [ 198.038600][ T4900] device syz_tun left promiscuous mode [ 198.044195][ T4900] : port 1(syz_tun) entered disabled state [ 198.066175][T10346] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.074131][T10346] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.102806][T10346] device bridge_slave_0 entered promiscuous mode [ 198.159379][T10346] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.169295][T10346] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.179807][ C0] syzkaller0: tun_net_xmit 76 [ 198.184662][T10346] device bridge_slave_1 entered promiscuous mode [ 198.280206][T10367] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 198.287358][T10367] syzkaller0: tun_net_xmit 1280 [ 198.299820][ C1] syzkaller0: tun_net_xmit 76 [ 198.430416][T10346] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.437505][T10346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.444807][T10346] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.451842][T10346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.525476][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.550224][ T827] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.589874][ T827] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.614277][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.630050][ T827] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.637073][ T827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.650039][ C1] syzkaller0: tun_net_xmit 76 [ 198.680153][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.699815][ T827] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.706837][ T827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.735574][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.764710][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.805792][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.843589][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.867765][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.910552][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.949161][T10346] device veth0_vlan entered promiscuous mode [ 199.028249][ C0] syzkaller0: tun_net_xmit 76 [ 199.059032][T10346] device veth1_macvtap entered promiscuous mode [ 199.076710][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.087943][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.097039][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.159288][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.180090][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.208989][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.238324][ T827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.280488][T10410] device syzkaller0 left promiscuous mode [ 199.669797][ C1] syzkaller0: tun_net_xmit 76 [ 200.287102][ T24] audit: type=1400 audit(1773236189.349:170): avc: denied { create } for pid=10474 comm="syz.3.2885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 200.719883][T10502] lo: mtu less than device minimum [ 200.803722][T10504] device syzkaller0 entered promiscuous mode [ 200.854286][T10508] device syzkaller0 left promiscuous mode [ 201.170192][T10523] device macsec0 entered promiscuous mode [ 201.461562][ T48] device veth0_vlan left promiscuous mode [ 201.966906][T10557] device syzkaller0 entered promiscuous mode [ 202.159090][T10568] device syzkaller0 entered promiscuous mode [ 204.571373][ T24] audit: type=1400 audit(1773236193.639:171): avc: denied { mounton } for pid=10669 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 204.817164][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.843954][T10669] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.860576][T10669] device bridge_slave_0 entered promiscuous mode [ 204.935865][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.964025][T10669] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.029292][T10669] device bridge_slave_1 entered promiscuous mode [ 205.053999][T10675] device syzkaller0 entered promiscuous mode [ 205.425652][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.440486][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.540013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.563175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.591429][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.598503][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.635024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.656558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.688599][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.695719][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.724985][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.745999][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.778746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.797672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.835884][T10669] device veth0_vlan entered promiscuous mode [ 205.899099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.912142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.933743][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.957468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.978662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.024919][T10669] device veth1_macvtap entered promiscuous mode [ 206.104857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.123774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.164594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.282657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.301132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.309492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.409902][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.426286][ T24] audit: type=1400 audit(1773236195.489:172): avc: denied { unmount } for pid=10669 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 206.744689][T10757] device veth1_macvtap left promiscuous mode [ 206.752491][T10757] device veth1_macvtap entered promiscuous mode [ 206.758784][T10757] device macsec0 entered promiscuous mode [ 206.791702][ T48] device macsec0 left promiscuous mode [ 206.798615][ T48] nr0: port 1(macsec0) entered disabled state [ 206.826371][ T48] device bridge_slave_1 left promiscuous mode [ 206.849586][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.858262][ T48] device bridge_slave_0 left promiscuous mode [ 206.872397][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.882049][ T48] device veth0_vlan left promiscuous mode [ 207.082965][T10781] bridge0: port 3(gretap0) entered blocking state [ 207.089394][T10781] bridge0: port 3(gretap0) entered disabled state [ 207.096179][T10781] device gretap0 entered promiscuous mode [ 207.102357][T10781] bridge0: port 3(gretap0) entered blocking state [ 207.108773][T10781] bridge0: port 3(gretap0) entered forwarding state [ 207.115998][T10784] device syz_tun entered promiscuous mode [ 207.946145][T10878] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.953253][T10878] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.088739][T10878] device bridge0 left promiscuous mode [ 208.123234][T10871] : port 1(ip6gretap0) entered blocking state [ 208.129416][T10871] : port 1(ip6gretap0) entered disabled state [ 208.227114][T10871] device ip6gretap0 entered promiscuous mode [ 208.238554][T10864] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.245626][T10864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.252901][T10864] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.259934][T10864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.267988][T10864] device bridge0 entered promiscuous mode [ 208.275052][T10864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.282656][T10884] device ip6gretap0 left promiscuous mode [ 208.289916][T10884] : port 1(ip6gretap0) entered disabled state [ 208.320233][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.457221][T10916] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.464406][T10916] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.540795][T10903] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.547923][T10903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.558598][T10903] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.565826][T10903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.578645][T10903] device bridge0 entered promiscuous mode [ 208.590649][T10923] -1: renamed from syzkaller0 [ 209.431427][T10956] device syzkaller0 entered promiscuous mode [ 210.216201][T10988] : port 1(ip6gretap0) entered blocking state [ 210.229805][T10988] : port 1(ip6gretap0) entered disabled state [ 210.236455][T10988] device ip6gretap0 entered promiscuous mode [ 210.259854][T10994] device ip6gretap0 left promiscuous mode [ 210.265699][T10994] : port 1(ip6gretap0) entered disabled state [ 211.076232][T11028] syz.1.3046 uses obsolete (PF_INET,SOCK_PACKET) [ 211.723138][T11046] device syzkaller0 entered promiscuous mode [ 215.679484][T11250] device veth1_macvtap left promiscuous mode [ 215.728172][T11250] device macsec0 entered promiscuous mode [ 215.893323][ T24] audit: type=1400 audit(1773236204.959:173): avc: denied { create } for pid=11279 comm="syz.1.3118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 215.961512][T11280] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 217.634275][T11338] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.703376][T11338] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.770629][T11338] device bridge_slave_0 entered promiscuous mode [ 217.850280][T11338] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.857318][T11338] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.919673][T11338] device bridge_slave_1 entered promiscuous mode [ 218.156799][T11338] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.163875][T11338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.171424][T11338] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.178522][T11338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.303399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.399897][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.483769][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.604455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.671747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.769981][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.777133][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.845137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.875554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.939940][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.946989][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.994850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.024634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.055204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.083580][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.274415][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.282899][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.397513][T11338] device veth0_vlan entered promiscuous mode [ 219.410179][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.418790][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.427102][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.440181][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.570453][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.578673][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.601851][T11338] device veth1_macvtap entered promiscuous mode [ 219.729837][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.882327][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.900127][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.030057][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.080108][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.609903][T11453] bridge0: port 3(veth0_to_bridge) entered blocking state [ 220.617055][T11453] bridge0: port 3(veth0_to_bridge) entered disabled state [ 220.624643][T11453] device veth0_to_bridge entered promiscuous mode [ 220.649941][T11453] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.667640][T11453] bridge0: port 3(veth0_to_bridge) entered blocking state [ 220.674787][T11453] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 220.798383][T11459] device veth0_vlan left promiscuous mode [ 220.837435][T11459] device veth0_vlan entered promiscuous mode [ 220.870162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.882959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.895896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.908867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.921558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.934759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.947327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.959930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.972429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.984985][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.612400][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.202904][T11528] nr0: port 1(macsec0) entered blocking state [ 224.470733][T11528] nr0: port 1(macsec0) entered disabled state [ 225.879797][ C0] net_ratelimit: 92249 callbacks suppressed [ 225.879816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.898139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 225.910216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.922380][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.934607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 225.946689][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.958844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.970966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 225.983046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.995230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.482569][T11631] €Â0: renamed from pim6reg1 [ 230.889801][ C0] net_ratelimit: 42366 callbacks suppressed [ 230.889814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 230.908038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.920176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.932144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 230.944189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.956429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.968926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 230.980983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.993278][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.005258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 232.156161][T11675] device syzkaller0 entered promiscuous mode [ 232.410266][T11682] device syzkaller0 left promiscuous mode [ 232.762273][ T48] device bridge_slave_1 left promiscuous mode [ 232.768429][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.912311][ T48] device bridge_slave_0 left promiscuous mode [ 232.922148][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.951173][ T48] device veth1_macvtap left promiscuous mode [ 235.391754][T11712] device syzkaller0 entered promiscuous mode [ 235.899736][ C0] net_ratelimit: 60389 callbacks suppressed [ 235.899749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 235.917768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.930229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.942499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.954512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.966565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 235.978690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.990777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 236.002880][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.015187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.617690][T11757] device sit0 entered promiscuous mode [ 240.209924][T11788] device syzkaller0 entered promiscuous mode [ 240.909916][ C0] net_ratelimit: 46242 callbacks suppressed [ 240.909930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.928094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.940126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.952164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 240.964278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.976363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 240.988435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.000693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.012686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 241.024718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.954871][T11811] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.140015][T11811] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.237868][T11811] device bridge_slave_0 entered promiscuous mode [ 243.414432][T11811] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.440345][T11811] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.713716][T11811] device bridge_slave_1 entered promiscuous mode [ 245.919747][ C0] net_ratelimit: 42401 callbacks suppressed [ 245.919756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.937633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.949611][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 245.961749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.973813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 245.986478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.998572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.010769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 246.023140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.035316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.343663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.360047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.388661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.397204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.421213][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.428314][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.435970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.444549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.454174][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.461232][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.468836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.477461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.803399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.811426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.820080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.972992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.022258][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.480018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.522912][T11811] device veth0_vlan entered promiscuous mode [ 249.811122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.931036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.121099][T11811] device veth1_macvtap entered promiscuous mode [ 250.136313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.157158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.215402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.611193][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.638370][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.735243][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.763771][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.929885][ C0] net_ratelimit: 69371 callbacks suppressed [ 250.929899][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.947827][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 250.959938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.976064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.988292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.000290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.012262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.024252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 251.036324][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.048386][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 255.939713][ C0] net_ratelimit: 60814 callbacks suppressed [ 255.939724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.957731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 255.969831][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.982202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.994221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 256.006304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.018461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.030460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:a6:d1:2e:3c:5b:4d, vlan:0) [ 256.042530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.054816][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.324046][T12038] device vlan0 entered promiscuous mode [ 256.394465][ T48] device veth0_to_bridge left promiscuous mode [ 256.416471][ T48] bridge0: port 3(veth0_to_bridge) entered disabled state [ 256.451243][ T48] device bridge_slave_1 left promiscuous mode [ 256.457478][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.490193][ T48] device bridge_slave_0 left promiscuous mode [ 256.500059][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.532976][ T48] device veth1_macvtap left promiscuous mode [ 256.539029][ T48] device veth0_vlan left promiscuous mode [ 256.735253][T12077] : renamed from bond_slave_0 [ 256.797966][T12061] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.808420][T12061] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.820305][T12061] device bridge_slave_0 entered promiscuous mode [ 256.837333][T12061] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.844439][T12061] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.852443][T12061] device bridge_slave_1 entered promiscuous mode [ 257.071264][T12114] nr0: port 1(macsec0) entered blocking state [ 257.079647][T12114] nr0: port 1(macsec0) entered disabled state [ 257.158460][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.171277][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.220452][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.295741][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.320049][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.327120][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.336728][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.462980][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.490049][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.497122][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.504756][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.512867][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.572724][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.598049][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.728564][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.743842][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.751662][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.760403][T12061] device veth0_vlan entered promiscuous mode [ 257.855951][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.867461][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.882065][T12061] device veth1_macvtap entered promiscuous mode [ 258.016391][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.045401][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.055788][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.179310][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.207876][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.600427][T12173] nr0: port 1(macsec0) entered blocking state [ 258.609740][T12173] nr0: port 1(macsec0) entered disabled state [ 258.975617][ T48] nr0: port 1(macsec0) entered disabled state [ 259.006609][ T48] device bridge_slave_1 left promiscuous mode [ 259.121265][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.138293][ T48] device bridge_slave_0 left promiscuous mode [ 259.149817][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.168230][ T48] device veth0_vlan left promiscuous mode [ 259.736942][T12223] device syzkaller0 entered promiscuous mode [ 259.744706][ T1006] syzkaller0: tun_net_xmit 48 [ 260.832591][T12283] device syzkaller0 entered promiscuous mode [ 260.931545][T12289] Â: renamed from pim6reg1 [ 261.160089][T12320] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.167223][T12320] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.215177][T12320] device bridge0 left promiscuous mode [ 261.321451][T12331] device bridge_slave_1 left promiscuous mode [ 261.327643][T12331] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.338657][T12331] device bridge_slave_0 left promiscuous mode [ 261.344848][T12331] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.392870][T12336] device wg2 entered promiscuous mode [ 263.572787][T12474] device syzkaller0 entered promiscuous mode [ 270.038077][T12785] device syzkaller0 entered promiscuous mode [ 270.198935][T12791] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.206341][T12791] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.214291][T12791] device bridge_slave_0 entered promiscuous mode [ 270.221678][T12791] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.228727][T12791] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.238315][T12791] device bridge_slave_1 entered promiscuous mode [ 270.709651][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.720161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.743863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.796203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.805781][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.812837][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.820497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.828744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.837270][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.844298][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.851955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.859933][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.867864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.882178][T12824] device macsec0 entered promiscuous mode [ 270.896250][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.906796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.914965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.922492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.941393][T12791] device veth0_vlan entered promiscuous mode [ 270.988325][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.008278][T12791] device veth1_macvtap entered promiscuous mode [ 271.042619][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.059375][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.073186][T12830] @ÿ: renamed from bond_slave_0 [ 271.102315][ T302] device bridge_slave_1 left promiscuous mode [ 271.122688][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.162232][ T302] device bridge_slave_0 left promiscuous mode [ 271.176276][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.185859][ T302] device veth1_macvtap left promiscuous mode [ 271.192384][ T302] device veth0_vlan left promiscuous mode [ 271.299216][T12842] @0Ù: renamed from bond_slave_1 [ 271.636715][T12864] device syzkaller0 entered promiscuous mode [ 271.945557][T12889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.421460][T12933] device sit0 left promiscuous mode [ 272.718538][T12944] device sit0 entered promiscuous mode [ 272.848257][T12970] -1: renamed from syzkaller0 [ 274.001779][T13025] device pim6reg1 entered promiscuous mode [ 275.696024][T13079] device syzkaller0 entered promiscuous mode [ 276.016984][T13112] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.024179][T13112] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.354248][T13128] net_ratelimit: 4109 callbacks suppressed [ 276.354258][T13128] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 277.199519][T13198] device syzkaller0 entered promiscuous mode [ 281.245203][T13300] device syzkaller0 entered promiscuous mode [ 284.003679][T13335] batadv0: tun_chr_ioctl cmd 2148553947 [ 285.232961][T13376] device syzkaller0 entered promiscuous mode [ 285.343332][T13385] batadv0: tun_chr_ioctl cmd 2148553947 [ 285.919496][T13447] batadv0: tun_chr_ioctl cmd 2148553947 [ 286.527585][T13460] device syzkaller0 entered promiscuous mode [ 286.543492][T13465] device sit0 entered promiscuous mode [ 287.732049][T13505] batadv0: tun_chr_ioctl cmd 2148553947 [ 291.812459][T13631] syz.5.3774[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.812512][T13631] syz.5.3774[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.391557][T13643] pimreg0: tun_chr_ioctl cmd 35111 [ 292.728468][T13658] device syzkaller0 entered promiscuous mode [ 295.592938][T13703] device syzkaller0 entered promiscuous mode [ 298.287499][T13812] device syzkaller0 entered promiscuous mode [ 298.446638][T13834] device syzkaller0 entered promiscuous mode [ 298.740415][T13861] device syzkaller0 entered promiscuous mode [ 298.915102][T13877] device sit0 left promiscuous mode [ 300.370605][T13968] erspan0: refused to change device tx_queue_len [ 300.660447][T13971] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 300.972776][T13984] device syzkaller0 entered promiscuous mode [ 301.003016][T13986] nr0: port 1(macsec0) entered blocking state [ 301.009162][T13986] nr0: port 1(macsec0) entered forwarding state [ 301.018015][T13986] device nr0 entered promiscuous mode [ 301.240560][T14001] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.403183][T14015] device syzkaller0 entered promiscuous mode [ 301.691037][T14037] device syzkaller0 entered promiscuous mode [ 301.980684][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 302.270296][T14060] device syzkaller0 entered promiscuous mode [ 302.355874][T14070] device syzkaller0 entered promiscuous mode [ 302.545643][T14096] syz.5.3907[14096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.545696][T14096] syz.5.3907[14096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.798620][T14102] device wg2 entered promiscuous mode [ 304.351654][T14254] device syzkaller0 entered promiscuous mode [ 304.418538][T14277] device veth0_vlan left promiscuous mode [ 304.498277][T14277] device veth0_vlan entered promiscuous mode [ 304.599736][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.616568][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.637034][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.081894][T14298] device aaaaaaaaaaaaaaa entered promiscuous mode [ 307.901089][T14460] device syzkaller0 entered promiscuous mode [ 308.686731][T14494] device wlan1 entered promiscuous mode [ 310.039467][T14558] device syzkaller0 entered promiscuous mode [ 311.979238][T14583] device syzkaller0 entered promiscuous mode [ 316.226342][T14754] bridge_slave_0: mtu less than device minimum [ 316.469452][T14770] device syzkaller0 entered promiscuous mode [ 317.006794][T14776] device syzkaller0 entered promiscuous mode [ 318.107185][T14881] device syzkaller0 entered promiscuous mode [ 318.206370][T14900] device syzkaller0 entered promiscuous mode [ 320.680402][T15014] device syzkaller0 entered promiscuous mode [ 320.727372][T15018] device syzkaller0 entered promiscuous mode [ 321.925335][T15074] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.932515][T15074] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.762716][T15212] device syzkaller0 entered promiscuous mode [ 324.158104][T15238] device syzkaller0 entered promiscuous mode [ 324.333787][T15252] device syzkaller0 entered promiscuous mode [ 325.210415][T15308] syz.4.4255[15308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.210466][T15308] syz.4.4255[15308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.746350][T15328] device sit0 left promiscuous mode [ 326.165277][T15361] device syzkaller0 entered promiscuous mode [ 327.821379][T15406] device syzkaller0 entered promiscuous mode [ 327.923698][T15420] device syzkaller0 entered promiscuous mode [ 329.196009][T15497] device syzkaller0 entered promiscuous mode [ 329.539620][T15515] device vlan0 left promiscuous mode [ 330.512699][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.522518][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.536518][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.547520][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.561564][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.590829][T15568] pimreg0: tun_chr_ioctl cmd 1074025676 [ 330.596399][T15568] pimreg0: owner set to 0 [ 330.627894][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.644651][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.721061][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.797330][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.856881][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 330.956371][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 331.007760][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 331.100007][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 331.405560][T15578] pimreg0: tun_chr_ioctl cmd 1074025673 [ 331.970590][T15645] device syzkaller0 entered promiscuous mode [ 332.592063][T15715] bridge0: port 4(veth1) entered blocking state [ 332.637329][T15715] bridge0: port 4(veth1) entered disabled state [ 332.659441][T15715] device veth1 entered promiscuous mode [ 332.674959][T15715] bridge0: port 4(veth1) entered blocking state [ 332.681250][T15715] bridge0: port 4(veth1) entered forwarding state [ 332.704203][T15716] device veth1 left promiscuous mode [ 332.726239][T15716] bridge0: port 4(veth1) entered disabled state [ 332.960694][T15756] device dummy0 entered promiscuous mode [ 332.966512][T15756] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 333.318515][T15771] device syzkaller0 entered promiscuous mode [ 333.415897][T15790] device veth0_vlan left promiscuous mode [ 333.461004][T15790] device veth0_vlan entered promiscuous mode [ 333.590464][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.604610][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.628619][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.672559][T15797] device syzkaller0 entered promiscuous mode [ 334.567227][T15893] device pim6reg1 entered promiscuous mode [ 334.578466][T15885] device veth0_vlan left promiscuous mode [ 334.593828][T15885] device veth0_vlan entered promiscuous mode [ 334.965748][T15937] device syzkaller0 entered promiscuous mode [ 337.187713][T16039] device syzkaller0 entered promiscuous mode [ 338.917074][T16137] ref_ctr_offset mismatch. inode: 0x7e8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 339.415883][T16163] device veth1_macvtap left promiscuous mode [ 339.486054][T16163] device veth1_macvtap entered promiscuous mode [ 339.514989][T16163] device macsec0 entered promiscuous mode [ 339.539214][T16163] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.593169][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.861737][T16194] device syzkaller0 entered promiscuous mode [ 340.552031][T16231] device syzkaller0 entered promiscuous mode [ 340.735481][T16260] device syzkaller0 entered promiscuous mode [ 340.742126][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 340.807382][T16256] device syzkaller0 entered promiscuous mode [ 342.797214][T16374] device syzkaller0 entered promiscuous mode [ 343.253606][T16431] ªªªªªª™™…: renamed from vlan0 [ 343.337047][ T24] audit: type=1400 audit(1773236332.399:174): avc: denied { associate } for pid=16443 comm="syz.1.4592" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 344.264245][T16474] device syzkaller0 entered promiscuous mode [ 344.862367][T16501] device syzkaller0 entered promiscuous mode [ 345.581804][T16525] device syzkaller0 entered promiscuous mode [ 347.968027][T16681] device syzkaller0 entered promiscuous mode [ 349.049409][T16757] device veth0_vlan left promiscuous mode [ 349.064798][T16757] device veth0_vlan entered promiscuous mode [ 349.095537][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.467215][T16784] device syzkaller0 entered promiscuous mode [ 349.681860][T16793] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 349.694351][T16793] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 351.237152][T16913] device pim6reg1 entered promiscuous mode [ 352.735504][T17007] device veth1_macvtap left promiscuous mode [ 354.989772][T17134] ÿ: renamed from team_slave_1 [ 355.365135][T17176] device syzkaller0 entered promiscuous mode [ 355.599540][T17181] device veth0_vlan left promiscuous mode [ 355.831085][T17181] device veth0_vlan entered promiscuous mode [ 357.038632][T17215] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 357.171699][T17219] batadv0: tun_chr_ioctl cmd 1074812118 [ 357.500668][T17229] device syzkaller0 entered promiscuous mode [ 358.942013][T17356] device sit0 entered promiscuous mode [ 358.973506][T17356] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 358.979177][T17356] pim6reg0: linktype set to 768 [ 358.987116][T17356] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 359.083608][T17365] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.091991][T17365] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.099602][T17365] device bridge_slave_0 entered promiscuous mode [ 359.107350][T17365] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.114818][T17365] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.122296][T17365] device bridge_slave_1 entered promiscuous mode [ 359.201836][T17391] device syzkaller0 entered promiscuous mode [ 359.260614][T17396] tap0: tun_chr_ioctl cmd 35108 [ 359.306900][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.314892][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.334416][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.366210][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.374921][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.381980][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.397804][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.406327][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.414724][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.426481][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.433563][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.485997][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.496170][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.513152][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.521724][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.549254][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 359.571338][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.586108][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.600650][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.609843][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.642576][T17365] device veth0_vlan entered promiscuous mode [ 359.676535][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.713243][T17365] device veth1_macvtap entered promiscuous mode [ 359.831982][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.850514][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.858877][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.936187][T10710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 360.282454][T17448] device sit0 entered promiscuous mode [ 360.626735][T17451] device syzkaller0 entered promiscuous mode [ 361.265880][T17510] device vlan0 entered promiscuous mode [ 361.512595][ T7] device macsec0 left promiscuous mode [ 361.520475][ T7] nr0: port 1(macsec0) entered disabled state [ 361.539140][ T7] device bridge_slave_1 left promiscuous mode [ 361.574036][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.678573][ T7] device bridge_slave_0 left promiscuous mode [ 361.729797][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.812548][T17570] cgroup: fork rejected by pids controller in /syz1 [ 362.043037][T17640] €Â0: renamed from pim6reg1 [ 362.077355][T17648] +: renamed from team_slave_1 [ 362.212316][T17656] device wg2 left promiscuous mode [ 362.686314][T17688] device syzkaller0 entered promiscuous mode [ 364.280102][T17758] device syzkaller0 entered promiscuous mode [ 365.078526][T17665] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 365.090270][T17665] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 365.099043][T17665] CPU: 1 PID: 17665 Comm: syz.1.4930 Tainted: G W syzkaller #0 [ 365.107881][T17665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 365.118043][T17665] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 365.124020][T17665] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 365.143632][T17665] RSP: 0018:ffffc90000c575c0 EFLAGS: 00010202 [ 365.149705][T17665] RAX: 0000000000000004 RBX: 1ffff1102165bc79 RCX: 0000000000080000 [ 365.157800][T17665] RDX: ffffc90006f29000 RSI: 0000000000070fd0 RDI: 0000000000070fd1 [ 365.165862][T17665] RBP: ffffc90000c576c0 R08: 0000000000000000 R09: 0000000000000004 [ 365.173921][T17665] R10: 0000000000000003 R11: 0000000000000002 R12: 000000004e8056bf [ 365.181896][T17665] R13: 0000000000000020 R14: 1ffff9200018aec0 R15: dffffc0000000000 [ 365.189869][T17665] FS: 00007f4e5ccfe6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 365.198884][T17665] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 365.205468][T17665] CR2: 00002000005f5000 CR3: 0000000141451000 CR4: 00000000003506a0 [ 365.213549][T17665] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 365.221522][T17665] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 365.229664][T17665] Call Trace: [ 365.232964][T17665] ? perf_pending_event+0x560/0x560 [ 365.238146][T17665] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 365.243934][T17665] ? __this_cpu_preempt_check+0x13/0x20 [ 365.249463][T17665] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 365.255694][T17665] __perf_event_overflow+0x1b3/0x340 [ 365.260958][T17665] perf_swevent_event+0x2f7/0x530 [ 365.265964][T17665] ___perf_sw_event+0x3aa/0x4d0 [ 365.270799][T17665] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 365.277200][T17665] ? __kasan_check_write+0x14/0x20 [ 365.282291][T17665] ? down_read_trylock+0x106/0x160 [ 365.287386][T17665] __perf_sw_event+0x134/0x270 [ 365.292134][T17665] do_user_addr_fault+0xc76/0xc90 [ 365.297148][T17665] ? do_kern_addr_fault+0x80/0x80 [ 365.302155][T17665] ? _raw_spin_unlock_irqrestore+0x51/0x80 [ 365.307939][T17665] exc_page_fault+0x5a/0xc0 [ 365.312418][T17665] asm_exc_page_fault+0x1e/0x30 [ 365.317253][T17665] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 365.323814][T17665] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 365.343397][T17665] RSP: 0018:ffffc90000c57c00 EFLAGS: 00050206 [ 365.349441][T17665] RAX: ffffffff823e7401 RBX: 0000000000001400 RCX: 0000000000000180 [ 365.357393][T17665] RDX: 0000000000001400 RSI: 00002000005f5000 RDI: ffff88810beed280 [ 365.365690][T17665] RBP: ffffc90000c57c30 R08: ffff88810beed3ff R09: 1ffff110217dda7f [ 365.373640][T17665] R10: dffffc0000000000 R11: ffffed10217dda80 R12: 00007ffffffff000 [ 365.381591][T17665] R13: 00002000005f5180 R14: ffff88810beec000 R15: 00002000005f3d80 [ 365.389727][T17665] ? _copy_from_user+0x61/0xd0 [ 365.394528][T17665] ? _copy_from_user+0x7e/0xd0 [ 365.399273][T17665] generic_map_update_batch+0x4ad/0x760 [ 365.404796][T17665] ? __irq_exit_rcu+0x40/0x150 [ 365.409737][T17665] ? bpf_enable_instrumentation+0x50/0x50 [ 365.415447][T17665] ? bpf_map_do_batch+0x1e7/0x5f0 [ 365.420457][T17665] ? bpf_enable_instrumentation+0x50/0x50 [ 365.426161][T17665] bpf_map_do_batch+0x463/0x5f0 [ 365.430997][T17665] __se_sys_bpf+0x5bf/0x740 [ 365.435485][T17665] ? __x64_sys_bpf+0x90/0x90 [ 365.440177][T17665] ? __kasan_check_read+0x11/0x20 [ 365.445183][T17665] __x64_sys_bpf+0x7b/0x90 [ 365.449802][T17665] do_syscall_64+0x31/0x40 [ 365.454209][T17665] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 365.460311][T17665] RIP: 0033:0x7f4e5e2a3799 [ 365.464888][T17665] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 365.484581][T17665] RSP: 002b:00007f4e5ccfe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 365.493068][T17665] RAX: ffffffffffffffda RBX: 00007f4e5e51cfa0 RCX: 00007f4e5e2a3799 [ 365.501367][T17665] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 365.509577][T17665] RBP: 00007f4e5e339c99 R08: 0000000000000000 R09: 0000000000000000 [ 365.517524][T17665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 365.525473][T17665] R13: 00007f4e5e51d038 R14: 00007f4e5e51cfa0 R15: 00007ffd8d139948 [ 365.533436][T17665] Modules linked in: [ 365.543467][T17665] ---[ end trace 22f9e41cb97e3607 ]--- [ 365.549239][T17665] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 365.555311][T17665] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 365.575028][T17665] RSP: 0018:ffffc90000c575c0 EFLAGS: 00010202 [ 365.581238][T17665] RAX: 0000000000000004 RBX: 1ffff1102165bc79 RCX: 0000000000080000 [ 365.589667][T17665] RDX: ffffc90006f29000 RSI: 0000000000070fd0 RDI: 0000000000070fd1 [ 365.597765][T17665] RBP: ffffc90000c576c0 R08: 0000000000000000 R09: 0000000000000004 [ 365.605987][T17665] R10: 0000000000000003 R11: 0000000000000002 R12: 000000004e8056bf [ 365.612279][ T24] audit: type=1400 audit(1773236354.679:175): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 365.614128][T17665] R13: 0000000000000020 R14: 1ffff9200018aec0 R15: dffffc0000000000 [ 365.644198][T17665] FS: 00007f4e5ccfe6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 365.653289][T17665] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 365.660000][T17665] CR2: 00002000005f5000 CR3: 0000000141451000 CR4: 00000000003506a0 [ 365.669263][T17665] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 365.673178][ T24] audit: type=1400 audit(1773236354.679:176): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 365.677315][T17665] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 365.707008][T17665] Kernel panic - not syncing: Fatal exception [ 365.713416][T17665] Kernel Offset: disabled [ 365.717736][T17665] Rebooting in 86400 seconds..