last executing test programs: 1m59.369654617s ago: executing program 4 (id=1121): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 1m59.368255297s ago: executing program 4 (id=1122): perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='devices.list\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@func_proto, @typedef={0x0, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x35}, 0x28) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000ffff0f0000000000000000000001050000"], 0x0, 0x53}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000005c0)="a75f04ebffffff", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) (async, rerun: 64) close(0xffffffffffffffff) (rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)) (async, rerun: 64) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x4) (async) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}, 0x100) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r4, 0xb701, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 1m59.249167241s ago: executing program 4 (id=1124): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0xfffffffffffffde4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000073113f000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x11}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={0x0, r1}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa00}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x6}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xff}, @ldst={0x3, 0x3, 0x4, 0x0, 0x1, 0xfffffffffffffff0, 0xffffffffffffffff}, @map_idx={0x18, 0x5}, @exit, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x11806, r0, 0x1, 0x0, &(0x7f00000004c0)=[{0x2, 0x2, 0xd, 0x5}], 0x10, 0x8}, 0x94) 1m59.167460783s ago: executing program 4 (id=1125): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) write$cgroup_type(r4, &(0x7f0000000040), 0x9) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x24, 0x0, 0x0, &(0x7f0000001300)) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="180800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) 1m58.286520993s ago: executing program 4 (id=1131): socketpair(0x27, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2b, 0x800, 0x7ff, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x9, 0x11, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0xd, 0x67, &(0x7f00000004c0)=""/103, 0xa3500, 0x84, '\x00', 0x0, @cgroup_sock=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x1, 0x3, 0x1, 0xe45b}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000580)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000005c0)=[{0x1, 0x2, 0x7, 0xc}, {0x0, 0x1, 0xf, 0xb}, {0x4, 0x1, 0x10, 0x3}, {0x3, 0x3, 0x6, 0x6}, {0x5, 0x2, 0xb, 0x2}, {0x0, 0x5, 0xe}, {0x1, 0x5, 0x10, 0xc}], 0x10, 0xfffffffe}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{0x1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x10}, 0xc) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6b5c, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x50) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x50) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0xffffffffffffffff, 0x6, 0xb38f44c6a164c949}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)=@generic={&(0x7f0000000a00)='./file0\x00'}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xc, 0x8, &(0x7f0000000140)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc5a}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @generic={0x10, 0xa, 0x3, 0x10a1, 0x2}, @alu={0x7, 0x1, 0xa, 0x1, 0x6, 0x20}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x101, 0xdb, &(0x7f00000001c0)=""/219, 0x41100, 0x3441527a49685e12, '\x00', r3, @fallback=0x2d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x7ff, 0xc7c2}, 0x10, 0x0, r4, 0x2, &(0x7f0000000a80)=[r5, 0x1, r6, r7, r8, r9, r10, 0x1, 0x1, r11], &(0x7f0000000ac0)=[{0x5, 0x5, 0xe, 0x6}, {0x4, 0x5, 0x3, 0x4}]}, 0x94) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@fwd={0xb}, @enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x7, 0x8}, {0xc, 0x2}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x30, 0x0, 0x0, 0x6f]}}, &(0x7f0000000cc0)=""/4096, 0x52, 0x1000, 0x1, 0x4, 0x10000}, 0x28) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001dc0)=@generic={&(0x7f0000001d80)='./file0\x00', 0x0, 0x8}, 0x18) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001e00)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001e80)={r11, 0xffffffffffffffff}, 0x4) r17 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f80)={0x11, 0x5, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0xb34d}, [@generic={0x7, 0x2, 0x8, 0x6, 0xb00}, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000c00)='syzkaller\x00', 0x7e38dd7a, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f0000001d00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001d40)={0x3, 0x6, 0x8, 0x1ff}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001ec0)=[r11, r6, r5, r8, r9, r14, r15, r16], &(0x7f0000001f00)=[{0x0, 0x5, 0xa, 0x4}, {0x3, 0x2, 0x4, 0x2}, {0x0, 0x1, 0x1, 0x3}, {0x3, 0x3, 0x2, 0x2}, {0x4, 0x4, 0xe, 0x4}, {0x2, 0x4, 0x7, 0x8}, {0x4, 0x2, 0xe, 0x5}], 0x10, 0x7}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003100)={&(0x7f0000002040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @datasec={0x7, 0x0, 0x0, 0xf, 0x2, [], "81cf"}, @enum64={0x8, 0x2, 0x0, 0x13, 0x0, 0x8, [{0x9, 0x3483, 0x2}, {0x2, 0x1ff, 0x1000}]}, @float={0x6, 0x0, 0x0, 0x10, 0x8}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x49, 0x0, 0x57, 0x9a3b4613771d883c}, @type_tag={0x10, 0x0, 0x0, 0x12, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x4}}, @typedef={0xb, 0x0, 0x0, 0x8, 0x3}, @var={0x4, 0x0, 0x0, 0xe, 0x2, 0x2}]}, {0x0, [0x61, 0x0, 0x4f, 0x30]}}, &(0x7f0000002100)=""/4096, 0xbe, 0x1000, 0x1, 0x3}, 0x28) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004240)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004300)=@bpf_ext={0x1c, 0x11, &(0x7f0000003140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6c83, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000003200)='GPL\x00', 0x8, 0x1000, &(0x7f0000003240)=""/4096, 0x40f00, 0x39, '\x00', r3, 0x0, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004280)={0x5, 0xa, 0x0, 0x8}, 0x10, 0x2fc34, r12, 0x0, &(0x7f00000042c0), 0x0, 0x10, 0xffff8000}, 0x94) r19 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004640)={&(0x7f00000044c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x8, [@ptr={0xe, 0x0, 0x0, 0x2, 0x4}, @decl_tag={0xd, 0x0, 0x0, 0x11, 0x5, 0xa}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x4}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x5f, 0x27f91aee1c0e7111, 0x5f, 0x2e, 0x30, 0x30]}}, &(0x7f0000004540)=""/226, 0x5c, 0xe2, 0x0, 0xf}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004800)={r18, 0x20, &(0x7f00000047c0)={&(0x7f0000004700)=""/111, 0x6f, 0x0, &(0x7f0000004780)=""/40, 0x28}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000048c0)={0x17, 0x9, &(0x7f00000043c0)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x1b}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x1, 0x3, 0x6, 0x7, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f0000004440)='syzkaller\x00', 0x5, 0x3, &(0x7f0000004480)=""/3, 0x40f00, 0x3a, '\x00', r3, @fallback=0xb, r19, 0x8, &(0x7f0000004680)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000046c0)={0x5, 0xb, 0x750, 0xfaef}, 0x10, r20, r5, 0x6, 0x0, &(0x7f0000004840)=[{0x0, 0x2, 0x8, 0xef86e955e65f815a}, {0x2, 0x3, 0xe, 0x5}, {0x3, 0x4, 0x0, 0x9}, {0x3, 0x4, 0xc, 0x9}, {0x4, 0x3, 0x9, 0x9}, {0x0, 0x3, 0x6, 0x1}], 0x10, 0x8}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000004980)={r17, r6}, 0xc) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000049c0)=r12, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000004a00)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004ac0)={r8, 0x58, &(0x7f0000004a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000004b00)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x9, '\x00', r21, r0, 0x4, 0x3, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000004b80)=@bloom_filter={0x1e, 0x4, 0x9, 0x16c, 0x10, 0x1, 0x5, '\x00', r21, r18, 0x5, 0x4, 0x5, 0x5}, 0x50) 1m58.249989734s ago: executing program 4 (id=1132): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080)="2e7a3f97e0abeda954afa25147cacd77e8c9c6a14537eb9546700f16d874f0c18ef293115d2070cd9c4cfde5438cf73655a7dbab60f5931e6e1be4fdc8fc48c0aeb1337d035fc624602c0c41857feaf4f5e756ff51c4af9f65d1ce1fe4015bdb3775c2a29d7a1fd23acd", &(0x7f0000000100)=""/176}, 0x20) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x7c, &(0x7f0000000300)=""/124, 0x41100, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x8, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r0, r0, r0], &(0x7f0000000440)=[{0x3, 0x1, 0x5, 0x8}, {0x2, 0x4, 0x4, 0x1}, {0x0, 0x5, 0xe, 0x4}, {0x1, 0x4, 0xc}, {0x3, 0x4, 0xc}], 0x10, 0x3}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000580)=@raw=[@ldst={0x3, 0x0, 0x2, 0x1, 0x5, 0xffffffffffffffc0, 0xfffffffffffffff5}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}], &(0x7f00000005c0)='GPL\x00', 0x9, 0x8e, &(0x7f0000000600)=""/142, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x5, 0x101, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000740)=[{0x1, 0x5, 0x0, 0x2}, {0x4, 0x1, 0x9, 0x2}, {0x1, 0x5, 0x5}], 0x10, 0x1000}, 0x94) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000880), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={@fallback=r0, r1, 0x17, 0x0, r2, @void, @value=r3}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x141600, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000900)={'geneve1\x00', 0x2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000980)=r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@fallback=r4, 0x4, 0x1, 0xd2, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0}, 0x40) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000b40), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map=r0, r3, 0x16, 0x2000, 0x0, @value=r7, @void, @void, @void, r6}, 0x20) r8 = perf_event_open(&(0x7f0000000bc0)={0x5, 0x80, 0x1, 0x4, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0xc1000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000b80), 0x8}, 0x4000, 0x1, 0xffffffff, 0x4, 0x9, 0x9, 0x2, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x7, r5, 0x1) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x1c, &(0x7f0000000c40)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x1, 0x1, 0x2, 0x0, 0x0, 0xfffffffffffffff4, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7, 0x1, 0x0, r5}, @jmp={0x5, 0x0, 0xb, 0x1, 0x6, 0x40, 0x1}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], &(0x7f0000000d40)='syzkaller\x00', 0x9, 0x1a, &(0x7f0000000d80)=""/26, 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x0, 0xb, 0xe, 0x2}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000e00)=[{0x5, 0x4, 0x9, 0x7}], 0x10, 0x3}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f00)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x7f, '\x00', 0x0, r7, 0x4, 0x4}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x5, 0xd, 0x6, 0x400, 0x10020, r5, 0x800, '\x00', 0x0, r5, 0x4, 0x0, 0x5, 0x0, @void, @value, @value=r5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r10, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001180)={r5, 0x58, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000010c0)={@ifindex=r13, r1, 0x3, 0x2004, 0x0, @value=r7, @void, @void, @void, r6}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000011c0)=0xc) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000001200)=""/70) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f00000012c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x389042, 0x0) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001340)={r12, 0x9}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r14}, &(0x7f0000001380), &(0x7f00000013c0)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x1f, 0xf, &(0x7f0000001440)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}], &(0x7f00000014c0)='GPL\x00', 0x6, 0x43, &(0x7f0000001500)=""/67, 0x0, 0xb, '\x00', r11, @fallback=0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x0, 0x1, 0x3, 0xbf57}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001700)=[r0, r10, 0xffffffffffffffff, r14, 0x1, 0xffffffffffffffff, r7, r7, r0], 0x0, 0x10, 0x9}, 0x94) 1m43.261754351s ago: executing program 32 (id=1132): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080)="2e7a3f97e0abeda954afa25147cacd77e8c9c6a14537eb9546700f16d874f0c18ef293115d2070cd9c4cfde5438cf73655a7dbab60f5931e6e1be4fdc8fc48c0aeb1337d035fc624602c0c41857feaf4f5e756ff51c4af9f65d1ce1fe4015bdb3775c2a29d7a1fd23acd", &(0x7f0000000100)=""/176}, 0x20) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x7c, &(0x7f0000000300)=""/124, 0x41100, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x8, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r0, r0, r0], &(0x7f0000000440)=[{0x3, 0x1, 0x5, 0x8}, {0x2, 0x4, 0x4, 0x1}, {0x0, 0x5, 0xe, 0x4}, {0x1, 0x4, 0xc}, {0x3, 0x4, 0xc}], 0x10, 0x3}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000580)=@raw=[@ldst={0x3, 0x0, 0x2, 0x1, 0x5, 0xffffffffffffffc0, 0xfffffffffffffff5}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}], &(0x7f00000005c0)='GPL\x00', 0x9, 0x8e, &(0x7f0000000600)=""/142, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x5, 0x101, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000740)=[{0x1, 0x5, 0x0, 0x2}, {0x4, 0x1, 0x9, 0x2}, {0x1, 0x5, 0x5}], 0x10, 0x1000}, 0x94) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000880), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={@fallback=r0, r1, 0x17, 0x0, r2, @void, @value=r3}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x141600, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000900)={'geneve1\x00', 0x2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000980)=r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@fallback=r4, 0x4, 0x1, 0xd2, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0}, 0x40) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000b40), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map=r0, r3, 0x16, 0x2000, 0x0, @value=r7, @void, @void, @void, r6}, 0x20) r8 = perf_event_open(&(0x7f0000000bc0)={0x5, 0x80, 0x1, 0x4, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0xc1000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000b80), 0x8}, 0x4000, 0x1, 0xffffffff, 0x4, 0x9, 0x9, 0x2, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x7, r5, 0x1) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x1c, &(0x7f0000000c40)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x1, 0x1, 0x2, 0x0, 0x0, 0xfffffffffffffff4, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7, 0x1, 0x0, r5}, @jmp={0x5, 0x0, 0xb, 0x1, 0x6, 0x40, 0x1}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], &(0x7f0000000d40)='syzkaller\x00', 0x9, 0x1a, &(0x7f0000000d80)=""/26, 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x0, 0xb, 0xe, 0x2}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000e00)=[{0x5, 0x4, 0x9, 0x7}], 0x10, 0x3}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f00)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x7f, '\x00', 0x0, r7, 0x4, 0x4}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x5, 0xd, 0x6, 0x400, 0x10020, r5, 0x800, '\x00', 0x0, r5, 0x4, 0x0, 0x5, 0x0, @void, @value, @value=r5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r10, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001180)={r5, 0x58, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000010c0)={@ifindex=r13, r1, 0x3, 0x2004, 0x0, @value=r7, @void, @void, @void, r6}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000011c0)=0xc) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000001200)=""/70) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f00000012c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x389042, 0x0) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001340)={r12, 0x9}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r14}, &(0x7f0000001380), &(0x7f00000013c0)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x1f, 0xf, &(0x7f0000001440)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}], &(0x7f00000014c0)='GPL\x00', 0x6, 0x43, &(0x7f0000001500)=""/67, 0x0, 0xb, '\x00', r11, @fallback=0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x0, 0x1, 0x3, 0xbf57}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001700)=[r0, r10, 0xffffffffffffffff, r14, 0x1, 0xffffffffffffffff, r7, r7, r0], 0x0, 0x10, 0x9}, 0x94) 47.385695457s ago: executing program 3 (id=1847): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89a2, &(0x7f0000000080)={'bridge0\x00', @random="0000de0800"}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a000000000000631134000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x0, 0xf, r0, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34"], 0x5) write$cgroup_subtree(r6, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad430019480"], 0x5) r7 = openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1600"/12, @ANYRES32, @ANYBLOB="b0d98fd87439b7e8bad51e35be629cdd9015f93d82b728232d57badd2ffbf032aadcb2439ec16d4edd3a5dc4797f9f48d210a01edd177180bd12e1600344c0316526d5dda97d283e7069045d2bc814bc68135e7f2ec304e9b1936fbae4dfb5a996e92d793e4ee24dcfc2763b4a8a505a803aeb1700790e5f04c5fc743c5a4802933e4741d1a956167b01eaab67db5228bfe77864500df01874d0005c4d0e8373a75cbe90145d3cefc38e206707ebd54489e74dd3729fc910908001486404b986aece5f9ff4d9d97c9ee79c7bc94e1935759c0e611f2eec1ff8ee", @ANYRES64=0x0], 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x2, 0x0, 0x0, 0x0, 0x5, 0x34010, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xffffffffffffff80}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) 47.210064783s ago: executing program 3 (id=1853): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000005f10000000000000630ae0ff000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x4, 0xc4, &(0x7f00000002c0)=""/196, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000611810000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000004c0)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r3, 0x4) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xfa, 0x0, 0x0, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xa4, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8927, &(0x7f0000000140)='8)\r\xecn(:\xb8;\xd1\x85\xe0.U\xd3\xf6\xd3\xd6\xf7L\f\x0e}\x7f\x9e\x96\xbco\xb4\xeb\x87=\x13x\x88wq_2*E\xc8@\x15\xc7\xfc`\xc6Z\xeb\x9d\xeb\x9cJN\xd14\xeccZ\x8d\xc3\x82H\xceq\x14\xda\x117\xf5*\xfd0\xaf\xb5\xaa\xb4\xda\xbat\xfd\xe9\xb1!R\xf9\xe4\x17\xe9\x92{U\xe6&\xae\xdf\n\x15\xa0U\xb6!\xde9m\xd5\vU\x9fR\x84\xf3N\x83W\xd0\x80') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x28, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x5da0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 45.530359109s ago: executing program 3 (id=1863): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0xae}, @printk={@llu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x20000, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x10, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@map_fd={0x18, 0xb, 0x1, 0x0, r4}, @ldst={0x3, 0x3, 0x2, 0xa, 0x6, 0xfffffffffffffff4, 0x1}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000004c0)='GPL\x00', 0x3, 0x71, &(0x7f0000000500)=""/113, 0x40f00, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[r4, r4, r4, r4, r0, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x143}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r7) (async) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async) socketpair(0x1f, 0x1, 0x3, &(0x7f0000000180)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) (async) ioctl$TUNSETOFFLOAD(r9, 0x400454c9, 0x3) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 45.284331767s ago: executing program 3 (id=1872): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x1800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="6c3ba7cb"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x48}, 0x94) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)}], 0x1}, 0x24000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x339}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0xbe, 0x0, 0xffffbffe, 0x0, 0xfffffffffffffff1}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0xa0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"/1012], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x6}, 0x70) 45.115580462s ago: executing program 3 (id=1875): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x31, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = syz_clone(0x40080400, &(0x7f0000000540)="d5989295b50dbfc7afd329b7b3e85682526df08befc9641530e96f9a3d4e00392817bb9c6ed550351d661b3ea5bef2a9b2bb77764f6d437c3534b1a593083bfc0af519297a8f0537474686dd353141d6533d84ba1458f3582f4e88088236aa6f6a8625f6c611df6b2ae12cde466d9eb5c42b37196a9dd3753a7fceb6a4f8de2318ffa3fd3043757cfecf9c9f4fa4be99bf9f9f60b6e6daef", 0x98, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="c023157be4686248f97a0ad7a7af72513dc858ba0ba9c58626ba8c586733c3cf479728178917e713a43622b293") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x3, 0x6, 0x2, 0x0, 0x36cf, 0x4492, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x50, 0x4, @perf_config_ext={0x9cc7, 0x2}, 0x100800, 0x8, 0x3, 0x4, 0x1, 0x5, 0x6, 0x0, 0x0, 0x0, 0x100000001}, r2, 0x1, r1, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x4c}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x48) r5 = syz_clone(0x206000, &(0x7f0000001980), 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1}, 0x0, 0xfffffffffffffffe, 0x7, 0x0, 0x15}, r5, 0x0, 0xffffffffffffffff, 0x0) 44.338725898s ago: executing program 3 (id=1883): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611004000000000063012e00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611004000000000063012e00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) close(r0) (async) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) write$cgroup_int(r3, &(0x7f0000000300)=0x6, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000006000000080000000800000200000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000006000000080000000800000200000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000002000000000000000000000000000000000000000000000009c867fa29a4c2570f79877c9f0730d523dc264dd69745092b6619e3e83a7bf350939a5bc9c93c25d9a019a13200b1f5d4daaed436550f364e3de7c6a731b6f6e4468d3c4af30842983da486acd0df23b18b58a55d839a73872c1ead1c1b5dc0cf2797f1ce652c975e287c875b92f428a4f8985e3611bb2eca1daff2110873b575584f2cfb1840670bb5eaa362b3ccdd849892710d590575add0c20f8b385e0ce6cde5b64fb51c4c88c7e09d54a0b1ae3ce160b0960a167f76616af3bd52e728dbea1ba6fbffe4131cd6b7073fd1c8728a41812228540bcf3bd840a222490189635758c77368b485875eb1b"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x9, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b703000000000000850000005100000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8947, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000046d100180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000008208500000072000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000046d100180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000008208500000072000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r8, 0x0, 0x0}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x1e, 0x0, 0x4000}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000380)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r3, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@ifindex=r9, 0xf, 0x1, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) (async) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r1, 0x26, 0x1e, r5, @void, @value=r10}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_devices(r0, &(0x7f00000005c0)=ANY=[], 0xfffffeff) 29.277451248s ago: executing program 33 (id=1883): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611004000000000063012e00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611004000000000063012e00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) close(r0) (async) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) write$cgroup_int(r3, &(0x7f0000000300)=0x6, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000006000000080000000800000200000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000006000000080000000800000200000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x9, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b703000000000000850000005100000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8947, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000046d100180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000008208500000072000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000046d100180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000008208500000072000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r8, 0x0, 0x0}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x1e, 0x0, 0x4000}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000380)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r3, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@ifindex=r9, 0xf, 0x1, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) (async) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r1, 0x26, 0x1e, r5, @void, @value=r10}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_devices(r0, &(0x7f00000005c0)=ANY=[], 0xfffffeff) 28.63304369s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) 23.838210638s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) 21.209298316s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) 15.018912892s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) 10.797235122s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) 8.662560403s ago: executing program 1 (id=2218): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c23003f) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x4}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={&(0x7f0000000200)=""/66, 0x42, 0x0, &(0x7f0000000280)=""/12, 0xc}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32=0x1, @ANYBLOB="0500000000000000000000000000000000001d65a73a2cfe8c5e6eed53b74706a0f823d2ca16f45fc44d1e86dfbe8ecea13487d7a45b9fd440df317d4cdcd700b55096b51fb32ea0bd5ed6c2c0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000050000000300"/28], 0xffffffffffffffed) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000e5e168af5b62e91b21c53fcf74be411d7e2ba01fb2e45db6d7529c54f174f1314419deeefd201b3b153461a4e7c85eb161cbf0dd58cbe9714b4b020a3eea6a4481660ca11cc0fe428d0ddc79d749cf0f1395cbca807b630703ad8dcef088400e451b702ba171063ee0a8c1ee20e6e88320e6d7507b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) close(r3) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230040) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x97}, 0x94) r7 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d33, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x8240, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe69, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x13bb711e) 8.073407732s ago: executing program 6 (id=2223): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000001800bf67000000000000560300000ee600f06702000014000000140300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 8.007594134s ago: executing program 6 (id=2224): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f0000000380)}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x18002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r8 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000ff7919b000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x80) openat$cgroup_ro(r8, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80"], 0xffdd) 6.961623529s ago: executing program 6 (id=2226): mkdir(&(0x7f0000000040)='./file0\x00', 0x8b) 6.903238531s ago: executing program 1 (id=2227): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x1, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000001000000000000000000008500000075"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) socketpair(0xa, 0x3, 0x87, &(0x7f0000000280)) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000070000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0xb, [@enum64={0xa, 0x8, 0x0, 0x13, 0x0, 0x5, [{0x6, 0x3, 0x401}, {0x9, 0x5, 0x9}, {0x6, 0x0, 0x6}, {0x5, 0x6774, 0x8}, {0xb, 0x3675, 0x6}, {0x3, 0x7ff, 0xfffff801}, {0x9, 0x80000001, 0x8}, {0x9, 0x0, 0x5}]}]}, {0x0, [0x0, 0x5f, 0x2e, 0x5f, 0x0, 0x5f, 0x5f, 0x2e, 0x5f]}}, &(0x7f00000007c0)=""/225, 0x8f, 0xe1, 0x0, 0x4}, 0x28) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r7, r5}, 0xc) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={r3, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0xa, &(0x7f0000000c00)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit], &(0x7f0000000c80)='syzkaller\x00', 0x6d, 0x92, &(0x7f0000000cc0)=""/146, 0x41100, 0x1, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000d80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x1, 0x3, 0x7ff, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000e00)=[r0, r6, r0, r6, 0xffffffffffffffff], &(0x7f0000000e40)=[{0x3, 0x2, 0x8, 0x3}, {0x4, 0x1, 0x7, 0x2}], 0x10, 0x9}, 0x94) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f40)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0xc5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000010c0)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000009c0)='GPL\x00', 0x924, 0xdc, &(0x7f0000000a00)=""/220, 0x40f00, 0x8, '\x00', r9, 0x17, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x0, 0x0, 0x3, 0x100}, 0x10, 0x29274, r10, 0x1, &(0x7f0000001040)=[r5, r5, r11, r6, r6], &(0x7f0000001080)=[{0x5, 0x5, 0xc, 0xb}], 0x10, 0xb}, 0x94) 6.863162232s ago: executing program 5 (id=2229): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) (async, rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async, rerun: 64) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) socketpair(0x2a, 0x2, 0x10000, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000ac0)={&(0x7f0000000240)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000600)="5b37e86b4016123865aced659a0a9e40fd8948b793400165702267f8e2bb2b83379617eb025688468317035c2df3511912c3d73a7642bf70f39cfd8a2acda8d286d626aa2d35fda1a95957c45596572b84e17d47df27a3f1622a067687a67fb290f98a2a72475eacc2ca19572374c55cd830c6423e7984885f3b5fbf9af70dff161002f71d8d03bb4e669910e15bd83949f0f0dc9846279a35915af9fbe4ef61056b8ff6af2b271ad394745419272d8eef09a092db85b79c4922beadd5035aaec2ed61124f5850c80993f545df81e2d7039d846d4499ddd030d811e982c1c895742bd19a9da2", 0xe6}, {&(0x7f0000000700)="3d2057c62697ab07273dc9410043b2d5599447470dda62d96a776c5592ae2390723ee740d2d093949b6448e84cb99218f84a49e854777a82c10b98221399add427f86d90482a83725d2c9df99992f6266b4e1da7ac86e9b99bbe2b8226c2ccb473a9ebcf23b00d0efc53744d0049a73bde2646740a07d2ab224d47400a8208997fc88954ac7067931c5e079d70a77b52758ed767c9699188d1eb63f73b21b653573015b2812715a2ee5a20e7381ef95b709f459b14f7d47aca0f8693f3e6159484d1bf8d0d29bcbd537576a7c4b88303a3450146122e2ac8fdd35e399445b9f39e8769b785749b4fec", 0xe9}, {&(0x7f0000000800)="201835c9043a9013909d3b3bdb2dae5e79457f0fe8190d225f689ca9d3e200928541d9023a1c59317d4c7e2ac18a7805ea81fea47e71281f4e7ffa60c79cfed47b72cf14fa84e9d2e45466556b301d4bba7703be6bf5097a252775", 0x5b}, {&(0x7f0000000880)}, {&(0x7f00000008c0)="057ede22d87b393f6d0328b63800751372c05722ca7affdbf128a0ce12cebc067ed2728716af676a0a0c44f667948b6039af532844c150134a055bf4dae0", 0x3e}, {&(0x7f0000000900)="f22b0178ab448030a7fdaa07615d26b72a9255d1bbcbb8e37b555f0c62a5b6ac155350e25ae35a54adecc8998755e5d9c852b335f4dcf23f7bb5f812efae36e4483f9afb58650cc0b9b5487ee7be06717b4e1dfa68750c6f065a8f3f12d7bd1ca5f4525e2160c4858bab52e4d76d5edb", 0x70}], 0x6, &(0x7f0000000a00)=[@mark={{0x14, 0x1, 0x24, 0xc}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffb517}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}], 0x90}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b1109000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x20) 6.781200205s ago: executing program 6 (id=2230): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x17) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc8900000000000035090100000000009500000000000000b7020000001ac81b7baaf8ff00000000d5090000000000007baaf0ffe0bfffffbf8300000000000007080000fffdffffbca400000000000007040000f0ffffff240200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000080000000b70000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.780971815s ago: executing program 5 (id=2231): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000031000000850000006b00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.708625598s ago: executing program 0 (id=2232): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8912, &(0x7f0000000000)={'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8912, &(0x7f0000000000)={'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x29, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0xd, 0x6, 0x8, 0xfffffffffffffffe, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x2, 0x1, 0x2, 0x1, 0x4}, @ldst={0x1, 0x1, 0x0, 0xb, 0x6, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @alu={0x8, 0x1, 0x1, 0x4, 0x9, 0xffffffffffffffb0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0x311, 0x7b, &(0x7f0000000900)=""/123, 0x12a2c2ac27b88077, 0x23, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x2, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x0, 0x2, 0x4, 0x4}, {0x0, 0x1, 0x6, 0x3}, {0x0, 0x4, 0xa, 0x5}, {0x1, 0x4, 0x8, 0x9}, {0x4, 0x1, 0xd, 0x6}, {0x4, 0x5, 0xb, 0x9}, {0x0, 0x4, 0x6, 0x3}, {0x5, 0x5, 0x1, 0x4}], 0x10, 0x7ff}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000b80)={r2, 0x1}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000b80)={r2, 0x1}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8912, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000001200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&'], 0x10) (async) perf_event_open(0x0, 0x0, 0xff7fffbffffffffd, 0xffffffffffffffff, 0x2) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r9}, 0x8) close(r10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r10, 0x5c, 0x0}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x200, 0x0}, 0x8) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xdf}, 0x266, 0x400000, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 902.303791ms ago: executing program 6 (id=2234): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 897.77788ms ago: executing program 5 (id=2235): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000000df00850000008700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x34}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r3, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x16, &(0x7f0000000880)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x16, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x71d}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x6}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x6}, @ldst={0x2, 0x2, 0x6, 0x0, 0x4, 0x30, 0xfffffffffffffffc}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffc8, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8001}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x200}}]}, &(0x7f0000000580)='syzkaller\x00', 0x3, 0x43, &(0x7f0000000680)=""/67, 0x40f00, 0x4, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000dc0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000e00)={0x5, 0x0, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000e40)=[{0x5, 0x3, 0x8}, {0x0, 0x1, 0x10, 0xc}], 0x10, 0x7}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2}}]}}, 0x0, 0x32}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r8, 0x15, 0x1, 0x7, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000200), &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) close(r7) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)=ANY=[@ANYRES32=r10, @ANYRES32=r6, @ANYBLOB='T\x00'/12, @ANYRES32=r7, @ANYBLOB="2e08befb58aaa991ee28309b7cf5264019c3a09fec4df6839f78881b3d9fb0dca7cfc40c4d5522132b7fede537aefcc783a8ab9891aec59a70effbfc4e827ab85aebe2b55e8991cc9e5f29eba0f30f0614bb1f5675651a5aee2548afe7a2fae10aa27b2b750393f19ee608006478eb9c5b8cf4ac655250109b98ecd09306c25e038f714ac039098aa945af5df6bea5eb7071fb0791086a640ccf19644320c4c5717ec7326441ca2ca24e7437f16b9fc486609fcf672d293c13e789dcc36236f86b82d44e9c3a30554a337a77a4bae8556c802049e7915d3a8c6d511d96785051e38ca17fc7c219784e1bbdc3abc12bb69c26bb9036a7a0d5e84090fbd3611ae23b2bc1bdabc03b4a102bfbffaa7e190af28a7793a939e676e7c16cd8a62617bb35", @ANYRES64=r9], 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000014c0)={@fallback=r5, r1, 0x10, 0x17, r3, @void, @value=r3, @void, @void, r9}, 0x20) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0xf}}, @typedef={0x5, 0x0, 0x0, 0x8, 0x5}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @decl_tag={0x10, 0x0, 0x0, 0x11, 0x5}, @fwd={0xc}, @enum64={0x4, 0x1, 0x0, 0x13, 0x1, 0x0, [{0x8, 0x9, 0x7}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x4}, @float={0xd, 0x0, 0x0, 0x10, 0x4}, @ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/4096, 0xa3, 0x1000, 0x1, 0x3}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000400)={r12, &(0x7f0000000380), 0x0}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000000000000850000001700000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001400)={0x11, 0x25, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x8, 0x21, &(0x7f0000000180)=""/33, 0x41100, 0x22, '\x00', r4, 0x0, r11, 0x8, &(0x7f0000001300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001340)={0x3, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001380)=[r13], &(0x7f00000013c0)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x1, 0x1}, {0x5, 0x1, 0x5, 0x5}], 0x10, 0x9}, 0x94) 854.998262ms ago: executing program 6 (id=2236): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB='\b\x00'/11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a00000006000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000020000000000000000000000000000000000000000be68720c879b99d08995a62702326f26d710be3e89fca8f170525281b2479311d1bee2f19f1bb78e6c615f24715019ae2b0a0db28218ef50877fce10e21dbeaae506808f2f9225c207129f92632ebc0103e6b777eea1adf36edb832f86401f6d5f3de855acc61ea4e330b41f5933807c95955a2bea67289df461bfc795313eb6c0efc85ba2cd5fc9efad6c78f0c36da8302b760ffb027b358f883309af2cf5ea35b8f079be5aca8610809c2af620a63b804451a7e3e62b124a86c45dbcce2958ff34590cc5f18c29234d2c1cf39ffb2a885e7ea6"], 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8947, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000280000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000e0f2fe97fc5b530000000000000000ccc572fd7baa3c24", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r5, 0x0, 0x0}, 0x20) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_devices(r2, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1], 0xfffffeff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000001680)="5205000000b21eb6df90", 0x0, 0x41ff, 0x2000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 733.190816ms ago: executing program 5 (id=2237): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB="bc3f0c987c5952c028e651bf50d2d0533e438cf198bc0b87058ceae164d6cac6f604fac5000fb93744c08a2916b9", @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xfffffffd}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x0, 0x1}]}}, 0x0, 0x42}, 0x28) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000003540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000004000000000000009aaa000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000807b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001d000000850000007d00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000040)}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x400040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000200)={'wg1\x00', 0x200}) 732.827046ms ago: executing program 0 (id=2238): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%-5lx \x00'}, 0x20) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xdb, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xf, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x3, 0x2, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000280)='syzkaller\x00', 0x16d29634, 0x68, &(0x7f00000002c0)=""/104, 0x41100, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x4, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x1, r2, r3], &(0x7f0000000600)=[{0x2, 0x1, 0x10, 0xa}], 0x10, 0x7ff}, 0x94) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000009c0)={r0, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000bc0)={r3, 0x20, &(0x7f0000000b80)={&(0x7f0000000a40)=""/131, 0x83, 0x0, &(0x7f0000000b00)=""/82, 0x52}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1c, 0xf, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@exit, @map_val={0x18, 0x6, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @exit, @ldst={0x2, 0x0, 0x6, 0x6, 0xb, 0x40, 0xfffffffffffffff0}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}, @ldst={0x2, 0x3, 0x3, 0xa, 0xb, 0xffffffffffffff90, 0x1}, @map_fd={0x18, 0x4, 0x1, 0x0, r3}]}, &(0x7f0000000800)='syzkaller\x00', 0x7fffffff, 0xeb, &(0x7f0000000840)=""/235, 0x40f00, 0x7, '\x00', r5, @fallback=0x2f, r3, 0x8, &(0x7f0000000a00)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0xa, &(0x7f0000000c00)=[r0, r1, r1, r0, r3, r2, r2, r3], &(0x7f0000000c40)=[{0x2, 0x3, 0xa, 0xf}, {0x6, 0x5, 0xc, 0x5}, {0x0, 0x3, 0x8, 0x7}, {0x5, 0x3, 0xb, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x5, 0x2, 0xa271}, {0x2, 0x4, 0x7}, {0x0, 0x1, 0xd, 0xc}, {0x1, 0x1, 0x9, 0x3}, {0x5, 0x1, 0x9, 0xc}], 0x10, 0x40000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8c}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76, 0x0, 0xffffffffffffffff, 0xffffff33}, 0x48) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000dc0)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0xffffffff, '\x00', 0x0, r3, 0x0, 0x2, 0x3}, 0x50) 548.568082ms ago: executing program 1 (id=2239): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f00000007c0)=r1, 0x47) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x9, 0xa, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @alu={0x4, 0x0, 0x4, 0xf, 0x0, 0x3b, 0x1}, @tail_call]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r2}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f00000006c0)={&(0x7f0000000580)={0x2, 0x4e20, @rand_addr=0x64010102}, 0x10, &(0x7f0000000640)=[{&(0x7f00000005c0)="74bf07c016c2a78e73af0fea0d2acfe29b8e8cdb26869ce7e638cf61dcb9d37a795e0d95f703b90cfeda7c3a4ef5720618bb15dcf6aa29bbe66224b8fea00e3bf436aa4405e5029c5ae44e783f434af29153d2ced6c7", 0x56}], 0x1, &(0x7f0000000680)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x18}, 0x14) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x7, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x4, 0x30101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x8, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000001780)=""/4086, 0xff6}], 0x2}, 0x12) sendmsg$inet(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x3ec0}], 0x1}, 0x0) 509.915993ms ago: executing program 0 (id=2240): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000c0000000400000001000004010000000a000000030000000000000000000000000000010500000020000000000000000000000300000000020000000200000000000000006100392e61612e61005f"], 0x0, 0x64}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x1c, &(0x7f0000000400)=[{&(0x7f00000002c0)="d7", 0xffffff2a}], 0x1}, 0x20004001) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d145a0f0f50d792aa8fcb75fcf106fe909ca46c46a9336c282e8438f65dbfc473cb381df0dcf796363667618f03e2b88fd4af571bb66743b0700ddf9a2d093d85999c9f6f1c2b96bff1f341cae1f8b919508397225af1dda2e2d95ea982b15dbe79597dcb7683db5f340eb7d9ce3527cf097c66b5d2164bf732a26", 0x7b}], 0x1, &(0x7f0000001080)=ANY=[], 0x18, 0x4048050}, 0x8001) close(r1) 354.134739ms ago: executing program 0 (id=2241): socketpair(0x1d, 0x3, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000080)="8422c05976d7509e0bbcb6d54779802dff20648d0e4066f34fdaf913560c84fa376fead72a49bdc20a706a282e2c2715808989810dd8d96b4ca725b9d3f132adf9a9e5aa878c20f7f59dcdfea6fcd7c597958678", 0x54}, {&(0x7f0000000100)}, {&(0x7f0000000140)="c95d504a9105cc640d405e9f342fe3695de38466c5c301151136f15514272dbd2ff32d71da6359ed41d59eec98ffec62d902cc6d39c2e63422d77500fc88f76e26c78965530460c162490a0d36b9206b99beb4970d93a7e5b0c47bd9a0e10146b91a302eae9cccb5ddc8d32649c5384c8a16846c909453fdababb938cc7ea93bbc31397eccf8ae4478310287cf67467498b0f4d5159231c78fb4f30cfb1d5be451f45f6e90367893c05011ceb5634c7a0592", 0xb2}, {&(0x7f0000000200)="dd6ebf9c096f64e8cf3c40857e9e7859cc8a377f61d124b50dbb33afe23435898021ba2ffb43b2fa7ec13644a119e7d23cb8385b56fd62565ac16b28c4eeeaa091b105896786338c466c92512ffecb37a9d53f5c5746a2d35cdd7d1a7c9c0242c1f90e73b0aa3ef14f8ade097939e940d7b4aa88e0d9fbeefa2324b5d1bbc4c902eb67006b63d28e9e25daeca1ad", 0x8e}, {&(0x7f00000002c0)="423f4681afc2a7e5a8ceb611b4d1f66c7a0934d4bb9f278095a7ca78f995e3a68642eb8ffbc69c5b2c4c2e842251a306649b82e32c5f002e1c8bc98d5fd2f517ae356c2222158952368d3430d5af915957684c18cde519c4024c73be1db41a79cd4504e7452880595fb0721ef0152fbb1fe4a8bc06a6bc46445fe33750d220add1c936bdbfcb8c56f16257755f903af66859c25bf11e020e8c57ef698ade4fd889000b4553f4f02c8f40b8b491af2674e86f2b6dbc988dff420433c419303e25b4725f003fd7d19802236799a97ff937c93acc6b98ad952336d691708921fc7930", 0xe1}, {&(0x7f00000003c0)="f96700fbbff40638a660fec1613e2c95b9b3673aa249dd89c3ee72c3abd11288f884ca843bf3d9939e853d7b77c9b7a6aebfa8a397722c065b46d7c2d0884a9373efce0be9f28a4fdebe58e5bc9879dde40feeca185c405bf6fdb5fcf4a57120d0c55fed91f58e96fa9994db4cd10de2221e9e81c05c54be9629b3f11ab9b15626049e3a2f9b0a27552a48c25f7d097fc0e60982a019cba24c9eb1fc71", 0x9d}, {&(0x7f0000000480)="e3506cf492cf7668a4e06673aa7c75f0f58c4a3692ad9490f32c89e83ae18bc5e2c18548822507e43e9f71819f18b5ff524f124c10e034182221e59e08a8c03c3c71fbda7a479793e6a80eace5517bce6527a60dd987a10611024b836e499c9e904eba5056e5b9c5a612a21e3360df2850f4e6c23203962020789db7", 0x7c}, {&(0x7f0000000500)="29f7100e28a6ca0dcb73648024c8353898bb84ca37168d22d75fd52e13bad321fe49821b8521b1eec8089d07d0d04338f4d1653f58e9f36cc4381f960d90447953d8d30a11eece2efc20c0ffa163f411d4f35f6384c77e973b0ede7bd71b9352bca5ca03464f766e098f8c952dfb4f8d6df54d8434e2fa1403bd39d1cf054a0c05465c4136cece9dedf4efa51598f3e0d9dce47f88", 0x95}], 0x8, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x68, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0xf9}, @cipso={0x86, 0x51, 0x0, [{0x2, 0x3, "f6"}, {0x7, 0xf, "a400fb28d2a871fc82fe242d52"}, {0x5, 0x4, "f8b8"}, {0x1, 0xd, "55e0761b0e3b9af17e9770"}, {0x2, 0x5, "dd31a4"}, {0x7, 0xe, "1f3fa6331d40217502eab828"}, {0x7, 0x6, "51c2850f"}, {0x7, 0xc, "8934962835786f8d1ccc"}, {0x6, 0x3, '?'}]}, @ra={0x94, 0x4, 0x1}]}}}], 0x80}, 0x8000) r2 = perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x80, 0x2, 0x7, 0x7, 0x0, 0x3, 0x10000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000700), 0xa}, 0xc004, 0x3, 0x10, 0x6, 0xc, 0x1ff, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000007c0)='%{]^\x00') socketpair(0x15, 0x2, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000840)=0x9) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000880), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000008c0)='!\x00') ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000900)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x8, &(0x7f0000000940)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @ldst={0x3, 0x3, 0x0, 0xa, 0x6fc01c540f9965e3, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0x7d}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ldst={0x2, 0x0, 0x0, 0xb, 0x0, 0xffffffffffffff5e, 0xfffffffffffffffc}], &(0x7f0000000980)='syzkaller\x00', 0xd, 0x0, 0x0, 0xe0880, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x5, 0xd, 0xe, 0xa}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x4, 0xd, 0x7}, {0x2, 0x2, 0xd, 0x1}, {0x2, 0x5, 0x2, 0x8}, {0x1, 0x5, 0x1}, {0x1, 0x2, 0x2, 0xa}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@cgroup, 0xb, 0x1, 0x8000, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0], 0x0}, 0x40) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d80)=@o_path={&(0x7f0000000d40)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d00)={@map=r7, r5, 0x28, 0x2004, 0x0, @value=r8, @void, @void, @void, r6}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e80)={r7, 0x58, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x8, [@const={0x8, 0x0, 0x0, 0xa, 0x4}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x5b, 0x0, 0x69, 0x4}, @volatile={0x1}, @decl_tag={0x6, 0x0, 0x0, 0x11, 0x4, 0x4}, @type_tag={0xe, 0x0, 0x0, 0x12, 0x4}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x64, 0x0, 0x23, 0x3}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x30, 0x0, 0x61]}}, &(0x7f0000001080)=""/136, 0x74, 0x88, 0x1, 0x3}, 0x28) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0xa, 0x11, &(0x7f0000000ec0)=@raw=[@exit, @generic={0x3, 0x0, 0x7, 0x3, 0x1000}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x9a}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @exit], &(0x7f0000000f80)='GPL\x00', 0xffff8ba1, 0x2a, &(0x7f0000000fc0)=""/42, 0x41100, 0x48, '\x00', r9, @fallback=0x1a, r10, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x3, 0x7, 0x8, 0x400}, 0x10, 0xffffffffffffffff, r5, 0x6, &(0x7f0000001200)=[r7, r7, r7, r7, r7, r7, r7, r7, r4], &(0x7f0000001240)=[{0x5, 0x1, 0xf, 0xc}, {0x2, 0x4, 0xe, 0xd}, {0x0, 0x5, 0x9, 0xf}, {0x1, 0x5, 0xf, 0x7}, {0x2, 0x3, 0xc, 0x3}, {0x0, 0x5, 0x10, 0x6}], 0x10, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001380)='!\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xaf09) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001440)={r7, 0x58, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001480)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0xd, '\x00', r12, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x50) r13 = perf_event_open(&(0x7f0000001500)={0x3, 0x80, 0xf6, 0xf3, 0xb6, 0x9c, 0x0, 0x2, 0x8000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffb}, 0xc02, 0x5, 0x8, 0x1, 0x2, 0x2, 0x1, 0x0, 0x81, 0x0, 0x6}, 0xffffffffffffffff, 0x1, r2, 0x8) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x80202, 0x0) ioctl$TUNSETOFFLOAD(r14, 0x400454d0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000015c0)=r11, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001880)={0x6, 0x13, &(0x7f0000001600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x73c2f929}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@jmp={0x5, 0x0, 0xa, 0x8, 0x8, 0x100, 0xfffffffffffffff0}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @generic={0x9, 0x5, 0xd, 0x0, 0x7fffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000016c0)='syzkaller\x00', 0x1, 0xa4, &(0x7f0000001700)=""/164, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000001800)={0x2, 0x10, 0xcd, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), 0x10, 0x783}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={r5, 0x0, 0x4a, 0x21, &(0x7f0000001940)="3ae1f4abac3eb1a115abe9417b30e250daca9727b334addbef204152def9560159748152533bf529c44deb77e8b017d80f51caedca5b7ee87e8ac7ef471a29368b77d21011a5bc168f22", &(0x7f00000019c0)=""/33, 0x8, 0x0, 0x6c, 0xf6, &(0x7f0000001a00)="4f0e6fe5d1970e647448ee96d2adf68989ab331324b7e4d6df524b8e060a259341c9d5ce6b9d516fc4ad8cd8b77453900e16f729362eac18868106348da6d42f5b4e890417bfd9f25ab6932164701973974e509483ff82d4c38d6f93e1d3df7a4f83bdb792c4b824b6ae0792", &(0x7f0000001a80)="b210177f7d9ba7cfa88a293a7052267a7d9b7dc25540b70eb7aa2c43cea7db31b6e7c7491df73d951bf6bc25d6fdfd0861911937887ac593f4ddd6273a95e4c795cc824c1ffb9ed497d56963a0044831a9daba0a33d9c6205d80de8a0347e99a168f219ec873d191697ab9db94f70dd8f0b02e8727b3b7d7ca397a0601c88bb025c225b372004bf0d18928bd2a68b4eab7afcfcc6680a071d86c5195276280f321df0ef6e7722c48154d3bcc08d7ea94f068c80cd34ee3acbc60b898f7dc384fe54a36f25d1847575ea9920b406c61ef15a7fce2b5c171ab1906d5fcfc3b8244f12b32cf09949c00d54bf88b5370d33d8203f2de74c9", 0x0, 0x0, 0x8362}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001c00)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x19, '\x00', r12, r10, 0x3, 0x2, 0x4}, 0x50) r15 = syz_clone(0x30000, &(0x7f0000001c80)="6c371b3dc85d7439e00120ba6e73f70c5c5f96f56070e21269e2ed094fa270f1f9a8a6568de9e507b47e270fa43d267c593ce82c5df2d0213a5a946d7891a848a6251a40c81e70e7df379f78d2c997b73e7100bb641371d8426fcd70e059c2f70def93009a18a1a0a201741d3a8e5d01675dc62e3606032cae5b8b4e3ea47864fb4f711ca14de47821109a493f46ee087769bf8cf5ad00bb48617b6a45d95ab991e96c60729c1fc36b97b538cca5a6bd3a5ca3ec3b7d4aca5f70710e218a3145f474e27ef6f63f895af6722427c61e907024ad78a514df3ed257d8b62f09e375f7879cee2d4a2045db379e0ea9a333bfee8231c2e2c6b5", 0xf7, &(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)="932077d8c7a908d8066ae53aea318839d689e1886da4e6be01049e8ae759120d78d68a1e0f78403d063a50009349a832c762cb9352e9598c1037c7f4555cb6991ef9e0eb383433554aec16b385a688f905940f74795934f9cbe840f33b1ebcd8b1c0c736fd314ca2f520cf87ca9312491bdc1f0607bc43ea2fcea1f6828bcee9b84eb0ea4266489657c68f3a0a55e6d86bbb44e73581b0b4e099a80eff652c") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001f00)={r15, r13, 0x0, 0xd, &(0x7f0000001ec0)='/dev/net/tun\x00'}, 0x30) 260.229582ms ago: executing program 5 (id=2242): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000a7285559dfc6d00608bd3226d15d5cd65973d665ed91215a5e53762599463b2f138e05113f9116e589392b87bdc6e8a10174275bc0f7ca39e5714769085f9e", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000a7285559dfc6d00608bd3226d15d5cd65973d665ed91215a5e53762599463b2f138e05113f9116e589392b87bdc6e8a10174275bc0f7ca39e5714769085f9e", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1, r0}, 0x6) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1, r0}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r4, &(0x7f0000001340)=ANY=[@ANYBLOB], 0x9) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r5}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r5, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={&(0x7f0000000280)='./file0\x00', r4, 0x4000, r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r7, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x19, &(0x7f0000000100), 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r4, &(0x7f0000000040)="0dbdb6fe403f480d1ea757157119e5ea882018e4d9ef5b5918dcfbe39ed20dc0e6f89345cff79597ac8cef6cd107576f7f91e266c232958a4fd704dc9c0f95257c4bd89f00fb3375a552b76fc99dbb7bb575189fb60fb3e40a6f94092ca9ef392593a57b02df121e13708830c39c11b7c657218ce7eb44599bb80d06fa1a"}, 0x20) close(r3) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r9) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r9) write$cgroup_int(r4, &(0x7f0000000100)=0x5, 0x12) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 259.519112ms ago: executing program 0 (id=2243): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xd000, 0x0, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0xf7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='\n\x00') sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(0x3) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc12082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000080)=0x1) (async) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x2, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x8eea}, 0x0, 0x0, r1, 0x2) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (rerun: 64) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x3, 0x541b7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100002, 0x0, 0x0, 0x7, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37438e486dd0000000003"], 0xfe1b) (async) r6 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002a0000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000000000000000e300850000009e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/pid\x00') (async, rerun: 64) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) 146.407876ms ago: executing program 0 (id=2244): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0xffff, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000000)=ANY=[@ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000780)=[{0x5, 0x2, 0x6, 0x4}, {0x2, 0x3, 0x7, 0xa}, {0x5, 0x2, 0xa, 0x1}, {0x3, 0x5, 0x5}], 0x10, 0x82}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x10, 0x395e, 0xe79b, 0x20, r2, 0x23, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0xc}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000700)={'bond_slave_0\x00', @multicast}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xea7c, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r8, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000001c0)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xd0}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0700000004000000180000008e02000020000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000500c3f590423700000040db265490dd2ea3524fac8895d7481dce0fd60c6fc184ca2376120c12d937683f9566962cd2480fee1aefc8b05d21f94b553cfa5b8e03000000000000d8e0f7ac17586445730a2bd5988005f6b78d85fdc3fcbbb0f6a80ad2578fc10a821055f9f75dd180542ea496820d1368919fdf8c181ab126b07360e7ce30b327e84eaad1ae3c5f929db2150c9e08a33ba0e003564f4914fe5a7026a5a257173bab9451057acf3959fb3fced95249232297290f8d", @ANYRES16=r6], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711821000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000001000000000000000000000071182a000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x20, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x1, 0xd, 0x5, 0x6, 0x20, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @map_val={0x18, 0xe, 0x2, 0x0, r10}, @ldst={0x0, 0x1, 0x2, 0xa, 0xa}, @map_fd={0x18, 0x5, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x4, 0xdd, &(0x7f0000000c80)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0xfffffffe, 0x0, 0x8, 0x704}, 0x10, 0x22453, r5, 0x1, &(0x7f0000000200)=[r6], &(0x7f0000000b80)=[{0x4, 0x3, 0xb, 0xc}], 0x10, 0x840}, 0x94) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000300)=r11) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x200020}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 127.419506ms ago: executing program 1 (id=2245): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000a0000850000008d0000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x3, 0x87, &(0x7f0000000140)=""/135}, 0x80) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x625a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0xfffffffc, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[], 0x50) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x34, &(0x7f00000000c0)=r2, 0x4) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r5) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000d94f2f1e177f8cc000000000085000000810000009500a50500000000"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) (async, rerun: 64) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x55) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r2, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x0, 0xb3, &(0x7f0000000480)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000200), &(0x7f00000006c0), 0x8, 0x10000fc, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x1, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, '\x00', r7, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffef3) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0e00000004000000080000000700000000000000a4824a9fb4690460c2a01ab5059209bcf9a1a73b7723948d88d2794a4eeda860f464729b91", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xd, &(0x7f0000000e00)=ANY=[@ANYRESDEC=r1, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000807b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000015000000850000007d0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r10, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000280)="ea8371865f090000000000009ba56a88ca00", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r11, 0x0, 0xffdd) 49.492289ms ago: executing program 1 (id=2246): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x17) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc8900000000000035090100000000009500000000000000b7020000001ac81b7baaf8ff00000000d5090000000000007baaf0ffe2c3ffffbf8300000000000007080000fffdffffbca400000000000007040000f0ffffff240200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000080000000b70000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 21.15305ms ago: executing program 5 (id=2247): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 0s ago: executing program 2 (id=2068): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x18a49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0x3}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.223' (ED25519) to the list of known hosts. [ 20.654215][ T30] audit: type=1400 audit(1778976531.850:64): avc: denied { mounton } for pid=277 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.658644][ T277] cgroup: Unknown subsys name 'net' [ 20.662879][ T30] audit: type=1400 audit(1778976531.850:65): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.673439][ T30] audit: type=1400 audit(1778976531.860:66): avc: denied { unmount } for pid=277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.673962][ T277] cgroup: Unknown subsys name 'devices' [ 20.781092][ T277] cgroup: Unknown subsys name 'hugetlb' [ 20.786720][ T277] cgroup: Unknown subsys name 'rlimit' [ 20.927533][ T30] audit: type=1400 audit(1778976532.120:67): avc: denied { setattr } for pid=277 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.950822][ T30] audit: type=1400 audit(1778976532.120:68): avc: denied { mounton } for pid=277 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.975864][ T30] audit: type=1400 audit(1778976532.120:69): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.982835][ T279] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.008240][ T30] audit: type=1400 audit(1778976532.210:70): avc: denied { relabelto } for pid=279 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.033686][ T30] audit: type=1400 audit(1778976532.210:71): avc: denied { write } for pid=279 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.067017][ T30] audit: type=1400 audit(1778976532.260:72): avc: denied { read } for pid=277 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.068076][ T277] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.092591][ T30] audit: type=1400 audit(1778976532.260:73): avc: denied { open } for pid=277 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.539131][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.546229][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.554099][ T285] device bridge_slave_0 entered promiscuous mode [ 21.569210][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.576295][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.583829][ T285] device bridge_slave_1 entered promiscuous mode [ 21.690806][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.697974][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.705558][ T287] device bridge_slave_0 entered promiscuous mode [ 21.728069][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.735196][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.742721][ T287] device bridge_slave_1 entered promiscuous mode [ 21.794454][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.801758][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.809270][ T286] device bridge_slave_0 entered promiscuous mode [ 21.822355][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.829611][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.837098][ T288] device bridge_slave_0 entered promiscuous mode [ 21.846739][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.853855][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.861506][ T288] device bridge_slave_1 entered promiscuous mode [ 21.869676][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.876734][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.884229][ T286] device bridge_slave_1 entered promiscuous mode [ 21.890850][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.897901][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.905341][ T289] device bridge_slave_0 entered promiscuous mode [ 21.912316][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.919385][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.926844][ T289] device bridge_slave_1 entered promiscuous mode [ 22.021117][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.028199][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.035544][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.042595][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.096485][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.103584][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.110896][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.117939][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.170230][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.177315][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.184635][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.191698][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.205193][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.212298][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.219616][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.226656][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.237729][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.245037][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.252788][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.260417][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.267690][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.274943][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.282246][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.289567][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.297857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.305437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.335549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.343821][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.350929][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.358442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.367445][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.374530][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.382979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.410675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.418607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.426870][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.433921][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.461659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.470974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.479438][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.486492][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.494045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.502258][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.509317][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.516763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.524893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.532989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.541348][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.548388][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.555927][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.564281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.572577][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.579635][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.587054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.595362][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.602419][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.609842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.617781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.632479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.640646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.649031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.657158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.665792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.674225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.703168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.711718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.720870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.728341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.744614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.753250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.761535][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.768568][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.776150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.785389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.793814][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.800903][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.808277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.816937][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.825521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.837572][ T285] device veth0_vlan entered promiscuous mode [ 22.849716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.857727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.866190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.874968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.883625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.892108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.900296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.907856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.918886][ T287] device veth0_vlan entered promiscuous mode [ 22.931373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.939520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.947727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.955921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.964508][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.972680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.980729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.989748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.997978][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.005654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.013459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.021096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.029701][ T288] device veth0_vlan entered promiscuous mode [ 23.039606][ T285] device veth1_macvtap entered promiscuous mode [ 23.054786][ T288] device veth1_macvtap entered promiscuous mode [ 23.064219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.072102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.080547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.089568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.097780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.106126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.115371][ T287] device veth1_macvtap entered promiscuous mode [ 23.126062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.133836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.142483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.156758][ T286] device veth0_vlan entered promiscuous mode [ 23.163718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.171841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.193475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.202844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.210641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.211559][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 23.221872][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.235017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.243450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.251888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.260422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.268707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.277587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.286125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.294503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.302924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.311382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.346773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.359275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.371051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.379739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.398396][ T286] device veth1_macvtap entered promiscuous mode [ 23.416195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.425164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.434083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.442500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.450145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.465039][ T289] device veth0_vlan entered promiscuous mode [ 23.485098][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.503842][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.543193][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.549509][ C0] hrtimer: interrupt took 52406 ns [ 23.553403][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.579746][ T289] device veth1_macvtap entered promiscuous mode [ 23.594595][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.603955][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.613562][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.623029][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.631912][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.968732][ C1] sched: RT throttling activated [ 27.108668][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 27.108685][ T30] audit: type=1400 audit(1778976538.300:107): avc: denied { create } for pid=352 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 29.958928][ T30] audit: type=1400 audit(1778976538.350:108): avc: denied { tracepoint } for pid=352 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.106737][ T30] audit: type=1400 audit(1778976544.300:109): avc: denied { relabelfrom } for pid=356 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.166365][ T30] audit: type=1400 audit(1778976544.320:110): avc: denied { relabelto } for pid=356 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.435415][ T30] audit: type=1400 audit(1778976544.350:111): avc: denied { create } for pid=362 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 34.087140][ T389] sock: sock_set_timeout: `syz.0.23' (pid 389) tries to set negative timeout [ 37.271344][ T403] device syzkaller0 entered promiscuous mode [ 42.927937][ T464] pim6reg: tun_chr_ioctl cmd 1074025692 [ 43.198559][ T30] audit: type=1400 audit(1778976554.390:112): avc: denied { create } for pid=468 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.779242][ T30] audit: type=1400 audit(1778976554.980:113): avc: denied { create } for pid=483 comm="syz.4.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 44.033348][ T501] cgroup: fork rejected by pids controller in /syz0 [ 44.041999][ T30] audit: type=1400 audit(1778976555.240:114): avc: denied { read } for pid=505 comm="syz.3.59" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.129148][ T30] audit: type=1400 audit(1778976555.260:115): avc: denied { open } for pid=505 comm="syz.3.59" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.208236][ T518] ip6gretap0: refused to change device tx_queue_len [ 44.266733][ T30] audit: type=1400 audit(1778976555.260:116): avc: denied { ioctl } for pid=505 comm="syz.3.59" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.339809][ T287] syz-executor (287) used greatest stack depth: 22048 bytes left [ 44.347803][ T30] audit: type=1400 audit(1778976555.460:117): avc: denied { create } for pid=515 comm="syz.4.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 44.683970][ T30] audit: type=1400 audit(1778976555.870:118): avc: denied { ioctl } for pid=530 comm="syz.3.65" path="net:[4026532381]" dev="nsfs" ino=4026532381 ioctlcmd=0x2404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.182259][ T307] device bridge_slave_1 left promiscuous mode [ 45.204719][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.240054][ T30] audit: type=1400 audit(1778976556.430:119): avc: denied { create } for pid=550 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 45.309310][ T307] device bridge_slave_0 left promiscuous mode [ 45.315520][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.337121][ T30] audit: type=1400 audit(1778976556.530:120): avc: denied { cpu } for pid=541 comm="syz.2.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 45.383911][ T307] device veth1_macvtap left promiscuous mode [ 45.400658][ T307] device veth0_vlan left promiscuous mode [ 45.585093][ T547] device syzkaller0 entered promiscuous mode [ 45.618760][ T551] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.628646][ T551] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.703207][ T558] device bridge_slave_1 left promiscuous mode [ 45.718911][ T558] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.731772][ T558] device bridge_slave_0 left promiscuous mode [ 45.747761][ T558] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.834776][ T535] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.847337][ T535] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.865791][ T535] device bridge_slave_0 entered promiscuous mode [ 45.880661][ T535] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.906696][ T535] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.920740][ T535] device bridge_slave_1 entered promiscuous mode [ 46.047611][ T568] : renamed from bond_slave_0 [ 46.216594][ T30] audit: type=1400 audit(1778976557.410:121): avc: denied { create } for pid=535 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.304680][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.312510][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.422047][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.454411][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.536431][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.543568][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.614830][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.653273][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.690906][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.698019][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.754989][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.776107][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.790208][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.866450][ T595] device syzkaller0 entered promiscuous mode [ 46.879249][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.891040][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.907974][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.920724][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.935445][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.945680][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.955461][ T535] device veth0_vlan entered promiscuous mode [ 47.186810][ T535] device veth1_macvtap entered promiscuous mode [ 47.306388][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.315331][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.330827][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.363701][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.385691][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.424559][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.454539][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.829710][ T632] pim6reg: tun_chr_ioctl cmd 2147767517 [ 48.329549][ T662] device syzkaller0 entered promiscuous mode [ 48.350462][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 48.350479][ T30] audit: type=1400 audit(1778976559.550:128): avc: denied { create } for pid=659 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.506425][ T30] audit: type=1400 audit(1778976559.700:129): avc: denied { write } for pid=669 comm="syz.4.110" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.977614][ T30] audit: type=1400 audit(1778976562.160:130): avc: denied { create } for pid=707 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 51.597594][ T30] audit: type=1400 audit(1778976562.790:131): avc: denied { create } for pid=743 comm="syz.4.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 51.882708][ T772] device syzkaller0 entered promiscuous mode [ 53.016228][ T30] audit: type=1400 audit(1778976564.210:132): avc: denied { create } for pid=819 comm="syz.0.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 56.162264][ T30] audit: type=1400 audit(1778976567.360:133): avc: denied { create } for pid=941 comm="syz.1.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.552762][ T953] device syzkaller0 entered promiscuous mode [ 56.940280][ T972] device syzkaller0 entered promiscuous mode [ 57.000917][ T974] @ÿ: renamed from bond_slave_0 [ 57.382295][ T30] audit: type=1400 audit(1778976568.580:134): avc: denied { create } for pid=988 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 58.610522][ T30] audit: type=1400 audit(1778976569.810:135): avc: denied { create } for pid=1008 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 59.210081][ T1022] ------------[ cut here ]------------ [ 59.248557][ T1022] trace type BPF program uses run-time allocation [ 59.261292][ T1022] WARNING: CPU: 0 PID: 1022 at kernel/bpf/verifier.c:11728 check_map_prog_compatibility+0x6cd/0x870 [ 59.363546][ T1022] Modules linked in: [ 59.377562][ T1022] CPU: 0 PID: 1022 Comm: syz.3.211 Not tainted syzkaller #0 [ 59.419507][ T1022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 59.448412][ T1027] device syzkaller0 entered promiscuous mode [ 59.466556][ T1022] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 59.488364][ T1022] Code: ee ff 48 c7 c6 20 48 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 86 1c ee ff c6 05 16 81 6a 05 01 48 c7 c7 80 44 48 85 e8 03 5f 2f 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 59.539864][ T1022] RSP: 0018:ffffc90001107428 EFLAGS: 00010246 [ 59.546007][ T1022] RAX: 2a5c60b8af717b00 RBX: 0000000000000001 RCX: 0000000000080000 [ 59.554144][ T1022] RDX: ffffc90003b24000 RSI: 000000000000258c RDI: 000000000000258d [ 59.562234][ T1022] RBP: ffffc90001107470 R08: ffff8881f7032f3f R09: 1ffff1103ee065e7 [ 59.575754][ T1022] R10: dffffc0000000000 R11: ffffed103ee065e8 R12: ffff888139d68000 [ 59.584118][ T1022] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811af93800 [ 59.593504][ T1022] FS: 00007fb889d726c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 59.602742][ T1022] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 59.609558][ T1022] CR2: 00007fc82cd06dac CR3: 0000000105bd5000 CR4: 00000000003506a0 [ 59.618407][ T1022] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 59.626667][ T1022] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 59.650206][ T1022] Call Trace: [ 59.653550][ T1022] [ 59.666675][ T1022] resolve_pseudo_ldimm64+0x656/0x1180 [ 59.672730][ T1022] ? check_attach_btf_id+0xd70/0xd70 [ 59.678150][ T1022] ? __mark_reg_known+0x1b0/0x1b0 [ 59.688246][ T1022] ? security_capable+0x87/0xb0 [ 59.694844][ T1022] bpf_check+0x32c7/0xf370 [ 59.705175][ T1022] ? is_bpf_text_address+0x177/0x190 [ 59.723677][ T1022] ? bpf_get_btf_vmlinux+0x60/0x60 [ 59.730245][ T1022] ? unwind_get_return_address+0x4d/0x90 [ 59.736084][ T1022] ? stack_trace_save+0xf0/0xf0 [ 59.741161][ T1022] ? arch_stack_walk+0xee/0x140 [ 59.828791][ T1022] ? stack_trace_save+0xa6/0xf0 [ 59.836598][ T1022] ? __stack_depot_save+0x34/0x480 [ 59.851633][ T1022] ? __kasan_slab_alloc+0x69/0xf0 [ 59.857023][ T1022] ? __kasan_kmalloc+0xec/0x110 [ 59.862210][ T1022] ? __kasan_kmalloc+0xda/0x110 [ 59.867110][ T1022] ? kmem_cache_alloc_trace+0x119/0x270 [ 59.873118][ T1022] ? selinux_bpf_prog_alloc+0x51/0x140 [ 59.878619][ T1022] ? security_bpf_prog_alloc+0x62/0x90 [ 59.932376][ T1022] ? bpf_prog_load+0x9f4/0x1640 [ 59.958932][ T1022] ? __sys_bpf+0x51d/0x7d0 [ 59.982027][ T1022] ? __x64_sys_bpf+0x7c/0x90 [ 59.995802][ T1022] ? x64_sys_call+0x4b9/0x9a0 [ 60.023986][ T1022] ? do_syscall_64+0x4c/0xa0 [ 60.031083][ T1022] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.046639][ T1022] ? check_stack_object+0x81/0x140 [ 60.052470][ T1022] ? memset+0x35/0x40 [ 60.056598][ T1022] ? bpf_obj_name_cpy+0x193/0x1e0 [ 60.061877][ T1022] bpf_prog_load+0x10c4/0x1640 [ 60.078505][ T1022] ? __anon_inode_getfd+0x35c/0x3d0 [ 60.084886][ T1022] ? map_freeze+0x360/0x360 [ 60.089728][ T1022] ? selinux_bpf+0xc7/0xf0 [ 60.094185][ T1022] ? security_bpf+0x82/0xa0 [ 60.112606][ T1022] __sys_bpf+0x51d/0x7d0 [ 60.118100][ T1022] ? bpf_link_show_fdinfo+0x330/0x330 [ 60.130073][ T1022] ? __kasan_check_write+0x14/0x20 [ 60.151675][ T1022] ? switch_fpu_return+0x15d/0x2c0 [ 60.164807][ T1022] __x64_sys_bpf+0x7c/0x90 [ 60.177010][ T1022] x64_sys_call+0x4b9/0x9a0 [ 60.205195][ T1022] do_syscall_64+0x4c/0xa0 [ 60.232236][ T1022] ? clear_bhb_loop+0x50/0xa0 [ 60.264398][ T1022] ? clear_bhb_loop+0x50/0xa0 [ 60.296854][ T1022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.340578][ T1022] RIP: 0033:0x7fb88b317e59 [ 60.377959][ T1022] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 60.530414][ T1022] RSP: 002b:00007fb889d72028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 60.598888][ T1022] RAX: ffffffffffffffda RBX: 00007fb88b590fa0 RCX: 00007fb88b317e59 [ 60.648982][ T1022] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 60.657033][ T1022] RBP: 00007fb88b3add6f R08: 0000000000000000 R09: 0000000000000000 [ 60.684064][ T1022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 60.733224][ T1022] R13: 00007fb88b591038 R14: 00007fb88b590fa0 R15: 00007ffe2e372ed8 [ 60.763611][ T1022] [ 60.766695][ T1022] ---[ end trace 2b0f28f8b1dd05ab ]--- [ 61.172060][ T1076] device syzkaller0 entered promiscuous mode [ 61.267187][ T30] audit: type=1400 audit(1778976572.460:136): avc: denied { create } for pid=1086 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 61.588933][ T1099] GPL: port 1(erspan0) entered blocking state [ 61.595966][ T1099] GPL: port 1(erspan0) entered disabled state [ 61.613883][ T1099] device erspan0 entered promiscuous mode [ 61.638059][ T1093] GPL: port 1(erspan0) entered blocking state [ 61.644442][ T1093] GPL: port 1(erspan0) entered forwarding state [ 62.505371][ T30] audit: type=1400 audit(1778976573.700:137): avc: denied { create } for pid=1137 comm="syz.4.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 63.136496][ T1155] device dummy0 entered promiscuous mode [ 63.784297][ T30] audit: type=1400 audit(1778976574.980:138): avc: denied { create } for pid=1197 comm="syz.2.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.892506][ T1198] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.902116][ T1198] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.048812][ T1203] device bridge_slave_1 left promiscuous mode [ 64.060193][ T1203] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.097872][ T1203] device bridge_slave_0 left promiscuous mode [ 64.153166][ T1203] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.221429][ T1194] cgroup: fork rejected by pids controller in /syz4 [ 64.305355][ T1211] device wg2 entered promiscuous mode [ 64.352700][ T1212] device syzkaller0 entered promiscuous mode [ 64.438980][ T1318] @0Ù: renamed from team_slave_1 [ 64.503390][ T30] audit: type=1400 audit(1778976575.700:139): avc: denied { create } for pid=1320 comm="syz.3.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 64.660745][ T1329] device syzkaller0 entered promiscuous mode [ 64.833870][ T1339] ÿ: renamed from bond_slave_0 [ 65.912756][ T30] audit: type=1400 audit(1778976577.110:140): avc: denied { create } for pid=1345 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 66.237500][ T1373] device syzkaller0 entered promiscuous mode [ 69.130117][ T30] audit: type=1400 audit(1778976580.320:141): avc: denied { create } for pid=1400 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 69.430746][ T288] syz-executor (288) used greatest stack depth: 21728 bytes left [ 69.860042][ T1460] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.867132][ T1460] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.885135][ T1460] device bridge_slave_0 entered promiscuous mode [ 69.895513][ T1460] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.904786][ T1460] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.915427][ T1460] device bridge_slave_1 entered promiscuous mode [ 70.468228][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.491615][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.540325][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.558247][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.584926][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.592046][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.655743][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.968775][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.989109][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.996188][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.003765][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.017765][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.047358][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.072261][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.104018][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.127989][ T317] device bridge_slave_1 left promiscuous mode [ 72.137077][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.265622][ T317] device bridge_slave_0 left promiscuous mode [ 74.272433][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.408848][ T317] device veth1_macvtap left promiscuous mode [ 75.070103][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.088460][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.165722][ T1460] device veth0_vlan entered promiscuous mode [ 75.172360][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.180588][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.231603][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.249869][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.271741][ T1534] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 75.344290][ T1460] device veth1_macvtap entered promiscuous mode [ 75.407549][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.426472][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.445290][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.469471][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.508240][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.145987][ T1689] device dummy0 entered promiscuous mode [ 93.935522][ T30] audit: type=1400 audit(1778976605.130:142): avc: denied { ioctl } for pid=1717 comm="syz.3.386" path="socket:[20059]" dev="sockfs" ino=20059 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 94.667487][ T1736] device syzkaller0 entered promiscuous mode [ 95.537881][ T1775] device syzkaller0 entered promiscuous mode [ 96.059351][ T1795] device wg2 entered promiscuous mode [ 96.113730][ T30] audit: type=1400 audit(1778976607.310:143): avc: denied { setattr } for pid=1796 comm="syz.1.411" path="/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 96.478387][ T1833] nr0: port 1(macsec0) entered blocking state [ 96.485639][ T1833] nr0: port 1(macsec0) entered disabled state [ 96.492348][ T1833] device macsec0 entered promiscuous mode [ 96.957181][ T1857] device syzkaller0 entered promiscuous mode [ 97.497319][ T1889] device syzkaller0 entered promiscuous mode [ 102.194590][ T1995] device veth0_vlan left promiscuous mode [ 102.254081][ T1995] device veth0_vlan entered promiscuous mode [ 103.104804][ T2036] device syzkaller0 entered promiscuous mode [ 103.528022][ T30] audit: type=1400 audit(1778976614.720:144): avc: denied { create } for pid=2051 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 104.642358][ T2103] device sit0 entered promiscuous mode [ 105.457296][ T2127] device syzkaller0 entered promiscuous mode [ 106.286324][ T2149] cgroup: fork rejected by pids controller in /syz1 [ 106.483039][ T285] syz-executor (285) used greatest stack depth: 21280 bytes left [ 106.571624][ T2157] device syzkaller0 entered promiscuous mode [ 106.625825][ T2160] device syzkaller0 entered promiscuous mode [ 106.746321][ T2162] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.753633][ T2162] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.761615][ T2162] device bridge_slave_0 entered promiscuous mode [ 106.771789][ T2162] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.778942][ T2162] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.788300][ T2162] device bridge_slave_1 entered promiscuous mode [ 106.979644][ T2162] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.986840][ T2162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.994411][ T2162] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.001502][ T2162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.205988][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.231828][ T837] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.240135][ T837] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.278305][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.286802][ T837] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.293911][ T837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.326229][ T2162] device veth0_vlan entered promiscuous mode [ 107.346033][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.409511][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.439465][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.499099][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.519274][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.579124][ T837] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.586221][ T837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.658852][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.708969][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.774001][ T2162] device veth1_macvtap entered promiscuous mode [ 107.818437][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.849240][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.909584][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.996334][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.039908][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.081451][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.124952][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.260044][ T45] device veth1_macvtap left promiscuous mode [ 108.266130][ T45] device veth0_vlan left promiscuous mode [ 108.413516][ T2216] device pim6reg1 entered promiscuous mode [ 109.186920][ T2268] device syzkaller0 entered promiscuous mode [ 109.196064][ T30] audit: type=1400 audit(1778976620.390:145): avc: denied { create } for pid=2265 comm="syz.4.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 110.804443][ T2340] device syzkaller0 entered promiscuous mode [ 110.811918][ T2340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 112.856308][ T2395] device syzkaller0 entered promiscuous mode [ 112.970524][ T2425] device syzkaller0 entered promiscuous mode [ 112.977306][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 114.599327][ T2500] device syzkaller0 entered promiscuous mode [ 114.643403][ T2507] device syzkaller0 entered promiscuous mode [ 115.030514][ T30] audit: type=1400 audit(1778976626.230:146): avc: denied { create } for pid=2538 comm="syz.3.638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 117.347920][ T30] audit: type=1400 audit(1778976628.540:147): avc: denied { read } for pid=2641 comm="syz.2.673" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.473979][ T30] audit: type=1400 audit(1778976628.540:148): avc: denied { open } for pid=2641 comm="syz.2.673" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.544618][ T2657] device syzkaller0 entered promiscuous mode [ 117.767619][ T2666] device syzkaller0 entered promiscuous mode [ 119.387912][ T2760] device syzkaller0 entered promiscuous mode [ 120.523281][ T2835] device wg2 left promiscuous mode [ 120.616451][ T2841] device wg2 entered promiscuous mode [ 121.709750][ T2896] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.718420][ T2896] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.763066][ T2908] device syzkaller0 entered promiscuous mode [ 121.814428][ T2904] device syzkaller0 entered promiscuous mode [ 122.666022][ T2963] FAULT_INJECTION: forcing a failure. [ 122.666022][ T2963] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 123.170880][ T2963] CPU: 1 PID: 2963 Comm: syz.2.770 Tainted: G W syzkaller #0 [ 123.179619][ T2963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 123.189755][ T2963] Call Trace: [ 123.193264][ T2963] [ 123.196220][ T2963] __dump_stack+0x21/0x30 [ 123.200608][ T2963] dump_stack_lvl+0x110/0x170 [ 123.205321][ T2963] ? show_regs_print_info+0x20/0x20 [ 123.210563][ T2963] dump_stack+0x15/0x20 [ 123.214761][ T2963] should_fail+0x3c1/0x510 [ 123.219223][ T2963] should_fail_usercopy+0x1a/0x20 [ 123.224283][ T2963] _copy_to_user+0x20/0x90 [ 123.228729][ T2963] simple_read_from_buffer+0xe9/0x160 [ 123.234143][ T2963] proc_fail_nth_read+0x1a6/0x220 [ 123.239198][ T2963] ? proc_fault_inject_write+0x310/0x310 [ 123.244855][ T2963] ? proc_fault_inject_write+0x310/0x310 [ 123.250510][ T2963] vfs_read+0x28d/0xc40 [ 123.254677][ T2963] ? kernel_read+0x1f0/0x1f0 [ 123.259277][ T2963] ? __kasan_check_write+0x14/0x20 [ 123.264404][ T2963] ? mutex_lock+0x9b/0x1c0 [ 123.268834][ T2963] ? wait_for_completion_killable_timeout+0x10/0x10 [ 123.275433][ T2963] ? __fdget_pos+0x1e9/0x380 [ 123.280044][ T2963] ? __fdget_pos+0x2d2/0x380 [ 123.284649][ T2963] ? ksys_read+0x71/0x250 [ 123.288989][ T2963] ksys_read+0x149/0x250 [ 123.293252][ T2963] ? vfs_write+0xfd0/0xfd0 [ 123.297683][ T2963] ? debug_smp_processor_id+0x17/0x20 [ 123.303067][ T2963] __x64_sys_read+0x7b/0x90 [ 123.307580][ T2963] x64_sys_call+0x96d/0x9a0 [ 123.312100][ T2963] do_syscall_64+0x4c/0xa0 [ 123.316530][ T2963] ? clear_bhb_loop+0x50/0xa0 [ 123.321219][ T2963] ? clear_bhb_loop+0x50/0xa0 [ 123.325912][ T2963] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.331825][ T2963] RIP: 0033:0x7ff1ff08568e [ 123.336252][ T2963] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 123.355885][ T2963] RSP: 002b:00007ff1fdafdfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 123.364312][ T2963] RAX: ffffffffffffffda RBX: 00007ff1fdafe6c0 RCX: 00007ff1ff08568e [ 123.372298][ T2963] RDX: 000000000000000f RSI: 00007ff1fdafe0a0 RDI: 0000000000000005 [ 123.380283][ T2963] RBP: 00007ff1fdafe090 R08: 0000000000000000 R09: 0000000000000000 [ 123.388275][ T2963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.396263][ T2963] R13: 00007ff1ff33e128 R14: 00007ff1ff33e090 R15: 00007ffc265838c8 [ 123.404255][ T2963] [ 123.700677][ T2991] ref_ctr_offset mismatch. inode: 0x21b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 131.210864][ T3149] device pim6reg1 entered promiscuous mode [ 131.327708][ T3167] device sit0 entered promiscuous mode [ 134.003622][ T3178] tap0: tun_chr_ioctl cmd 1074025677 [ 134.039329][ T3178] tap0: linktype set to 270 [ 135.307904][ T3193] device syzkaller0 entered promiscuous mode [ 135.642251][ T30] audit: type=1400 audit(1778976646.840:149): avc: denied { create } for pid=3213 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 136.990737][ T3257] device wg2 entered promiscuous mode [ 137.489499][ T3260] device syzkaller0 entered promiscuous mode [ 138.376389][ T3275] device sit0 left promiscuous mode [ 139.613812][ T3311] device syzkaller0 entered promiscuous mode [ 142.090635][ T3402] device syzkaller0 entered promiscuous mode [ 142.281943][ T3409] device syzkaller0 entered promiscuous mode [ 142.294727][ T30] audit: type=1400 audit(1778976653.490:150): avc: denied { append } for pid=3413 comm="syz.3.909" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.380268][ T3412] @ÿ: renamed from bond_slave_0 [ 143.334679][ T3446] device syzkaller0 entered promiscuous mode [ 143.355966][ T3451] device syzkaller0 entered promiscuous mode [ 144.075980][ T30] audit: type=1400 audit(1778976655.270:151): avc: denied { create } for pid=3494 comm="syz.2.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 144.115805][ T3495] device dummy0 entered promiscuous mode [ 145.176690][ T3548] bpf setsockopt: ignoring program buffer with optlen=64716 (max_optlen=4096) [ 145.762537][ T3560] device syzkaller0 entered promiscuous mode [ 145.778969][ T3573] tun0: tun_chr_ioctl cmd 1074812118 [ 146.576669][ T3594] device syzkaller0 entered promiscuous mode [ 146.608109][ T306] syzkaller0: tun_net_xmit 48 [ 146.618150][ T3594] syzkaller0: create flow: hash 3740048565 index 0 [ 146.721872][ T3594] syzkaller0 (unregistered): delete flow: hash 3740048565 index 0 [ 146.796599][ T3609] device syzkaller0 entered promiscuous mode [ 146.916401][ T3606] device syzkaller0 entered promiscuous mode [ 148.210767][ T3647] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 149.339718][ T3673] device syzkaller0 left promiscuous mode [ 152.572248][ T3779] device veth1_macvtap left promiscuous mode [ 152.600187][ T30] audit: type=1400 audit(1778976663.800:152): avc: denied { setattr } for pid=3783 comm="syz.0.1025" path="pipe:[16722]" dev="pipefs" ino=16722 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 152.648993][ T30] audit: type=1400 audit(1778976663.800:153): avc: denied { ioctl } for pid=3783 comm="syz.0.1025" path="pid:[4026532458]" dev="nsfs" ino=4026532458 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 152.888206][ T3793] device sit0 entered promiscuous mode [ 153.288575][ T3814] pim6reg: tun_chr_ioctl cmd 1074025692 [ 153.620817][ T3813] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.657941][ T3813] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.718452][ T3813] device bridge_slave_0 entered promiscuous mode [ 154.167506][ T3813] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.176924][ T3813] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.203260][ T3813] device bridge_slave_1 entered promiscuous mode [ 154.857037][ T3851] @ÿ: renamed from bond_slave_0 [ 154.929390][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.939873][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.968055][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.982881][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.011033][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.018154][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.026393][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.034961][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.043727][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.050820][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.159291][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.171002][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.179326][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.215229][ T307] device macsec0 left promiscuous mode [ 155.221408][ T307] nr0: port 1(macsec0) entered disabled state [ 155.241297][ T307] device bridge_slave_1 left promiscuous mode [ 155.257373][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.273557][ T307] device bridge_slave_0 left promiscuous mode [ 155.282703][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.294191][ T307] device veth1_macvtap left promiscuous mode [ 155.300358][ T307] device veth0_vlan left promiscuous mode [ 155.434983][ T3858] device sit0 entered promiscuous mode [ 155.773305][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.782256][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.796594][ T3813] device veth0_vlan entered promiscuous mode [ 155.842444][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.850607][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.866070][ T3813] device veth1_macvtap entered promiscuous mode [ 155.919497][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.928004][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.935656][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.944156][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.952747][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.961235][ T3890] device veth1_macvtap left promiscuous mode [ 156.010448][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.019687][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.029034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.038441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.257478][ T3915] device syzkaller0 entered promiscuous mode [ 159.104432][ T4012] device sit0 left promiscuous mode [ 159.926154][ T4024] device syzkaller0 entered promiscuous mode [ 159.981631][ T4025] device syzkaller0 entered promiscuous mode [ 160.960577][ T4068] device sit0 left promiscuous mode [ 161.255786][ T4075] device syzkaller0 entered promiscuous mode [ 161.898052][ T4095] tap0: tun_chr_ioctl cmd 1074025677 [ 161.921215][ T4095] tap0: linktype set to 805 [ 161.944945][ T4095] tap0: tun_chr_ioctl cmd 2147767517 [ 162.724617][ T4121] device syzkaller0 entered promiscuous mode [ 164.829531][ T30] audit: type=1400 audit(1778976676.030:154): avc: denied { create } for pid=4173 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 166.149525][ T4209] device syzkaller0 entered promiscuous mode [ 167.178380][ T4235] device syzkaller0 entered promiscuous mode [ 167.378767][ T4253] device syzkaller0 entered promiscuous mode [ 168.792144][ T4284] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.800208][ T4284] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.363956][ T4311] device syzkaller0 entered promiscuous mode [ 170.317028][ T4339] device dummy0 entered promiscuous mode [ 170.934288][ T4359] device syzkaller0 entered promiscuous mode [ 171.361024][ T4402] device syzkaller0 entered promiscuous mode [ 172.715103][ T4462] device syzkaller0 left promiscuous mode [ 173.049316][ T4452] device syzkaller0 entered promiscuous mode [ 173.501088][ T4493] device syzkaller0 entered promiscuous mode [ 173.724041][ T30] audit: type=1400 audit(1778976684.920:155): avc: denied { create } for pid=4504 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 177.011720][ T4535] device syzkaller0 entered promiscuous mode [ 177.684583][ T4574] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.692272][ T4574] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.179550][ T4590] device syzkaller0 entered promiscuous mode [ 179.418528][ T4597] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.468729][ T4597] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.518530][ T4597] device bridge_slave_0 entered promiscuous mode [ 179.551153][ T4615] device wg2 left promiscuous mode [ 179.595789][ T4597] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.613134][ T4597] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.659303][ T4597] device bridge_slave_1 entered promiscuous mode [ 179.710217][ T4615] device wg2 entered promiscuous mode [ 180.174565][ T4597] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.181690][ T4597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.189042][ T4597] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.196099][ T4597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.771386][ T1405] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.782209][ T1405] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.847621][ T4644] device syzkaller0 entered promiscuous mode [ 180.921388][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.939545][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.018491][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.079427][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.158827][ T1405] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.165927][ T1405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.398825][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.417538][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.432391][ T1405] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.439523][ T1405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.534876][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.544099][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.601742][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.632441][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.640900][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.649528][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.161212][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.194606][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.252709][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.283912][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.313541][ T4597] device veth0_vlan entered promiscuous mode [ 184.335122][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.369141][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.390909][ T4597] device veth1_macvtap entered promiscuous mode [ 184.431192][ T4685] device syzkaller0 entered promiscuous mode [ 184.459878][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.469927][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.488119][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.505468][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.522982][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.085857][ T30] audit: type=1400 audit(1778976696.280:156): avc: denied { create } for pid=4693 comm="syz.5.1272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 186.280833][ T4731] device syzkaller0 entered promiscuous mode [ 187.818307][ T4758] device syzkaller0 entered promiscuous mode [ 188.129047][ T4791] device pim6reg1 entered promiscuous mode [ 189.206938][ T4812] device sit0 entered promiscuous mode [ 189.689441][ T4859] device syzkaller0 entered promiscuous mode [ 190.697705][ T4895] device veth1_macvtap entered promiscuous mode [ 190.734515][ T4895] device macsec0 entered promiscuous mode [ 190.806841][ T4891] device veth1_macvtap left promiscuous mode [ 190.828965][ T4891] device macsec0 left promiscuous mode [ 198.508924][ T5128] device sit0 left promiscuous mode [ 199.035079][ T307] device bridge_slave_1 left promiscuous mode [ 199.044551][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.073883][ T307] device bridge_slave_0 left promiscuous mode [ 199.127296][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.200378][ T307] device veth1_macvtap left promiscuous mode [ 199.287061][ T307] device veth0_vlan left promiscuous mode [ 201.007015][ T5188] device syzkaller0 entered promiscuous mode [ 201.668101][ T5223] tap0: tun_chr_ioctl cmd 1074025677 [ 201.674628][ T5223] tap0: linktype set to 823 [ 201.682135][ T5225] device syzkaller0 left promiscuous mode [ 202.682455][ T5254] device syzkaller0 entered promiscuous mode [ 204.419038][ T5297] device syzkaller0 entered promiscuous mode [ 204.505054][ T5312] device syzkaller0 entered promiscuous mode [ 204.601578][ T5315] device syzkaller0 entered promiscuous mode [ 204.926073][ T5350] device syzkaller0 entered promiscuous mode [ 205.424951][ T5388] device wg2 entered promiscuous mode [ 207.008929][ T5399] bridge0: port 3(vlan1) entered blocking state [ 207.015293][ T5399] bridge0: port 3(vlan1) entered disabled state [ 207.028052][ T5399] device vlan1 entered promiscuous mode [ 207.046688][ T5399] bridge0: port 3(vlan1) entered blocking state [ 207.053052][ T5399] bridge0: port 3(vlan1) entered forwarding state [ 207.143237][ T5406] device syzkaller0 entered promiscuous mode [ 207.805343][ T5438] device team_slave_1 entered promiscuous mode [ 207.824432][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.843475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.891203][ T5440] bridge0: port 3(vlan1) entered disabled state [ 208.018108][ T5440] bridge0: port 3(vlan1) entered blocking state [ 208.024710][ T5440] bridge0: port 3(vlan1) entered forwarding state [ 208.166309][ T5455] device syzkaller0 entered promiscuous mode [ 209.674776][ T5498] device syzkaller0 entered promiscuous mode [ 209.708507][ T5500] device syzkaller0 left promiscuous mode [ 211.187235][ T30] audit: type=1400 audit(1778976722.380:157): avc: denied { create } for pid=5543 comm="syz.5.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 211.243803][ T5542] tap0: tun_chr_ioctl cmd 1074025677 [ 211.301725][ T5542] tap0: linktype set to 768 [ 211.504692][ T5558] syz.0.1575[5558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.504794][ T5558] syz.0.1575[5558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.844375][ T5578] device sit0 entered promiscuous mode [ 212.527505][ T5594] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 213.669191][ T5643] device veth0_vlan left promiscuous mode [ 213.699141][ T5643] device veth0_vlan entered promiscuous mode [ 213.706274][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.728141][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.746260][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.250571][ T5663] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.257673][ T5663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.265022][ T5663] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.272105][ T5663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.395719][ T5663] device bridge0 entered promiscuous mode [ 214.506632][ T5671] device syzkaller0 entered promiscuous mode [ 214.591499][ T5681] device syzkaller0 entered promiscuous mode [ 214.599130][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.277444][ T30] audit: type=1400 audit(1778976726.470:158): avc: denied { create } for pid=5723 comm="syz.3.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 215.367355][ T5728] tap0: tun_chr_ioctl cmd 1074025677 [ 215.390647][ T5728] tap0: linktype set to 0 [ 215.447098][ T5726] device wg2 entered promiscuous mode [ 217.247223][ T5840] device syzkaller0 entered promiscuous mode [ 218.191287][ T5872] device syzkaller0 entered promiscuous mode [ 218.666461][ T5903] device syzkaller0 entered promiscuous mode [ 219.828468][ T5923] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.837316][ T5923] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.137548][ T5951] bridge0: port 4(ip6gretap0) entered blocking state [ 220.218730][ T5951] bridge0: port 4(ip6gretap0) entered disabled state [ 220.247450][ T5951] device ip6gretap0 entered promiscuous mode [ 220.277731][ T5951] bridge0: port 4(ip6gretap0) entered blocking state [ 220.284531][ T5951] bridge0: port 4(ip6gretap0) entered forwarding state [ 222.025311][ T6004] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 222.077899][ T6004] device syzkaller0 entered promiscuous mode [ 222.158552][ T6019] device sit0 entered promiscuous mode [ 222.491185][ T6034] device sit0 entered promiscuous mode [ 223.337404][ T6052] device sit0 left promiscuous mode [ 223.477299][ T6054] device sit0 entered promiscuous mode [ 223.585433][ T6067] device syzkaller0 entered promiscuous mode [ 223.702238][ T6074] device syzkaller0 entered promiscuous mode [ 223.740088][ T6077] device syzkaller0 left promiscuous mode [ 223.763764][ T6074] device syzkaller0 entered promiscuous mode [ 224.394591][ T6124] device syzkaller0 entered promiscuous mode [ 224.871478][ T6160] device syzkaller0 entered promiscuous mode [ 225.038002][ T6163] device wg2 left promiscuous mode [ 225.144462][ T6163] device wg2 entered promiscuous mode [ 225.317035][ T6171] device syzkaller0 entered promiscuous mode [ 225.373581][ T6174] device syzkaller0 entered promiscuous mode [ 225.841825][ T30] audit: type=1400 audit(1778976737.040:159): avc: denied { create } for pid=6193 comm="syz.5.1752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 226.056529][ T6199] device syzkaller0 entered promiscuous mode [ 226.281306][ T6219] device syzkaller0 entered promiscuous mode [ 227.393532][ T6257] device syzkaller0 entered promiscuous mode [ 227.754970][ T6272] device sit0 left promiscuous mode [ 228.554841][ T6302] ref_ctr_offset mismatch. inode: 0x763 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 229.492633][ T6324] FAULT_INJECTION: forcing a failure. [ 229.492633][ T6324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.519141][ T6324] CPU: 0 PID: 6324 Comm: syz.0.1788 Tainted: G W syzkaller #0 [ 229.528058][ T6324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 229.538148][ T6324] Call Trace: [ 229.541468][ T6324] [ 229.544419][ T6324] __dump_stack+0x21/0x30 [ 229.548805][ T6324] dump_stack_lvl+0x110/0x170 [ 229.553558][ T6324] ? show_regs_print_info+0x20/0x20 [ 229.558792][ T6324] dump_stack+0x15/0x20 [ 229.562976][ T6324] should_fail+0x3c1/0x510 [ 229.567435][ T6324] should_fail_usercopy+0x1a/0x20 [ 229.572492][ T6324] _copy_from_user+0x20/0xd0 [ 229.577110][ T6324] bpf_test_init+0x13d/0x1c0 [ 229.581732][ T6324] bpf_prog_test_run_skb+0x193/0x1150 [ 229.587137][ T6324] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 229.593323][ T6324] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 229.599233][ T6324] bpf_prog_test_run+0x3d5/0x630 [ 229.604304][ T6324] ? __sys_bpf+0x31/0x7d0 [ 229.608668][ T6324] ? bpf_prog_query+0x230/0x230 [ 229.613553][ T6324] ? selinux_bpf+0xce/0xf0 [ 229.617992][ T6324] ? security_bpf+0x82/0xa0 [ 229.622515][ T6324] __sys_bpf+0x590/0x7d0 [ 229.626787][ T6324] ? bpf_link_show_fdinfo+0x330/0x330 [ 229.632181][ T6324] __x64_sys_bpf+0x7c/0x90 [ 229.636615][ T6324] x64_sys_call+0x4b9/0x9a0 [ 229.641135][ T6324] do_syscall_64+0x4c/0xa0 [ 229.645570][ T6324] ? clear_bhb_loop+0x50/0xa0 [ 229.650262][ T6324] ? clear_bhb_loop+0x50/0xa0 [ 229.654953][ T6324] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.660861][ T6324] RIP: 0033:0x7fc82ca8be59 [ 229.665292][ T6324] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 229.684914][ T6324] RSP: 002b:00007fc82b4e6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.693345][ T6324] RAX: ffffffffffffffda RBX: 00007fc82cd04fa0 RCX: 00007fc82ca8be59 [ 229.701332][ T6324] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 229.709329][ T6324] RBP: 00007fc82b4e6090 R08: 0000000000000000 R09: 0000000000000000 [ 229.717316][ T6324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.725297][ T6324] R13: 00007fc82cd05038 R14: 00007fc82cd04fa0 R15: 00007ffe35555a78 [ 229.733284][ T6324] [ 229.898292][ T30] audit: type=1400 audit(1778976741.090:160): avc: denied { attach_queue } for pid=6325 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 230.410528][ T6353] device syzkaller0 entered promiscuous mode [ 230.924639][ T6382] FAULT_INJECTION: forcing a failure. [ 230.924639][ T6382] name failslab, interval 1, probability 0, space 0, times 1 [ 230.946568][ T6382] CPU: 1 PID: 6382 Comm: syz.3.1806 Tainted: G W syzkaller #0 [ 230.955397][ T6382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 230.965482][ T6382] Call Trace: [ 230.968792][ T6382] [ 230.971745][ T6382] __dump_stack+0x21/0x30 [ 230.976122][ T6382] dump_stack_lvl+0x110/0x170 [ 230.980834][ T6382] ? show_regs_print_info+0x20/0x20 [ 230.986074][ T6382] ? should_fail+0x331/0x510 [ 230.990695][ T6382] dump_stack+0x15/0x20 [ 230.994899][ T6382] should_fail+0x3c1/0x510 [ 230.999351][ T6382] __should_failslab+0xa4/0xe0 [ 231.004150][ T6382] should_failslab+0x9/0x20 [ 231.008684][ T6382] slab_pre_alloc_hook+0x3b/0xe0 [ 231.013652][ T6382] __kmalloc+0x6d/0x2c0 [ 231.017838][ T6382] ? sk_prot_alloc+0xed/0x320 [ 231.022558][ T6382] sk_prot_alloc+0xed/0x320 [ 231.027102][ T6382] sk_alloc+0x38/0x430 [ 231.031204][ T6382] bpf_prog_test_run_skb+0x24b/0x1150 [ 231.036619][ T6382] ? __kasan_check_write+0x14/0x20 [ 231.041764][ T6382] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 231.047686][ T6382] bpf_prog_test_run+0x3d5/0x630 [ 231.052661][ T6382] ? bpf_prog_query+0x230/0x230 [ 231.057544][ T6382] ? selinux_bpf+0xce/0xf0 [ 231.061993][ T6382] ? security_bpf+0x82/0xa0 [ 231.066524][ T6382] __sys_bpf+0x590/0x7d0 [ 231.070792][ T6382] ? bpf_link_show_fdinfo+0x330/0x330 [ 231.076198][ T6382] ? debug_smp_processor_id+0x17/0x20 [ 231.081593][ T6382] __x64_sys_bpf+0x7c/0x90 [ 231.086034][ T6382] x64_sys_call+0x4b9/0x9a0 [ 231.090558][ T6382] do_syscall_64+0x4c/0xa0 [ 231.095001][ T6382] ? clear_bhb_loop+0x50/0xa0 [ 231.099693][ T6382] ? clear_bhb_loop+0x50/0xa0 [ 231.104398][ T6382] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.110325][ T6382] RIP: 0033:0x7fb88b317e59 [ 231.114775][ T6382] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 231.134406][ T6382] RSP: 002b:00007fb889d72028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.142848][ T6382] RAX: ffffffffffffffda RBX: 00007fb88b590fa0 RCX: 00007fb88b317e59 [ 231.150847][ T6382] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 231.158847][ T6382] RBP: 00007fb889d72090 R08: 0000000000000000 R09: 0000000000000000 [ 231.166849][ T6382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.174843][ T6382] R13: 00007fb88b591038 R14: 00007fb88b590fa0 R15: 00007ffe2e372ed8 [ 231.182858][ T6382] [ 231.755078][ T6396] device syzkaller0 entered promiscuous mode [ 231.818509][ T6413] device bridge_slave_1 left promiscuous mode [ 231.828896][ T6413] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.842415][ T6413] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.003416][ T6434] FAULT_INJECTION: forcing a failure. [ 232.003416][ T6434] name failslab, interval 1, probability 0, space 0, times 0 [ 232.031360][ T6434] CPU: 1 PID: 6434 Comm: syz.0.1821 Tainted: G W syzkaller #0 [ 232.040202][ T6434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 232.050287][ T6434] Call Trace: [ 232.053593][ T6434] [ 232.056549][ T6434] __dump_stack+0x21/0x30 [ 232.060912][ T6434] dump_stack_lvl+0x110/0x170 [ 232.065621][ T6434] ? show_regs_print_info+0x20/0x20 [ 232.070869][ T6434] dump_stack+0x15/0x20 [ 232.075068][ T6434] should_fail+0x3c1/0x510 [ 232.079531][ T6434] __should_failslab+0xa4/0xe0 [ 232.084331][ T6434] should_failslab+0x9/0x20 [ 232.088866][ T6434] slab_pre_alloc_hook+0x3b/0xe0 [ 232.093842][ T6434] kmem_cache_alloc_trace+0x48/0x270 [ 232.099160][ T6434] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 232.104941][ T6434] selinux_sk_alloc_security+0x7e/0x1a0 [ 232.110518][ T6434] security_sk_alloc+0x72/0xa0 [ 232.115309][ T6434] sk_prot_alloc+0x108/0x320 [ 232.119926][ T6434] sk_alloc+0x38/0x430 [ 232.124022][ T6434] bpf_prog_test_run_skb+0x24b/0x1150 [ 232.129421][ T6434] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 232.135595][ T6434] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 232.141516][ T6434] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 232.147431][ T6434] bpf_prog_test_run+0x3d5/0x630 [ 232.152395][ T6434] ? bpf_prog_query+0x230/0x230 [ 232.157276][ T6434] ? __sys_bpf+0x2df/0x7d0 [ 232.161718][ T6434] __sys_bpf+0x590/0x7d0 [ 232.165989][ T6434] ? bpf_link_show_fdinfo+0x330/0x330 [ 232.171390][ T6434] __x64_sys_bpf+0x7c/0x90 [ 232.175834][ T6434] x64_sys_call+0x4b9/0x9a0 [ 232.180394][ T6434] do_syscall_64+0x4c/0xa0 [ 232.184838][ T6434] ? clear_bhb_loop+0x50/0xa0 [ 232.189535][ T6434] ? clear_bhb_loop+0x50/0xa0 [ 232.194224][ T6434] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 232.200143][ T6434] RIP: 0033:0x7fc82ca8be59 [ 232.204589][ T6434] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 232.224480][ T6434] RSP: 002b:00007fc82b4e6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 232.232928][ T6434] RAX: ffffffffffffffda RBX: 00007fc82cd04fa0 RCX: 00007fc82ca8be59 [ 232.240929][ T6434] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 232.248931][ T6434] RBP: 00007fc82b4e6090 R08: 0000000000000000 R09: 0000000000000000 [ 232.257368][ T6434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 232.265363][ T6434] R13: 00007fc82cd05038 R14: 00007fc82cd04fa0 R15: 00007ffe35555a78 [ 232.273368][ T6434] [ 232.757499][ T6463] tap0: tun_chr_ioctl cmd 2147767520 [ 233.335319][ T30] audit: type=1400 audit(1778976744.530:161): avc: denied { create } for pid=6491 comm="syz.5.1839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 233.349521][ T6493] nr0: port 1(macsec0) entered blocking state [ 233.371788][ T6493] nr0: port 1(macsec0) entered disabled state [ 233.392349][ T6493] device macsec0 entered promiscuous mode [ 233.883993][ T6523] device wg2 left promiscuous mode [ 233.950133][ T6523] device wg2 entered promiscuous mode [ 235.636325][ T6560] device veth0_vlan left promiscuous mode [ 235.653759][ T6560] device veth0_vlan entered promiscuous mode [ 235.706233][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.722906][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.753161][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.796342][ T6570] device syzkaller0 entered promiscuous mode [ 235.878335][ T6588] device syzkaller0 entered promiscuous mode [ 235.970365][ T6592] device syzkaller0 entered promiscuous mode [ 237.306456][ T30] audit: type=1400 audit(1778976748.500:162): avc: denied { create } for pid=6691 comm="syz.5.1892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 237.971685][ T6711] device sit0 left promiscuous mode [ 238.368793][ T6730] device sit0 entered promiscuous mode [ 241.152159][ T6846] device veth1_macvtap entered promiscuous mode [ 241.159112][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.459397][ T6887] device syzkaller0 entered promiscuous mode [ 243.047214][ T6907] device veth0_vlan left promiscuous mode [ 243.066948][ T6907] device veth0_vlan entered promiscuous mode [ 243.282858][ T6927] device bridge_slave_1 left promiscuous mode [ 243.301446][ T6927] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.317619][ T6927] device bridge_slave_0 left promiscuous mode [ 243.330192][ T6927] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.802023][ T6952] device sit0 left promiscuous mode [ 244.614008][ T6980] device syzkaller0 entered promiscuous mode [ 245.769169][ T7002] device syzkaller0 entered promiscuous mode [ 246.423111][ T7024] device syzkaller0 entered promiscuous mode [ 246.501715][ T7024] FAULT_INJECTION: forcing a failure. [ 246.501715][ T7024] name failslab, interval 1, probability 0, space 0, times 0 [ 246.515056][ T7029] device sit0 left promiscuous mode [ 246.596103][ T7024] CPU: 1 PID: 7024 Comm: syz.1.1998 Tainted: G W syzkaller #0 [ 246.604943][ T7024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 246.615033][ T7024] Call Trace: [ 246.618410][ T7024] [ 246.621365][ T7024] __dump_stack+0x21/0x30 [ 246.625883][ T7024] dump_stack_lvl+0x110/0x170 [ 246.630596][ T7024] ? show_regs_print_info+0x20/0x20 [ 246.635830][ T7024] ? __bpf_trace_bpf_trace_printk+0x30/0x30 [ 246.641857][ T7024] dump_stack+0x15/0x20 [ 246.646150][ T7024] should_fail+0x3c1/0x510 [ 246.650676][ T7024] ? alloc_skb_with_frags+0xa8/0x620 [ 246.656072][ T7024] __should_failslab+0xa4/0xe0 [ 246.660940][ T7024] should_failslab+0x9/0x20 [ 246.665523][ T7024] slab_pre_alloc_hook+0x3b/0xe0 [ 246.670494][ T7024] ? alloc_skb_with_frags+0xa8/0x620 [ 246.675816][ T7024] ? alloc_skb_with_frags+0xa8/0x620 [ 246.681137][ T7024] __kmalloc_track_caller+0x6c/0x2c0 [ 246.686738][ T7024] ? alloc_skb_with_frags+0xa8/0x620 [ 246.692102][ T7024] ? alloc_skb_with_frags+0xa8/0x620 [ 246.697416][ T7024] __alloc_skb+0x21a/0x740 [ 246.701870][ T7024] alloc_skb_with_frags+0xa8/0x620 [ 246.707031][ T7024] sock_alloc_send_pskb+0x87f/0x9a0 [ 246.712268][ T7024] ? sock_kzfree_s+0x60/0x60 [ 246.716903][ T7024] ? iov_iter_advance+0x1f9/0x360 [ 246.721984][ T7024] tun_get_user+0xb41/0x3400 [ 246.726688][ T7024] ? kmem_cache_free+0xd0/0x320 [ 246.731582][ T7024] ? putname+0x111/0x160 [ 246.735915][ T7024] ? do_syscall_64+0x4c/0xa0 [ 246.740584][ T7024] ? tun_do_read+0x1d30/0x1d30 [ 246.745385][ T7024] ? kstrtouint_from_user+0x1c4/0x220 [ 246.751171][ T7024] ? kstrtol_from_user+0x2a0/0x2a0 [ 246.756317][ T7024] ? avc_policy_seqno+0x1b/0x70 [ 246.761272][ T7024] ? selinux_file_permission+0x2aa/0x510 [ 246.766984][ T7024] tun_chr_write_iter+0x1eb/0x2e0 [ 246.772045][ T7024] vfs_write+0x835/0xfd0 [ 246.776375][ T7024] ? file_end_write+0x1b0/0x1b0 [ 246.781256][ T7024] ? __fget_files+0x2c4/0x320 [ 246.785991][ T7024] ? __fdget_pos+0x1f7/0x380 [ 246.790612][ T7024] ? ksys_write+0x71/0x250 [ 246.795321][ T7024] ksys_write+0x149/0x250 [ 246.799684][ T7024] ? __ia32_sys_read+0x90/0x90 [ 246.804487][ T7024] ? debug_smp_processor_id+0x17/0x20 [ 246.809900][ T7024] __x64_sys_write+0x7b/0x90 [ 246.814526][ T7024] x64_sys_call+0x8ef/0x9a0 [ 246.819146][ T7024] do_syscall_64+0x4c/0xa0 [ 246.823605][ T7024] ? clear_bhb_loop+0x50/0xa0 [ 246.828403][ T7024] ? clear_bhb_loop+0x50/0xa0 [ 246.833118][ T7024] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.839116][ T7024] RIP: 0033:0x7f411e8d8e59 [ 246.843718][ T7024] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 246.863356][ T7024] RSP: 002b:00007f411d333028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 246.871882][ T7024] RAX: ffffffffffffffda RBX: 00007f411eb51fa0 RCX: 00007f411e8d8e59 [ 246.879891][ T7024] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000006 [ 246.887891][ T7024] RBP: 00007f411d333090 R08: 0000000000000000 R09: 0000000000000000 [ 246.895973][ T7024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.903978][ T7024] R13: 00007f411eb52038 R14: 00007f411eb51fa0 R15: 00007ffd9efd37e8 [ 246.911989][ T7024] [ 246.987176][ T7036] device syzkaller0 entered promiscuous mode [ 247.741944][ T7083] device syzkaller0 entered promiscuous mode [ 248.932868][ T7109] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 249.178694][ T7131] device syzkaller0 entered promiscuous mode [ 249.289124][ T7131] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 250.819937][ T7185] device syzkaller0 entered promiscuous mode [ 251.100759][ T7196] device syzkaller0 entered promiscuous mode [ 252.139723][ T30] audit: type=1400 audit(1778976763.340:163): avc: denied { mounton } for pid=7238 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 252.541984][ T7238] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.668747][ T7238] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.687176][ T7238] device bridge_slave_0 entered promiscuous mode [ 252.735352][ T7238] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.776908][ T7238] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.817187][ T7238] device bridge_slave_1 entered promiscuous mode [ 253.048688][ T7251] device syzkaller0 entered promiscuous mode [ 253.505181][ T7255] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.529422][ T7255] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.537532][ T7255] device bridge_slave_0 entered promiscuous mode [ 253.674160][ T7255] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.698968][ T7255] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.720340][ T7255] device bridge_slave_1 entered promiscuous mode [ 253.759862][ T45] GPL: port 1(erspan0) entered disabled state [ 253.789617][ T45] device erspan0 left promiscuous mode [ 253.795132][ T45] GPL: port 1(erspan0) entered disabled state [ 253.934847][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.952766][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.038900][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.098895][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.118782][ T1405] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.125884][ T1405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.188817][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.199151][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.218833][ T1405] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.225913][ T1405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.233635][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.293087][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.311386][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.346563][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.377183][ T7238] device veth0_vlan entered promiscuous mode [ 254.410632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.419440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.439403][ T45] device veth0_vlan left promiscuous mode [ 254.848790][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.856379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.889459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.900904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.971264][ T7238] device veth1_macvtap entered promiscuous mode [ 255.001638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.019743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.028367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.046587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.065228][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.093304][ T30] audit: type=1400 audit(1778976766.290:164): avc: denied { unmount } for pid=7238 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 255.133300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.143675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.166993][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.197250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.294798][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.301928][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.415930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.424855][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.457686][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.499024][ T1405] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.506137][ T1405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.569238][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.586029][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.619189][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.645030][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.668067][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.689716][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.720441][ T7255] device veth0_vlan entered promiscuous mode [ 256.741983][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.754964][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.772826][ T7316] pim6reg: tun_chr_ioctl cmd 2147767517 [ 256.787859][ T7331] device syzkaller0 entered promiscuous mode [ 256.975424][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.000671][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.026989][ T7255] device veth1_macvtap entered promiscuous mode [ 257.101766][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.116451][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.172888][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.210436][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.237614][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.256695][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.275553][ T7309] cgroup: fork rejected by pids controller in /syz5 [ 257.289092][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.370238][ T7375] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 257.376312][ T7375] syzkaller0: linktype set to 513 [ 257.409397][ T7360] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 257.702041][ T7382] device syzkaller0 entered promiscuous mode [ 257.819135][ T7390] device syzkaller0 entered promiscuous mode [ 257.897749][ T7399] device syzkaller0 entered promiscuous mode [ 258.174991][ T7392] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.287876][ T7392] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.326074][ T7392] device bridge_slave_0 entered promiscuous mode [ 258.411684][ T7414] žÿ: renamed from team_slave_1 [ 258.454260][ T7420] device syzkaller0 entered promiscuous mode [ 258.471821][ T7392] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.482312][ T7392] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.500439][ T7392] device bridge_slave_1 entered promiscuous mode [ 258.853459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.867831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.897682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.914968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.933196][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.940409][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.964345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.983368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.000555][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.007672][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.045777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.061944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.108412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.185585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.257545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.321182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.392926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.450321][ T7392] device veth0_vlan entered promiscuous mode [ 259.484866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.540773][ T7392] device veth1_macvtap entered promiscuous mode [ 259.597740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.664287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.715592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.768940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.877501][ T7461] device macsec0 left promiscuous mode [ 259.893293][ T7461] nr0: port 1(macsec0) entered disabled state [ 260.019788][ T7473] device syzkaller0 entered promiscuous mode [ 260.099486][ T45] device bridge_slave_1 left promiscuous mode [ 260.174102][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.228481][ T45] device bridge_slave_0 left promiscuous mode [ 260.248781][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.257640][ T45] device veth1_macvtap left promiscuous mode [ 260.263784][ T45] device veth0_vlan left promiscuous mode [ 260.503617][ T7486] device syzkaller0 entered promiscuous mode [ 260.829233][ T7484] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.836726][ T7484] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.889222][ T7484] device bridge_slave_0 entered promiscuous mode [ 260.989468][ T7484] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.028731][ T7484] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.046862][ T7484] device bridge_slave_1 entered promiscuous mode [ 261.733403][ T7484] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.740552][ T7484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.747885][ T7484] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.754979][ T7484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.807752][ T1405] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.830976][ T1405] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.957778][ T7538] device syzkaller0 entered promiscuous mode [ 261.981735][ T7534] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.990324][ T7534] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.076911][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.092559][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.132467][ T7541] device bridge_slave_1 left promiscuous mode [ 262.275829][ T7541] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.439400][ T7541] device bridge_slave_0 left promiscuous mode [ 262.445602][ T7541] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.673218][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.699145][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.752539][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.759664][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.072644][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.111055][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.129698][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.136798][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.224038][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.239046][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.306772][ T7575] device syzkaller0 entered promiscuous mode [ 263.332422][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.356063][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.416416][ T7580] bridge0: port 4(ip6gretap0) entered disabled state [ 263.425484][ T7580] bridge0: port 3(vlan1) entered disabled state [ 263.433176][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.444726][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.534382][ T45] device bridge_slave_1 left promiscuous mode [ 263.541762][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.601896][ T45] device bridge_slave_0 left promiscuous mode [ 263.643968][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.700848][ T45] device veth1_macvtap left promiscuous mode [ 263.742088][ T45] device veth0_vlan left promiscuous mode [ 265.612160][ T7582] device ip6gretap0 left promiscuous mode [ 265.619957][ T7582] bridge0: port 4(ip6gretap0) entered disabled state [ 265.631421][ T7582] device vlan1 left promiscuous mode [ 265.641751][ T7582] bridge0: port 3(vlan1) entered disabled state [ 265.652081][ T7582] device bridge_slave_1 left promiscuous mode [ 265.663278][ T7582] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.676275][ T7582] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.730748][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.749230][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.765783][ T7484] device veth0_vlan entered promiscuous mode [ 265.778986][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.797274][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.850550][ T7484] device veth1_macvtap entered promiscuous mode [ 265.866554][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.876672][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.885314][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.895618][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.909214][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.938019][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.956959][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.977350][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.999274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.652582][ T7625] device lo entered promiscuous mode [ 267.017637][ T45] device bridge_slave_1 left promiscuous mode [ 267.029035][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.046931][ T45] device bridge_slave_0 left promiscuous mode [ 267.059015][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.079878][ T45] device veth1_macvtap left promiscuous mode [ 267.085952][ T45] device veth0_vlan left promiscuous mode [ 267.652752][ T7641] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.758710][ T7641] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.766381][ T7641] device bridge_slave_0 entered promiscuous mode [ 267.778944][ T7641] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.787251][ T7641] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.829271][ T7641] device bridge_slave_1 entered promiscuous mode [ 268.408007][ T7697] device syzkaller0 entered promiscuous mode [ 268.665294][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.679003][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.702146][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.727094][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.754013][ T1405] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.761439][ T1405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.799352][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.840431][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.866433][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.989029][ T1405] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.996163][ T1405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.085997][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.108957][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.228364][ T30] audit: type=1400 audit(1778976780.390:165): avc: denied { create } for pid=7718 comm="syz.0.2193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 269.253997][ T7713] device syzkaller0 entered promiscuous mode [ 269.370023][ T7716] device lo left promiscuous mode [ 269.376359][ T7720] device lo entered promiscuous mode [ 269.417020][ T7641] device veth0_vlan entered promiscuous mode [ 269.719509][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.731023][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.745497][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.773740][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.796564][ T7641] device veth1_macvtap entered promiscuous mode [ 269.818697][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.847425][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.862003][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.876067][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.888923][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.992078][ T7746] device sit0 entered promiscuous mode [ 270.040102][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.056591][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.084185][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.123203][ T4666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.401973][ T7790] device syzkaller0 entered promiscuous mode [ 271.468892][ T7793] device syzkaller0 entered promiscuous mode [ 272.027359][ T7806] device sit0 left promiscuous mode [ 272.163779][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.171182][ T7784] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.179142][ T7784] device bridge_slave_0 entered promiscuous mode [ 272.192663][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.208727][ T7784] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.218583][ T7784] device bridge_slave_1 entered promiscuous mode [ 272.234338][ T7809] device sit0 entered promiscuous mode [ 273.157904][ T7829] device syzkaller0 entered promiscuous mode [ 273.458777][ T45] device bridge_slave_1 left promiscuous mode [ 273.464997][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.498707][ T45] device bridge_slave_0 left promiscuous mode [ 273.518818][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.533850][ T45] device veth1_macvtap left promiscuous mode [ 273.540239][ T45] device veth0_vlan left promiscuous mode [ 274.014070][ T7832] syz.0.2222 (7832) used greatest stack depth: 20096 bytes left [ 274.077094][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.089033][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.111091][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.129036][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.147576][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.154723][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.172743][ T7815] syz.1.2218 (7815) used greatest stack depth: 18592 bytes left [ 274.334856][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.347908][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.386484][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.396474][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.403613][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.436199][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.445947][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.454392][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.463068][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.482779][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.492640][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.563891][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.572684][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.582972][ T7784] device veth0_vlan entered promiscuous mode [ 274.589902][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.598030][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.744874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.753704][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.346020][ T7784] device veth1_macvtap entered promiscuous mode [ 280.394072][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.428445][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.481384][ T7867] syz.0.2232 (7867) used greatest stack depth: 17984 bytes left [ 280.571507][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.619141][ T1405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.175402][ T7784] syz-executor (7784) used greatest stack depth: 17824 bytes left [ 281.202506][ T7915] device syzkaller0 entered promiscuous mode [ 281.966655][ T277] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 281.977834][ T277] CPU: 0 PID: 277 Comm: syz-executor Tainted: G W syzkaller #0 [ 281.986706][ T277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 281.996763][ T277] Call Trace: [ 282.000045][ T277] [ 282.002975][ T277] __dump_stack+0x21/0x30 [ 282.007311][ T277] dump_stack_lvl+0x110/0x170 [ 282.011990][ T277] ? show_regs_print_info+0x20/0x20 [ 282.017189][ T277] ? ___ratelimit+0x406/0x590 [ 282.021925][ T277] dump_stack+0x15/0x20 [ 282.026106][ T277] dump_header+0xdd/0x650 [ 282.030450][ T277] oom_kill_process+0x1fa/0x2c0 [ 282.035432][ T277] out_of_memory+0x717/0x9d0 [ 282.040053][ T277] ? unregister_oom_notifier+0x20/0x20 [ 282.045543][ T277] ? mutex_lock_io+0x30/0x30 [ 282.050166][ T277] __alloc_pages_slowpath+0x2073/0x30b0 [ 282.055769][ T277] ? get_page_from_freelist+0x2dc0/0x2dc0 [ 282.061521][ T277] ? __alloc_pages+0x420/0x460 [ 282.066327][ T277] ? __alloc_pages_bulk+0xad0/0xad0 [ 282.071562][ T277] __alloc_pages+0x338/0x460 [ 282.076188][ T277] ? prep_new_page+0x110/0x110 [ 282.081019][ T277] ? xas_load+0x2ea/0x300 [ 282.085383][ T277] pagecache_get_page+0xac6/0xde0 [ 282.090438][ T277] ? page_cache_prev_miss+0x290/0x290 [ 282.095843][ T277] ? __down_common+0x380/0x380 [ 282.100643][ T277] ? next_uptodate_page+0xa19/0xa40 [ 282.105883][ T277] ? trace_android_vh_page_cache_miss+0x29/0x150 [ 282.112257][ T277] ? filemap_fault+0xac7/0x1770 [ 282.117245][ T277] filemap_fault+0xd51/0x1770 [ 282.121967][ T277] ? mapping_seek_hole_data+0xb50/0xb50 [ 282.127553][ T277] ? filemap_read_page+0x340/0x340 [ 282.132789][ T277] __do_fault+0x264/0x2f0 [ 282.137226][ T277] ? handle_pte_fault+0x1870/0x2710 [ 282.142452][ T277] handle_pte_fault+0x187d/0x2710 [ 282.147514][ T277] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 282.153366][ T277] ? fault_around_bytes_set+0xc0/0xc0 [ 282.158778][ T277] do_handle_mm_fault+0x1af9/0x1de0 [ 282.164009][ T277] ? do_nanosleep+0x530/0x680 [ 282.168718][ T277] ? numa_migrate_prep+0xd0/0xd0 [ 282.173686][ T277] ? memset+0x35/0x40 [ 282.177705][ T277] ? vmacache_update+0xb7/0x120 [ 282.182589][ T277] ? __find_vma+0x13b/0x150 [ 282.187125][ T277] do_user_addr_fault+0x828/0x1250 [ 282.192365][ T277] ? do_kern_addr_fault+0x80/0x80 [ 282.197428][ T277] ? get_timespec64+0x116/0x1b0 [ 282.202434][ T277] ? __kasan_check_write+0x14/0x20 [ 282.207587][ T277] ? switch_fpu_return+0x15d/0x2c0 [ 282.212772][ T277] ? exit_to_user_mode_prepare+0xab/0xd0 [ 282.218459][ T277] exc_page_fault+0x51/0xb0 [ 282.223143][ T277] asm_exc_page_fault+0x27/0x30 [ 282.228037][ T277] RIP: 0033:0x7f8378fc5fd7 [ 282.232470][ T277] Code: Unable to access opcode bytes at RIP 0x7f8378fc5fad. [ 282.239838][ T277] RSP: 002b:00007ffe8cf665b0 EFLAGS: 00010202 [ 282.245915][ T277] RAX: 0000000000000000 RBX: 000055559143e500 RCX: 00007f8378fc5fd7 [ 282.253890][ T277] RDX: 00007ffe8cf665f0 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.261875][ T277] RBP: 0000555591456970 R08: 0000000000000000 R09: 0000000000000000 [ 282.269849][ T277] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffe8cf6662c [ 282.277814][ T277] R13: 00005555914518f0 R14: 0000555591453180 R15: 0000000000000000 [ 282.285948][ T277] [ 282.289684][ T277] Mem-Info: [ 282.292876][ T277] active_anon:0 inactive_anon:0 isolated_anon:0 [ 282.292876][ T277] active_file:35 inactive_file:25 isolated_file:7 [ 282.292876][ T277] unevictable:0 dirty:0 writeback:0 [ 282.292876][ T277] slab_reclaimable:7962 slab_unreclaimable:78123 [ 282.292876][ T277] mapped:25601 shmem:0 pagetables:526 bounce:0 [ 282.292876][ T277] kernel_misc_reclaimable:0 [ 282.292876][ T277] free:41745 free_pcp:126 free_cma:0 [ 282.333513][ T277] Node 0 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:100kB unevictable:0kB isolated(anon):0kB isolated(file):28kB mapped:102404kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5280kB pagetables:2104kB all_unreclaimable? yes [ 282.364047][ T277] DMA32 free:78120kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982760kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 282.390764][ T277] lowmem_reserve[]: 0 3941 3941 [ 282.395672][ T277] Normal free:88856kB min:84840kB low:106048kB high:127256kB reserved_highatomic:4096KB active_anon:0kB inactive_anon:0kB active_file:16kB inactive_file:260kB unevictable:0kB writepending:0kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:496kB local_pcp:248kB free_cma:0kB [ 282.423724][ T277] lowmem_reserve[]: 0 0 0 [ 282.428105][ T277] DMA32: 13*4kB (UM) 7*8kB (UM) 6*16kB (UM) 5*32kB (ME) 7*64kB (ME) 8*128kB (UME) 6*256kB (UME) 6*512kB (ME) 6*1024kB (ME) 4*2048kB (UME) 14*4096kB (M) = 78124kB [ 282.444428][ T277] Normal: 384*4kB (ME) 257*8kB (UME) 155*16kB (ME) 67*32kB (UME) 42*64kB (UME) 13*128kB (UM) 4*256kB (M) 7*512kB (M) 4*1024kB (UM) 5*2048kB (UM) 14*4096kB (M) = 88856kB [ 282.461436][ T277] 74 total pagecache pages [ 282.465889][ T277] 0 pages in swap cache [ 282.470133][ T277] Swap cache stats: add 24648, delete 24648, find 356/500 [ 282.477308][ T277] Free swap = 37080kB [ 282.481442][ T277] Total swap = 124996kB [ 282.485613][ T277] 2097051 pages RAM [ 282.489491][ T277] 0 pages HighMem/MovableOnly [ 282.494207][ T277] 342337 pages reserved [ 282.498396][ T277] 0 pages cma reserved [ 282.502517][ T277] Unreclaimable slab info: [ 282.507042][ T277] Name Used Total [ 282.513454][ T277] pid_3 16KB 16KB [ 282.519573][ T277] pid_2 122KB 122KB [ 282.525674][ T277] AF_VSOCK 62KB 62KB [ 282.531849][ T277] TIPC 151KB 165KB [ 282.537934][ T277] bridge_fdb_cache 11KB 11KB [ 282.544071][ T277] fib6_nodes 188KB 188KB [ 282.550256][ T277] ip6_dst_cache 323KB 326KB [ 282.556414][ T277] PINGv6 31KB 31KB [ 282.562579][ T277] RAWv6 193KB 316KB [ 282.568722][ T277] UDPv6 63KB 63KB [ 282.574841][ T277] TCPv6 63KB 63KB [ 282.580986][ T277] wg_peer 125KB 125KB [ 282.587236][ T277] allowedips_node 23KB 23KB [ 282.593339][ T277] sd_ext_cdb 3KB 3KB [ 282.599453][ T277] scsi_sense_cache 1344KB 1344KB [ 282.605543][ T277] virtio_scsi_cmd 16KB 16KB [ 282.611686][ T277] bio-160 100KB 124KB [ 282.617784][ T277] sgpool-128 29KB 29KB [ 282.623928][ T277] sgpool-64 191KB 191KB [ 282.630624][ T307] device bridge_slave_1 left promiscuous mode [ 282.631218][ T277] sgpool-32 110KB 110KB [ 282.636986][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.642957][ T277] sgpool-16 82KB 82KB [ 282.656107][ T277] sgpool-8 78KB 78KB [ 282.662245][ T277] bio-248 3KB 3KB [ 282.668366][ T277] f2fs_bio_iostat_ctx 7KB 7KB [ 282.669738][ T307] device bridge_slave_0 left promiscuous mode [ 282.674799][ T277] f2fs_bio_post_read_ctx 15KB 15KB [ 282.681155][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.687278][ T277] jbd2_inode 7KB 7KB [ 282.700500][ T277] ext4_system_zone 3KB 3KB [ 282.706624][ T277] ext4_io_end_vec 7KB 7KB [ 282.706859][ T307] device veth1_macvtap left promiscuous mode [ 282.712738][ T277] ext4_bio_post_read_ctx 15KB 15KB [ 282.725284][ T277] fasync_cache 8KB 8KB [ 282.728863][ T307] device veth0_vlan left promiscuous mode [ 282.731531][ T277] pid_namespace 11KB 11KB [ 282.743239][ T277] UNIX-STREAM 227KB 283KB [ 282.749401][ T277] UNIX 917KB 917KB [ 282.755495][ T277] ip4-frags 15KB 34KB [ 282.761626][ T277] UDP-Lite 15KB 15KB [ 282.767880][ T277] tcp_bind_bucket 8KB 8KB [ 282.774109][ T277] inet_peer_cache 8KB 8KB [ 282.780245][ T277] ip_fib_trie 36KB 36KB [ 282.786340][ T277] ip_fib_alias 102KB 102KB [ 282.792511][ T277] ip_dst_cache 103KB 124KB [ 282.798652][ T277] RAW 200KB 200KB [ 282.804839][ T277] UDP 141KB 141KB [ 282.810991][ T277] request_sock_TCP 7KB 7KB [ 282.817082][ T277] TCP 63KB 63KB [ 282.823241][ T277] bio-280 15KB 15KB [ 282.829369][ T277] ep_head 8KB 8KB [ 282.835527][ T277] eventpoll_pwq 7KB 7KB [ 282.841679][ T277] eventpoll_epi 11KB 11KB [ 282.847809][ T277] inotify_inode_mark 35KB 35KB [ 282.854080][ T277] bio_crypt_ctx 7KB 7KB [ 282.860311][ T277] request_queue 288KB 477KB [ 282.866428][ T277] blkdev_ioc 19KB 19KB [ 282.872582][ T277] bio-224 2733KB 2733KB [ 282.878706][ T277] biovec-max 595KB 595KB [ 282.884802][ T277] biovec-64 94KB 157KB [ 282.890952][ T277] biovec-16 22KB 22KB [ 282.897042][ T277] uid_cache 8KB 8KB [ 282.903195][ T277] dmaengine-unmap-2 4KB 4KB [ 282.910949][ T277] audit_buffer 7KB 7KB [ 282.917066][ T277] skbuff_fclone_cache 360KB 360KB [ 282.923377][ T277] skbuff_head_cache 3078KB 3108KB [ 282.929531][ T277] configfs_dir_cache 3KB 3KB [ 282.935713][ T277] file_lock_cache 142KB 142KB [ 282.941848][ T277] file_lock_ctx 7KB 7KB [ 282.947947][ T277] fsnotify_mark_connector 27KB 27KB [ 282.954877][ T277] taskstats 108KB 108KB [ 282.961022][ T277] mem_cgroup_per_node 63KB 63KB [ 282.967295][ T277] mem_cgroup 120KB 120KB [ 282.987226][ T277] proc_dir_entry 652KB 652KB [ 282.993866][ T277] pde_opener 7KB 7KB [ 282.999988][ T277] seq_file 250KB 250KB [ 283.006081][ T277] sigqueue 157KB 157KB [ 283.012196][ T277] shmem_inode_cache 1935KB 1983KB [ 283.018296][ T277] kernfs_iattrs_cache 7KB 7KB [ 283.024601][ T277] kernfs_node_cache 15523KB 15785KB [ 283.031120][ T277] mnt_cache 244KB 244KB [ 283.037225][ T277] filp 1855KB 1937KB [ 283.043395][ T277] names_cache 47863KB 48713KB [ 283.049671][ T277] net_namespace 192KB 192KB [ 283.055779][ T277] hashtab_node 75KB 75KB [ 283.061990][ T277] ebitmap_node 393KB 393KB [ 283.068084][ T277] avtab_node 191KB 191KB [ 283.074404][ T277] avc_node 79KB 79KB [ 283.080549][ T277] lsm_inode_cache 2162KB 2217KB [ 283.086636][ T277] lsm_file_cache 168KB 196KB [ 283.092800][ T277] key_jar 7KB 7KB [ 283.099004][ T277] uts_namespace 15KB 15KB [ 283.105124][ T277] nsproxy 11KB 11KB [ 283.111386][ T277] vm_area_struct 1450KB 1503KB [ 283.117487][ T277] fs_cache 60KB 60KB [ 283.123968][ T277] files_cache 324KB 324KB [ 283.130398][ T277] signal_cache 406KB 465KB [ 283.136512][ T277] sighand_cache 459KB 459KB [ 283.142660][ T277] task_struct 2542KB 2725KB [ 283.148790][ T277] cred_jar 138KB 164KB [ 283.154886][ T277] anon_vma_chain 361KB 413KB [ 283.167288][ T277] anon_vma 181KB 181KB [ 283.173521][ T277] pid 59KB 59KB [ 283.179689][ T277] Acpi-Operand 212KB 237KB [ 283.185977][ T277] Acpi-ParseExt 23KB 23KB [ 283.192126][ T277] Acpi-Parse 126KB 126KB [ 283.198404][ T277] Acpi-State 196KB 212KB [ 283.204841][ T277] Acpi-Namespace 28KB 28KB [ 283.210993][ T277] perf_event 239KB 239KB [ 283.217090][ T277] trace_event_file 175KB 175KB [ 283.223241][ T277] ftrace_event_field 312KB 312KB [ 283.229511][ T277] pool_workqueue 104KB 104KB [ 283.235605][ T277] task_group 22KB 22KB [ 283.241759][ T277] mm_struct 254KB 330KB [ 283.247843][ T277] vmap_area 281KB 311KB [ 283.254879][ T277] kmalloc-8k 33312KB 33920KB [ 283.263785][ T277] kmalloc-4k 77896KB 87592KB [ 283.271269][ T277] kmalloc-2k 24832KB 32736KB [ 283.277467][ T277] kmalloc-1k 18994KB 19936KB [ 283.283671][ T277] kmalloc-512 11393KB 12068KB [ 283.289863][ T277] kmalloc-256 3852KB 4920KB [ 283.295989][ T277] kmalloc-192 1074KB 1820KB [ 283.302153][ T277] kmalloc-128 1005KB 1332KB [ 283.308253][ T277] kmalloc-96 435KB 468KB [ 283.314419][ T277] kmalloc-64 1541KB 1768KB [ 283.320612][ T277] kmalloc-32 601KB 756KB [ 283.326760][ T277] kmalloc-16 300KB 336KB [ 283.335670][ T277] kmalloc-8 455KB 502KB [ 283.341818][ T277] kmem_cache_node 36KB 36KB [ 283.347915][ T277] kmem_cache 110KB 110KB [ 283.355292][ T277] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor,pid=277,uid=0 [ 283.376022][ T277] Out of memory (oom_kill_allocating_task): Killed process 277 (syz-executor) total-vm:225920kB, anon-rss:0kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:268kB oom_score_adj:0 [ 283.850899][ T4597] syz-executor (4597) used greatest stack depth: 17728 bytes left [ 283.959934][ T7238] syz-executor (7238) used greatest stack depth: 17600 bytes left [ 284.730011][ T307] device veth1_macvtap left promiscuous mode [ 284.736091][ T307] device veth0_vlan left promiscuous mode [ 285.801188][ T307] device bridge_slave_1 left promiscuous mode [ 285.807413][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.829118][ T307] device bridge_slave_0 left promiscuous mode [ 285.835334][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.845231][ T307] device veth1_macvtap left promiscuous mode [ 285.851486][ T307] device veth0_vlan left promiscuous mode [ 285.868838][ T307] device veth1_macvtap left promiscuous mode [ 285.874929][ T307] device veth0_vlan left promiscuous mode [ 285.881144][ T307] device veth1_macvtap left promiscuous mode [ 289.670270][ T307] device veth0_vlan left promiscuous mode