last executing test programs: 1m29.338140735s ago: executing program 0 (id=980): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x27, 0x4, 0x0, &(0x7f0000000440)="f8ad48cc", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x6}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x18000000000002a0, 0xf4, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbed9645d5ac141416441805104d2f87e5940c050104cc3e0000f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b86867f913663fff1119ff31cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aa8cd58ff62616363c70a440aec4014caf28c0adc043084617d7ecf41eb8134588d46e5dfc4ca5780d38cae870b9a1df48b2c9d4246dd14afbf79a2283a0bb7e1d235f3df126c30000000000f7000000000000000000d75090", 0x0, 0xff, 0x60000000, 0xaa, 0x0, &(0x7f0000000380)="b9eacd8aa7c11703c31d6fc8036de5d90b66c8dcf2c553fda3744ef9524defd3d177d548b50dedf4e3132f98b811b42e27086cdaf3822cb040b0fbd03f0d6378ba1d6efcb665c92de90244ae10a6b09971bd72a38fbbbad333c5e3fb5f43d807d9ba983cd53d7a11522277e035913723230229c4178b9cbd8196f70e64d0e7b07869d8dde17a84a1c54cbe3409f2cce5b39d5b8915e4d3f57286c749e36c4a2cdc18c27b94c4152d2bb3", &(0x7f0000000080), 0x6}, 0x50) socketpair(0x5, 0x3, 0x3, &(0x7f0000000080)) r6 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0xe6, 0x8, 0x7, 0x45, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x10}, 0x0, 0x8, 0x6, 0x5, 0xffffffff, 0x10000, 0x81, 0x0, 0x2, 0x0, 0x6044cfc0}, 0xffffffffffffffff, 0x4, r1, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r4) 1m29.130322475s ago: executing program 0 (id=985): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000000400000000000000c3010000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000010000000100000000a000000070000000000000e0100000000000000000000000000005f05"], 0x0, 0x32}, 0x28) 1m29.093372898s ago: executing program 0 (id=989): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x54b2ac04}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xe9, 0x5, 0x0, 0x1, 0x0, 0x8000000000000001, 0xd29fc, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x4, 0x6, 0x1, 0x81, 0x1, 0x3, 0x0, 0x3760, 0x0, 0x400000000001}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4, r3}, 0xc) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1m28.548977212s ago: executing program 0 (id=997): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x61, 0x1, 0x0, 0x4, 0x0, 0x100000001, 0x82004, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x41, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m28.547973962s ago: executing program 0 (id=1000): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000070000000000000000800000850000007500000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x1843, 0x0, 0x0, 0x9, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth1_macvtap\x00', @random="2542c3d08c53"}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe69, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x2a979d) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) write$cgroup_type(r8, &(0x7f0000000340), 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x20, &(0x7f0000000740)=ANY=[@ANYBLOB="18000011000000c9312f50ecdcc39895fd00e042a8e09aa7715c30ea9856202f8d24cc142ff41ea554c0fb6699f318f640774807d797dc", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085200000050000009500000000000000950000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300002a0900008500000006000000850000005f0000009500000000000000185900000d0000000000000000000000b72b0800100000008f01f4ff08000000bf91000000000000b7020000030000008500000085000000b7000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x100, 0x14, &(0x7f0000000100)=""/20, 0x40f00, 0x4, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x3, 0xd, 0x40, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r0, r8, r1, r0, r0, r0, r0, r0], 0x0, 0x10, 0x80000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1m27.791343025s ago: executing program 0 (id=1017): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) close(r1) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0xd, 0x6, 0x0, 0x1a, 0x0, 0x2, 0x14c04, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x10880, 0x2, 0xfffffff2, 0x8, 0x100, 0x2, 0x8, 0x0, 0x9, 0x0, 0x1}, r0, 0x0, r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000140)="55689a4b4496490623c70981a12a3adcaa9f04683189d7e6b39ef344bfefa152337ded6cb17fff39cb0db865f8b5981c8ec67a7a7c1a89997c4387cde399339848c073148ede43f041f1598d13ac8838c654d3ae528429d59af2a73a3d459d69a3d05fe427db3cffa305d66fe4fe8967d4", &(0x7f00000001c0)=""/177}, 0x20) r3 = openat$cgroup_subtree(r0, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2d, 'cpuacct'}, {0x2b, 'devices'}, {0x2b, 'net_prio'}, {0x2d, 'devices'}]}, 0x25) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x14, 0x5, 0x9, 0x1, 0x1800, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={0x1, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0xc, [@func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0x9}, @float={0xe, 0x0, 0x0, 0x10, 0xa}, @enum={0x7, 0x1, 0x0, 0x6, 0x4, [{}]}, @restrict={0xe, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x30, 0x5f, 0x0, 0x0, 0x0, 0x2e, 0x2e, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000940)=""/222, 0x68, 0xde, 0x1, 0x200, 0x10000}, 0x28) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)=@o_path={&(0x7f0000000b00)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000b80), 0x8) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0x0, 0x34}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x40, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x8}, @ldst={0x0, 0x2, 0x4, 0x5, 0x5, 0x2, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x87}, @map_val={0x18, 0xb, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x5}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000700)='GPL\x00', 0x0, 0xbd, &(0x7f0000000740)=""/189, 0x41000, 0x43, '\x00', r9, 0x1a, r10, 0x8, &(0x7f0000000a80)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0x2, 0x0, 0x1}, 0x10, 0x1d33, r11, 0x3, &(0x7f0000000c00)=[r12, r13], &(0x7f0000000c40)=[{0x3, 0x2, 0x8, 0xa}, {0x1, 0x1, 0xd, 0x5}, {0x5, 0x2, 0x9, 0x8}], 0x10, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000d40)='\x00') syz_clone(0x10000000, &(0x7f0000000d80)="94c34e164e26bdc4bdb38f4fa0bc268e23ce862a43fef68bda64ebf387a8d75c932b64992206f0a6b55cf801f66a8b2cb225bac5866c57f2b98eeb84cbecf3957990d449c73fc995c1eb64300d3f", 0x4e, &(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)="3f5521df1cf0af8f131f65822bf3c79d8220478001d41b11c020a6357046f846ec0db61c2b3b92c7c06effceb562d547f56e7b498bc098bcce86915c4a0788f780619437eec46a6841dbfac9c8d2a04a90749a3ff008f174d2bba154237236c3479f0f35a5b57ebd1511fab32e8512c0934e49297c26c5bbcad428b2febd388ac215b483a43c5b3b8bb64796339a72e706160f0941a5b1303a62ae3ca15ed947bf687cafec5d2bb3a67fb8e19a5d78b59efb48114c") r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f40)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x5, '\x00', 0x0, r12, 0x5, 0x3, 0x1}, 0x50) r15 = openat$cgroup_ro(r12, &(0x7f0000000fc0)='memory.swap.current\x00', 0x0, 0x0) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x400, '\x00', r9, r10, 0x1, 0x5, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x6, 0x11, &(0x7f0000001000)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6f}, @alu={0x7, 0x0, 0x3, 0x9, 0xa, 0x30, 0x8}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_fd={0x18, 0x1, 0x1, 0x0, r14}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}, @jmp={0x5, 0x0, 0x3, 0x0, 0xb, 0x18, 0x10}], &(0x7f00000010c0)='GPL\x00', 0x8, 0x75, &(0x7f0000001100)=""/117, 0x41100, 0x1d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001180)={0x34, 0x6, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[0xffffffffffffffff, r5, r12, r5, r13, r16, r12, r5, r13]}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x12, &(0x7f0000001340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x38}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001400)='syzkaller\x00', 0xd, 0x0, 0x0, 0x41100, 0x4, '\x00', r9, 0x0, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001440)=[r14, r7, r6, r16, r13], &(0x7f0000001480)=[{0x2, 0x3, 0xd, 0xb}, {0x5, 0x2, 0x3, 0xa}, {0x2, 0x1, 0xd, 0x8}, {0x2, 0x3, 0x10, 0x1}], 0x10, 0x8001}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000001580)={r15}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=@bloom_filter={0x1e, 0x6, 0x79d, 0x5, 0x980, 0x1, 0x6, '\x00', r9, r15, 0x0, 0x4, 0x4, 0xb}, 0x50) ioctl$TUNSETSNDBUF(r15, 0x400454d4, &(0x7f0000001640)=0x5) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001680)={0x3, 0x4, 0x4, 0xa, 0x0, r15, 0x0, '\x00', 0x0, r12, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001840)={r17, &(0x7f0000001700)="6eff1c7f", &(0x7f0000001740)=""/254, 0x4}, 0x20) 1m12.240949479s ago: executing program 32 (id=1017): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) close(r1) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0xd, 0x6, 0x0, 0x1a, 0x0, 0x2, 0x14c04, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x10880, 0x2, 0xfffffff2, 0x8, 0x100, 0x2, 0x8, 0x0, 0x9, 0x0, 0x1}, r0, 0x0, r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000140)="55689a4b4496490623c70981a12a3adcaa9f04683189d7e6b39ef344bfefa152337ded6cb17fff39cb0db865f8b5981c8ec67a7a7c1a89997c4387cde399339848c073148ede43f041f1598d13ac8838c654d3ae528429d59af2a73a3d459d69a3d05fe427db3cffa305d66fe4fe8967d4", &(0x7f00000001c0)=""/177}, 0x20) r3 = openat$cgroup_subtree(r0, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2d, 'cpuacct'}, {0x2b, 'devices'}, {0x2b, 'net_prio'}, {0x2d, 'devices'}]}, 0x25) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x14, 0x5, 0x9, 0x1, 0x1800, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={0x1, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0xc, [@func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0x9}, @float={0xe, 0x0, 0x0, 0x10, 0xa}, @enum={0x7, 0x1, 0x0, 0x6, 0x4, [{}]}, @restrict={0xe, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x30, 0x5f, 0x0, 0x0, 0x0, 0x2e, 0x2e, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000940)=""/222, 0x68, 0xde, 0x1, 0x200, 0x10000}, 0x28) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)=@o_path={&(0x7f0000000b00)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000b80), 0x8) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0x0, 0x34}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x40, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x8}, @ldst={0x0, 0x2, 0x4, 0x5, 0x5, 0x2, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x87}, @map_val={0x18, 0xb, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x5}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000700)='GPL\x00', 0x0, 0xbd, &(0x7f0000000740)=""/189, 0x41000, 0x43, '\x00', r9, 0x1a, r10, 0x8, &(0x7f0000000a80)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0x2, 0x0, 0x1}, 0x10, 0x1d33, r11, 0x3, &(0x7f0000000c00)=[r12, r13], &(0x7f0000000c40)=[{0x3, 0x2, 0x8, 0xa}, {0x1, 0x1, 0xd, 0x5}, {0x5, 0x2, 0x9, 0x8}], 0x10, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000d40)='\x00') syz_clone(0x10000000, &(0x7f0000000d80)="94c34e164e26bdc4bdb38f4fa0bc268e23ce862a43fef68bda64ebf387a8d75c932b64992206f0a6b55cf801f66a8b2cb225bac5866c57f2b98eeb84cbecf3957990d449c73fc995c1eb64300d3f", 0x4e, &(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)="3f5521df1cf0af8f131f65822bf3c79d8220478001d41b11c020a6357046f846ec0db61c2b3b92c7c06effceb562d547f56e7b498bc098bcce86915c4a0788f780619437eec46a6841dbfac9c8d2a04a90749a3ff008f174d2bba154237236c3479f0f35a5b57ebd1511fab32e8512c0934e49297c26c5bbcad428b2febd388ac215b483a43c5b3b8bb64796339a72e706160f0941a5b1303a62ae3ca15ed947bf687cafec5d2bb3a67fb8e19a5d78b59efb48114c") r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f40)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x5, '\x00', 0x0, r12, 0x5, 0x3, 0x1}, 0x50) r15 = openat$cgroup_ro(r12, &(0x7f0000000fc0)='memory.swap.current\x00', 0x0, 0x0) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x400, '\x00', r9, r10, 0x1, 0x5, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x6, 0x11, &(0x7f0000001000)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6f}, @alu={0x7, 0x0, 0x3, 0x9, 0xa, 0x30, 0x8}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_fd={0x18, 0x1, 0x1, 0x0, r14}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}, @jmp={0x5, 0x0, 0x3, 0x0, 0xb, 0x18, 0x10}], &(0x7f00000010c0)='GPL\x00', 0x8, 0x75, &(0x7f0000001100)=""/117, 0x41100, 0x1d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001180)={0x34, 0x6, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[0xffffffffffffffff, r5, r12, r5, r13, r16, r12, r5, r13]}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x12, &(0x7f0000001340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x38}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001400)='syzkaller\x00', 0xd, 0x0, 0x0, 0x41100, 0x4, '\x00', r9, 0x0, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001440)=[r14, r7, r6, r16, r13], &(0x7f0000001480)=[{0x2, 0x3, 0xd, 0xb}, {0x5, 0x2, 0x3, 0xa}, {0x2, 0x1, 0xd, 0x8}, {0x2, 0x3, 0x10, 0x1}], 0x10, 0x8001}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000001580)={r15}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=@bloom_filter={0x1e, 0x6, 0x79d, 0x5, 0x980, 0x1, 0x6, '\x00', r9, r15, 0x0, 0x4, 0x4, 0xb}, 0x50) ioctl$TUNSETSNDBUF(r15, 0x400454d4, &(0x7f0000001640)=0x5) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001680)={0x3, 0x4, 0x4, 0xa, 0x0, r15, 0x0, '\x00', 0x0, r12, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001840)={r17, &(0x7f0000001700)="6eff1c7f", &(0x7f0000001740)=""/254, 0x4}, 0x20) 17.961985623s ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 15.462356769s ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 12.030124003s ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 8.528643714s ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 5.835889981s ago: executing program 2 (id=1673): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000580), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[], 0x6a) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007de0b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cd67b5b18065752a3ad500000000000000cb450063bc36005400000000000000ff7f00000001000000000000000000cb04fcbb0b5ba9918d37b056b9bbd11b6b9f260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fb4845124ef2e487204000000aaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aadffcc75fe369258673b5d053bdec75dca377232a790bce5a6f087ae8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db9af1b5d356d0f062137d866d11be4b1260b06cca9098a3f0151fdbbd4e97d62ecc6405003a60f1c6edc76683073909826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bdaeecc952a3fd2c46f3c1cde71a19d1a2982492abaa96765372831210e00d2bfea3b8df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f22542c133aadafdc96fdb49cc992dbdd5ac01ba51508951c7a7c5f5093bd6ca0916c3a12912715649c2b1c7193a4251b59d378d0616a48c7957e122665c8b7e89eddfc3783f000000000000000050572061dfb5248d3d4a1c37dcb92d9ef99e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf19524cf30f810da3204f4c93f4f5d7321acfefc4d1c9139ca4b65b9990995000000000000000000000000000000c8a3988cca41217c950554bb043cf364d709c2bf3ec46b75f1bce43e726210b53d362072bc120c076b4647afc595d97c288f5017088ac2b02ed97fc883a102ae6000044542e3aa7ada6d13ff93ec634a0fa0b5f41ed317b48b8b8c03b243d6e14b7087e2c5d41f8a51408e27283b54d04212cbb0f5af76b70b1bdcec7c0abe6407e7fa204b9919490af8bffca6fbbd2174a84328af4acc9c7ec655729125fc15da558cb6edfcdd0c3fca7130863d13369f79f1d13ac166249e4bffa4a272a0116b591a63bfca11205d216b34000000000000000045b5ade570aeb7cf89e900004dc6c89355082bdcb0b08b810cf63fd19a17f4d440f1546e8e5f8addedb88c7f7990947505d2fcd8cb14"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$inet(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r5, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x24004844) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x1f2f, 0x18, 0x1e8, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x1e8, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0xe8030000}, 0x23) 5.686581723s ago: executing program 2 (id=1677): perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2721, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000010000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r6, 0x6, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x21) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x1, 0x2000}}, 0x10, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)) 5.577908161s ago: executing program 2 (id=1680): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000040000000400000007000000000000008775fc22d36c4820dec67fa58d1278adabd439b743339083dd9d6d27b14effce5c1a98b623942610c4362ea2ddc7c7337426080619a7c7b15e44eeeeb5a1adc012de34bc7b02747471fa329f40729771aa103c95efc1717ab6473d334ecfec001e87e3f024945a21f8a05b79c69cf1aa250b963d13321aef42d8e7ebead171c14c0bf9105945b345480e1cfb068c6951f48166d79c1c73a389ddce90c09ed7519ad5552fae08eada170c68bad824bd42c153f5030587af658b4a4f6ff4e7150f77cc6f1f9a9e25", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x4802}) write$cgroup_devices(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b2388a84b83615bd95b4cab"], 0xffdd) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x10a900, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x20, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006311a00000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) ioctl$TUNSETPERSIST(r1, 0x400454c9, 0xfffffffffffffffe) (async) ioctl$TUNSETPERSIST(r1, 0x400454c9, 0xfffffffffffffffe) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) (async) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) (async) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2101) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x9) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x102) 5.190075216s ago: executing program 2 (id=1683): bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000", @ANYRES32=0x0, @ANYBLOB="000000000000000088ae1678b4df3b0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/22], 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000d40)={0x8, 0x0}, 0x8) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d80)={r2, 0xf92, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f00)={r3, &(0x7f0000000dc0), &(0x7f0000000e40)=""/179}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000380)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='N-N:N/NN'], 0x6a) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xf0}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x5, 0x0, 0xb, 0x9, 0x0, 0x2, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x2000000}, {0x3, 0x0, 0x6, 0xa, 0x9, 0xfe04, 0xe1}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x80}, 0x50) close(0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x2, 0x8, 0x40, 0xc0, 0x1, 0x3}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r8}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r9, 0x1}, 0xc) sendmsg(r6, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{0x0}, {0xfffffffffffffffd}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x37}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 4.481973549s ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 2.445844124s ago: executing program 2 (id=1688): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='./cgroup.net/syz1\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], 0x0, 0x5}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x3, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0xeaf}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x3f, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x4) r6 = syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)=ANY=[@ANYRES8=r2, @ANYRES32, @ANYRES16, @ANYRES64=r6, @ANYRES64=r3], 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000070000000500000007000000c1000000", @ANYRES32, @ANYBLOB="af0e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000e4ff81795cf70000000000000000000000000000ffffff00"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x3f, r7}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r7}, 0x38) 2.444980794s ago: executing program 3 (id=1689): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/249, 0x1a, 0xf9, 0x6}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8920, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x14, &(0x7f0000001500)=ANY=[@ANYBLOB="18080000000000020000001801000020206920207b1af8ff00000000bfa1000000000000070100000000ffffb702000008000000b703000002000000850000000400000000000000e76daf808d2766f62f460ca7c707fc08f340401ebc939abb2b98cdbafadce96dd4d74eacb65d7458fbf01df216f6475709721ce90d99d725f5e7f6e765614e426dac8b15eedc164987a7ee0946f9a9122a1ef8a2e6dd9543c7d70b630ba4d60d7ae4551bb63ad1141e6ba204006b9cfbcef71c85c876b4c92d8ad198de05202bd4f4191e0994d655f87c35fd27ac2865c81093f6ae5d1df795a6c75b549571b4019abf88cfa74d36594f5c1fe3dd4d10560f533a0000000000000000004e2bd9c809af60d673c98080c141465e138d62f649625ce5afaa843d4ebbcd8ccfaff6c9d41ebbf3156be5b5b837c84911bfa9d989b76eba96372e6981552769df45b46219b9c1d61bddf0363ef5b3e1a3aab2bfcae6faa441d76b70b470b3860e1da7052561866450e14532caa8dd0b0f3ae4f1c7a859d60e5a52181f7be88a85c31fb834d54004e36461e71270b19328a781e4834fc9e27260c1565c5542f3af4a3c630b21dedc34d3bd1d77350cefe58a1ea93c1659a3e72290a99018a6ad3f931e7da0a98427fe5fec40d9d774b7a3d37d71c15cb8ac23999852079d000504d62d803760ab", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000300000085000000820000009500000000000000"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x2, 0x5, 0x2, 0x2}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x2, 0x5, 0x2, 0x2}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x4206}, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x47) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32=r7], 0x14) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000e00"/28], 0x50) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000e00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x18, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000000646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000808500000096000000b7080000000000007baaf8ff00000000b5080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x18, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000000646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000808500000096000000b7080000000000007baaf8ff00000000b5080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.148491067s ago: executing program 3 (id=1692): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0xe4, 0x0, &(0x7f00000000c0)="4d350a56a7bc74f8e9be2c1fc6b8590afd6f1dd0cf4762f72aae129a3603c71d9b813433f9f431b688bee7c2873eb6cfec9997ad55119427828d6e744a09d409d9cf8c47c68fa0a7cba7f23a392b73633d62a606b49ecf4884ef4edcda5a7ad6b0d27e0a8504ebfabc73b3fea0c0354869f46f7ca04f882d2d4d9fb6e27d22ac390383cb8cd746864f83e39380357181fa2857a7cef1b7b95c6407af9566802212f6bd9b8c22ce36ccaf140b4d4eef21095c89726a089f8b7af623d08adfa444056fa899dfed6d990cf9318c1fd5b2ec22835c5e8325a415627a0d61727e644f3a6b68a2", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x55}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc8}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000024000000080000000b"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@union={0x0, 0x3, 0x0, 0x5, 0x1, 0xffffff35, [{0xa, 0x0, 0xc}, {0x8, 0x5, 0x2fda}, {0x10, 0x3, 0x5}]}]}, {0x0, [0x2e, 0x0, 0x2e, 0x27, 0x5f]}}, &(0x7f0000000740)=""/4096, 0x4f, 0x1000, 0x0, 0x8}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000018c0)={0xffffffffffffffff, 0x20, &(0x7f0000001880)={&(0x7f0000001780)=""/66, 0x42, 0x0, &(0x7f0000001800)=""/92, 0x5c}}, 0x10) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001ac0)={0x6, 0xf, &(0x7f0000001900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xa6}, [@alu={0x4, 0x1, 0xb, 0x1, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x9f}, @ldst={0x1, 0x0, 0x4, 0x4, 0x7, 0xffffffffffffff2a, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000001980)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001a00)={0x1, 0xe, 0xfffffff8, 0xc246}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001a40)=[r2, r2, r2], &(0x7f0000001a80)=[{0x2, 0x3, 0xdbe8, 0x2}, {0x4, 0x5, 0xf, 0x5}, {0x2, 0x2, 0x6, 0x1}]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x20, 0x16, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0xf7, 0xa1, &(0x7f0000000400)=""/161, 0x41100, 0x40, '\x00', r3, @fallback=0x24, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, r6, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f0000000000), 0x0}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8937, &(0x7f0000000000)={'wg2\x00', @random="0100002010ff"}) 2.126019572s ago: executing program 3 (id=1694): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000200000005"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000440)={&(0x7f0000000000)="fa7cfcbbe83533bd78c4b063bcabc7ea392d60e9c642a9b8612ef0b8ecc988854b08a8c6c37a359dba737312e238ac30a82d78a629f33f531f77fb31358da83108cdbe13a7c95a43c04f569cc8a5dd905c09ce869dcdb07853d5a66370e89b1dac3d9a1ebcddee2608fb03a23a9dcb10fa752434631f98a8ce653acb4817daf3aa2de4", &(0x7f00000000c0)=""/72, &(0x7f0000000140)="4104659afe56f15adb31002fe762dd0cc960a3914ac92abe29206ecd75ae97a693efd81102b17fc4f9f551f0e61ae0c24465ce8027ba969d88561f8ba47b8ce624d2ef50f6921ef181ea2f53d199a93a049e04cb70ea01ec299e85a30b43858c9254fa7d4822ba0e7c8800e0da7a55c04032f70e74a010606c1731400e68022f1152b07f236f8d1c8bdaa5e8c985ce7e89675f99cd214470a13e1d223270d11e6c5a8aaad73caa06babdc5196f97c1b3142419b326606c80ebcfabc82fe268157d94a450ade40a33812143ee18d48158e8906f2d7030b13af01deb7651ff558c", &(0x7f0000000500)="81a37130b84704d82b364583f6d02360084a0b05136352268702746f48fa6adf43a009d1000000000000000000000000005554c62b940dc4ea540dab941a93ad3e5f13a004819b964716697e34903ebd7fbc99c18e0fbe2c6f3fdd9eabb4d7abaf9922af6c268d640c074fcbd30fa0a66d6838a4faba36ae89694d6cd89828c217b14058eb87c166ce1f60c5526ceb0e7d802d8aae364a21ad6b5b158d2411fa", 0xf72, r0, 0x4}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x4) recvmsg$unix(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x23, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r10, 0x4) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0x5, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x50) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000000000000eeffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xf, 0x3, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x4, 0x5, 0x1, 0xfffffffffffffff4, 0xfffffffffffffff4}, @generic={0x9, 0x4, 0xf, 0x0, 0x10001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f00000000c0)='GPL\x00', 0xf, 0x1000, &(0x7f0000002340)=""/4096, 0xc0e00, 0x3, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x1, 0x5, 0xfffffff7, 0x8865}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r12], &(0x7f00000008c0), 0x10, 0x109}, 0x94) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x8, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x2, &(0x7f0000000400)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x7, 0x5, 0x5, 0xffffffffffffffff, 0xffffffffffffffff}], &(0x7f0000000480)='GPL\x00', 0x7, 0x5f, &(0x7f00000005c0)=""/95, 0x41000, 0x4, '\x00', 0x0, 0x25, r6, 0x8, &(0x7f0000000640)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x10, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r11, r13, r3, r1, r7, r6], 0x0, 0x10, 0xffffd672}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000b00)=')\xe6\x17\xa0\xa9\x14X\xa3\x8c8\x11\xe4\xdcygM\xda^Q\xe9\xcf\xd87\xfe\"w\x9a\\\x17\x8d\xfc\x06FO0\x1e=!8|;}\x11n&+,\x04M!\x8d=\t\xa6\x02F\xb9\xe60\x97t\x98\xc4\xfc\x9fa$\xea2\x99Q| \x89\xb9\x8ba\t4O\xdd\x1d\x13l@j\xd4\x91\xf5\xce\x84C\x851\xad\xf8\x05\x9f\x1a\xaf\x12S\x1e!\xda\x7f\xe5$?\xd1\xe0`y\xfd\b\xae\xda\xf2W\x05\x93\x82\x8a\xc8\xee\xe6\x8a\xd2+\xae$P\x12.\xb1\x9bg*\x8d\xdd\xaa\x99{\xc2\xf5\n\xe88\xd3x7\xea\xad\xc7\xb0\x0fc\x14\xba\xb6\x9b\xdc\xdf\xa4\\Wb3\'P\x17\xa4F2\xe3\xddb)\x8e\xe1\xda\xa4\x95\xcd\xbaj\xded\x01\xad\x91\xfe]&p\xf2\x8dE\xf59Oa\x13\xf1\x03xH\xd1\x94f\xde\x1e\xb7p\xe0\x87\xb0\xf6\x14\xe8\xb5\xb7\x8c\x81\xa7\x88\x94\xa9\xeb') bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) 1.7023725s ago: executing program 2 (id=1697): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="2e76c30f4e02a8412a5eb8925f36ecc1a8503016ad15f0d9007d470cacc3880b261e2d2a8dc907b4a6e743ba60c0de54e3a4f6aebd75214ae0a611af6b8023bfb61d92118b635690356ff11aa4155ca8ecf7bc9e2fe009ca3dcb79a4133685f79466d2910cffffff09d93663538ba68e9daf023a4e10c730f74eb557cd737f91cb17ff4c3fc6bad431fbec4fa7c27dbdd1fee3d5b4039e3057e216616f1a45e3c0427dc42f3a1ce96d8f718386664ff90a5fac8eb5bcd415ce847bf0996fee408017b9b8f07a61d602b45a57cadfcfebfacd7500f24af32a2caf574faaf5c4cb754f5b14b7a775e34959a70d57bb1eeba767c9d30c", @ANYRES32=0x0, @ANYBLOB="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"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x4, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7, 0x1}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5372, 0x1, @perf_config_ext={0x80000001, 0xdc7}, 0x800, 0x8, 0xfffffffd, 0x0, 0x4, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x17}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000000040), 0x2, 0x0) 1.610040202s ago: executing program 3 (id=1698): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x33) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0x4000000, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x190, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0xc}, 0x2018, 0x1, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000040), 0x3b) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00'}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r0, 0x10000, 0x10}, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x713600, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300), 0x4) syz_clone(0x800d400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 966.202307ms ago: executing program 5 (id=1703): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000005000000356800000900000015"], 0x48) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="fc22c1678eb08e4f869d04000e9895eb15cc01cf5ca5000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x14, 0x4, 0x4, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000100), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 964.469877ms ago: executing program 5 (id=1704): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/18], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000b60a01000000000005000b00000000001801000020646c2500000000002020207b9af8ff000000000c9100000000000037010000f8ffffffb702000008000000b70300000000000015000000060000004e93000000000000b5030000000000008500000076000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 955.102465ms ago: executing program 5 (id=1706): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0x46, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0x34}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 559.949069ms ago: executing program 3 (id=1707): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x66a38089, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000001}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r0}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x5, 0x8, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3036d54baf6a1290, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="00000000000000f900"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{0x15, 0x0, 0x3}, {0x0, 0x0, 0xfe}, {}, {}, {0x6, 0x3}]}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 559.311399ms ago: executing program 4 (id=1708): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa2100, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9cf6, 0x100}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffc, 0x0, 0x1}, 0x0, 0xffffffeffdffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0xf00}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x4f}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 557.979008ms ago: executing program 5 (id=1709): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r7) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x6, 0x13, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) 474.048872ms ago: executing program 4 (id=1710): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101242, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000480), 0x6b) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000004000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000000ff000e611218"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000002280)=ANY=[@ANYBLOB="850000002200000007000000000f00089500000000000000e26c9bd1a6361b80cdd6ff07000000000008bc005aac0000659f55df08f9b90788ff7f00000010000029c21ebbcde61d8ab5920aef6c3e007fe61241638962cf0b89ef506cfd3f1d4163d3cfca3733b30070a7cf53021a9554320000000000000014569d65e33d46f8d8ae24ba69c657afac04379cb536008c219991704f11c5a01ba62ed8f2c6a503dd1b1d076f03b0f917c766f3a7598bbc00feb3bc8e88f79df517b37b56bcbc290080000000000000e675458a43b8a8935bf9cf0be7d0aeaac41405e341e70ba0d6fd562489dad595712a4051bb6cf826ab757193fe093b8b3353fbbb278d190000000061805ed430ef06000000000000001e93f640f159320c8b088f4d64977b2eb312d4967aff9e4c14c66c90000054ed82c7cba4c81f91d6dfed18767bf0df584b4b6c4204df411f921e3aa02a67dd324b8176020e9c024751df38c05727f82c92046bfe64babb6d7ba86526b7886a0c2481c5812812a6fa3fca3758cbd8c32b25c28be225bd1f16297baa065f5bf96330fad0aaa4388c06c0eb2ecdf829af9577fcd868cc269b740000b777d73a63246ce6f0467167626329ab91df7a13d9ec9a64e7f6b56aeab8c38f69a213c96e2d2ad7978c9d721c270f27e7025d576535198742d403ec43572d7d0baf00e882617b260627805ca44200335ea4363066944d0aa6feb9705b09ba40d4642519281151f875cbf13a582f90ad719f0eccf02a473dd508a16138904933689ea6ee02412064730700aeff2b69c2f2bf6f691c3560e068743ae8e8771280da61fd8fdc3f7a35ea352e35753c59ebc1bd27ab6603e6afb1b3f057fbb7ed3aabe702b3c6301d3f5c295d1d69d1541d0e64631c95d6c0999e27e8d1a58f6a00f19102d2bfaf53f25a45637b1c577ae50c4c56d9abc40c64a20c14ff0b1bf4d23fe07ae90f503ba9c64bf89b26e7d8d70710b04f9ece69023acadbb4582272e5b3a0429a5675e5a9554de54945d9a270180e0545b0c824ad36f7cc8be12b3874d5a19349b0ede845e9ece24d546d3af1bae069b89f6ecf2aabb17eb1840bc8e0ed1dd8b9b7eeaf32a185d80250a7f2eeb756eadafe20bbc616bc44b347abc8caf722b2c3b06884c1d1690f23b06fa4541bb2a81073b452764f04bd39008b65ee222cf697ac21b087548e9708dffaff2859e973b1e88668c8022cc6dac8548167e5798ec9c7d288a7fa7749f07513187cd8f060abbbc5e37dd1be3aab927be1b409be733b7408534e5b0951e9ecfd0a1c77e3a29be4c4093330124615056e3ce0ce6ac91b1242d3bb2e787a186dc2ec284d60e9d8a03884a22eeaa1efa497ee88c6cb565b164a260afb5157e392b1ebb1a4d4f992011ecbac4a0a6df5bdc6f7994a422bb2761edd2d8f20f5f879a88f89d48b8314f862585e4b7a9d6a6681f40e8b82cc6555dcdb951d164cc9a70e640ac8974faa2587a6e3af3b9458f7d4b4077b3002536b10ea24d73307a33090c4c270909a5322eac32cb175e68fa83457b21465c08c02dcefccc0c714c2862ddbe567755f05a1e671328d160d3752345ca1db6e74c720e42afca982ba6befd96c5575f1dd8f87ff6606301c0000000000000000000000000000000000000004d0d54b4caf78018766cdb971e8b168d4763c21181f00000003d4e1d842caf457797f93db93e4f38a9dbd79f6bf5dc40b55fdbf9b856665061b2e2924f27eb2d2b5a181ccfd9eeb11dec165b6f12433f00bb06124041ffdcdcdc91f3b3b76635a689c9249cf69bcae654bfa81e75b7c7002b883c56026d83520395b7d511f607cf2f899c7b1c75e2192f775d72247167285857588ace1115fbebfe63c16b84cf7036d41c493a63c09f2ce46c1f5995c2d7fe58c15e64bb4cb7e7f336cc22fa1ea1363bce375bd3d579be1dddb08ed02000000e4b3f0e65783ee5e20d9270802f2a7500738bf356131ca53e9d7ba8d486fb26252d684b84fa24639089064ca7b93057c041f12d544dab4d24a4f952b4f265a69ba279929959991b7ac63786055b3c029a0e8b6e4c26497c029bb61462623a58556cd66844d4d23cc738ee5b36c71d2c010b089251d5806000b1a84f4e26cb0331c6e7c052aecd9de81b4b55d06670597991f37ddc4fa19a6369d5bf76c474633a337f676ad255869881da5cadcf49ce9188129cc978977f87b32bd49457536430ffbd3e01e67ff087644f52fcf0a3c732b0586cb87972c43d2616bf4e521dc3126bf1760243d51a197d3ecfd74bd625e9f496175cfeaaa020817d33d513f3e97854ea76e04e96a8639a297871485a8609f8ca842b3321932c4d9e224a0cec5946cec9e359fd3687415cad5fb8c678136f36d9f781fade9f2469477748f4dfa0f56c326c89bb5d07f35aaf95303b5a620fc84e1c735647895713cbcea57b2277831f8f633f0d29371e645e5544e57010a9b76457f6ad73231a9f31f6bbb1b95248aeda5a9df9dea64cc1fd1f06a980fcf3a792bb0910e45fce298ab0a0298fc33a423e860d5b308d7849381b294106af25f15fec047d5b844a99f36e342165df728e381b48c20e0900f8d265157467d3494f2b96acf060f74084760d226f50edb115c2e075f3c663a4b4169b900fa0a13cf796e0d7a9dad86953c13ed6241206d682e194c64c491de6a531e9bd45abe705f07000a82ccd41a2c1b9d5dd8bf6c28653eb84f117e476e052a9db790e0a71dac9d8b343efebdc026860000000000000000000000000000aad579302085dfdf75bea24798c680b3de341e3bd57543cd8dfd58bcebdbb883c743ed43ba7f540f2c4e0310c21e7deff9e45b8bd2cf65bb584091b8e80e34b3e59185fe32d1d73dd4f62712a39b13661516723b6b3ef14d9fccb05f9c4e69a3af0fde863af2d9a0f8a94fc571b0ab4ad714f41fa4ee0b8b44e3c41a3125be95e4b23d5f05395852761bfaebe0db979d5f3991d826cc74542b85cfd0dba66bc93cfd79178ab0b79fa3b29ff9c19e0424513c91980187c9d94b8354337a1fc782505db900c47d83bd49276cfe6e242ba8365b1ea4598a21f50f5415a70990b5bb4a1f6bd8acdf2c7da3d648754767089c9b5ceb556fafa3cc5afd2f3e9a62a90262a76ff89a2751b59a744f0d3f36ca503357daa3e29ce6f357dc1e4839277d003e93fdbb955e1a1302a76aea7e73835094fb15464e94e814c77c293121d0433e80d444c4ca17abaf32b521d8686666055da023aef9c8df3e80d2ed640ed10aa19a036dcef172dbd3b3600b69d7b90c6222e167d7c76059f2b5f3b3004e8a20d1f6612efeb629573be97aa949c6016e7e16283e84986aaa4fc8a098708ebe36f377ada63d9b464c39342e0682549862de3ec75e7b031bc49f341a21417fb6375e8701481b59d1722c836961804666801678eb25750b520bf1615a4bbf30aa74d60ec6b657f2dd298b0419da43fc708a60c94a7ff2fd6a2d08005ad73c9e2d6143d2857be8fb3f12bfa6628bccb153e39172d07563d6a1dc75c347c08060304f091230bd74b49ecdd13bf480db3984622a167c8603b8c501280059a7b6123c8f8cd217f64eccc2dffe4f3a1e8c9a96a13d8126f3ea26779fbd0069d729a7764d4ddd7d9d820b0de2530969362b94b974678527f5bac7eb8d6e321b2be0b2f7534634a5ecd1248d7ad7e8e03163e92e9f1d620e28597bd881eea0981e8adfd70b670b0763ce9226f7c3e156b353e22fdea6942b5781bc539aab23cbd46bdd0ea1e67140c759f208c12dc57f3100000000e4965fcb6c0749955eac9476687e63b41c6282bbcb0c3d8b0c9493a3a5f6d879d7257b4b68dc7cac3d9d5f5bbe937c501866ee4042b250e516ec074559e1e551167138766eeecb6941e8305d9cde1800c821536f9d25bd14163890842a08135bdb7a90db630b18f099855a7d9de65c80fa71ff90e873361d0e11a7dfebe56ffb2000b711a0b7914d6351ff60593e48af60e1ffecba7cd6f8ab662eb3c8f3164139e994d6a706afb92722595d649a04f1ff64e5634e7cb9106173a9d5d8cf3e5a959e6bfdc1b6507b851c4ba43312726cfec58dedece1355a087c1b60882713a6161914f09267e2ce8aa886b3c0add5cd92e185d345c9b2933a78a4215133e8e7247fa444aee30bfb6c0fcada974254bc5feda6cee9a0803b2a0b81f440202ed5f278e4cf06565370893e7481efdfbc49b118eb17ba0104000000000000b342fd22ba139b03b7fc83ac49f2dfc9152fc193adac8dc2a6ba72e6bdd423b3555b6e1bd4896b4c946a4500e0a42340700b93bca902e02f744ceb51534f1fb9fa87f850a6c6eed76f7376e2a7e72d3a64a80720ded8f0ce31b1de3561362e975ed32a7167d9e0ad3f2a77f7a10c1614a9ba938a98da2976cb1a0d049446e67073c9a1a38ecc881c693a524c5291f89677de9fe904c752e450eba71d2f32805501d0df5b4a41123233554bdc35b562d9f5a2a026a3b40fc7c9a8546fc8d8310a9876114ffd7dfb909656d54c31bbb655af54bbeeb0174e451ceb7b35e5bd1ac15792ff474abcde8353fe0de700b110a00305ff77c133181688a62a49cff6db4cb4a5a90d40d35e927d216435df804b8bd6033a7ce49f11491f752fefa99e9c54428b725486291490d311b13eb02d14a0ae56733141a8dc6d51e3510000000000000000000000000000002708cac64111287c9f384a63b97d0000000000000000000000000000000068772d994fe9c45e54b97e0b3510cf945907545ebb92ddcd49aa5440b9d0d72d084a213c788b745ecd5bdddfc184483f7ba09966bd8f5c6fae19f3cfe093ef4061d89276628c1464faa485363c732e976fd1c9e2bed0ca75040e8cc73b088c50d6f887b5bc28964421090c133b268d8e848fd384903571d27502f9d17fa0dafc9fe15a97787e809cd7f7cb9345ce157eb073ee18a58239a4e0b8e075eb420e44451ef8b94ad1362ff3469e1ce699645b675866bb270691223ac42fa7be4ad109ddaedc0d5e03132131fec77243adcf90e694c5a98400"/3594], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x3a, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a000000000711eb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500243209880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xfffffffffffffe85, 0xa6, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd, 0x2}, 0x25) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e000000000033"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711807000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000140)='./file0\x00', 0x100) 338.353396ms ago: executing program 4 (id=1711): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xcb13119f635c50e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f0000000000)="5fd297b7aa0ff31ddfe3db994619f8c1edc551efe3da3365a3c4142986167f75321259910cbae25207e54d3174a4bbe4", &(0x7f0000000040)=""/61, &(0x7f0000000340)="1f3a54e0215319b570135e19a8d98e8b8988632f2b03899d51dd8c5f1a2df463fed84ab04e42eb9b42edb463ab4e7353783cbeff9ec2b6743f2cd763312c2195a47e5324cf1a08f725118cd07302ca74396cfd06e878e0ac6b7a2e2839af9cbf29169018c024d24aaccf865a96c912633688d8bc92cb5660e32b4e16203f4aed9e34d89b3e90d33e4058fbb58d04d5b78c8c5273b204d2f903f85450ac7dfd7d65", &(0x7f0000000680)="71adab77dabf279826f43dc9b0d5e63b140e7cdb784882b9afaa4b0a42bb3e669388da219eab53ca24951645c8d133a96f6c46d6ffd8a36c75448cc3af32b08258af82554f75c0084d2b33094898a5a4a60d8bfb60e62ffe676b1452c2f582d2d6b6cfad47ea88f247c9da210e1f07df0a797fba6b8d0eafe96ad0aca199a774a2fa698a4793eb4a526f199fd1c986eb3c5eddd9ba7fcda0e5b4f88984d096a081c2c492a8bea11d6d3a6d7494c531f2e80085130be6daf0a12a954d29fe4ede3ef5fcbc9a50f0b8cce49d7ae8a2", 0x51, r2, 0x4}, 0x38) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r3}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000f1ff0000060000003cf600"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 225.101254ms ago: executing program 3 (id=1712): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xea, 0x7, 0x40, 0xe5, 0x0, 0x0, 0xd000, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x9c7, 0xfc, 0x4, 0x0, 0x81, 0x9, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x22160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x7, 0x0, 0x3}, 0x0, 0x1, r0, 0xb) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_type(r2, &(0x7f00000010c0), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000001100), 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 224.678243ms ago: executing program 4 (id=1713): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x44ad1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42fbd5dcab7bee29, @perf_bp={0x0, 0xd}, 0x106c48, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="f8ffffff00"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="05000000010000000500ec0070fe84c2a000a400"/33], 0x50) write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa0000883e"], 0xcfa4) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x1, 0x9, 0x0, 0x5, 0x1028, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4000004, 0x4}, 0x115620, 0x2, 0x0, 0x0, 0x1000, 0x0, 0xfdd9}, 0xffffffffffffffff, 0x80000000000000, 0xffffffffffffffff, 0x2) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) 119.961723ms ago: executing program 4 (id=1714): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x17, 0x20}, [@ldst={0x6, 0x0, 0x5, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x13, 0x0, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0}, 0x40) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x22) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="0763707573751400000000000009"], 0x17) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@cgroup=r3, r0, 0x26, 0x2000, 0x0, @value=r5, @void, @void, @void, r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x17, 0x20}, [@ldst={0x6, 0x0, 0x5, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x13, 0x0, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0]}, 0x40) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (async) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x22) (async) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="0763707573751400000000000009"], 0x17) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@cgroup=r3, r0, 0x26, 0x2000, 0x0, @value=r5, @void, @void, @void, r2}, 0x20) (async) 117.633623ms ago: executing program 1 (id=1170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) (async) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x128}, 0x20008001) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000008000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708c2082f38baa7b85df8ff00000000bfa200000000000007020000f8ffffffb703210008000000b70400004fc7e1938500000082000000181100007adffe0daebccb1731968cdfb2f203e8a7c557b80eab92495fd5dc78755ca7bb6b82b73112eb009fc924e9da02e5280e11a041e32731d45645e2466e9d2460f49e474e7e2ea3ebedcfbdc8adf54f5f9396b3d9803c950a7cc50474ee311fc43189638b90d8b060616ee49853e9d1086cdfea443abebe25188b3fa734aba96f64fa0fc7eedfec435929e1ef42d26dacba667d0dd68acaf4f77d2183744452d81e25625545", @ANYRES32=r8, @ANYBLOB="1c00000000000000b7080000bca2000000000b00a6020000f8ffffffb703000008000000b70400000100000085000000445e1b319500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 116.458602ms ago: executing program 5 (id=1715): r0 = syz_clone(0x10040000, &(0x7f0000000000)="d27d7411e05f1c58cecd0543f4c807bacbf667afc39c0c98b557f79a3f47da1a1bbf8da3121957e749f8b5646acce156d1fa81ace7a4056c4d44fe81314a6680f97d7ea448f08596d17e08aaed1d1d6063c9b9b26df8defd756a74d7bc74222c203615f45f8bf73c1f1c812e07b28ad9db0afae0c64cca2bc8a7a1d37115d62e788ea41b", 0x84, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b7c72ae03a25822f43594b151dc13ab8b186ce767326be5ce0c495b71f5c5ba2206835d46d1de144a917265bbc38a1c48166ddfe802fc40c0a7d919f2142f314") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='%@~\x00', 0x0}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f00000002c0)="af1b529ed9d6a1c9d07860f955441fcdd11c0be9cbd38ba953e7cc4bb5434325cc6f432a53f72fd88f5f4a93fce310b9e1d84eab86ad0449d0710e247e62c00c86820828ab62650ae455894f121edbbaf36f34774ef094e6a902a2f0cb895b6e5a1d0ca0ba0ce32d6e71531d4032e9a930755f9952476b03360e12e9b3ee7bd25a0b85dc1f3c2decfc1bd8b13ab2f5ef6dce752bc815bf27b75b49ed41bba5fc334607201795716232eeb244c75301def291dd110f5c2fb357cf128c94c952", 0xbf}, {&(0x7f0000000380)="878127b0543830c4c0e58e1168d0b1683ce3551d00a0f42768660027521dcffab699b27286bfd331dde9facb6987d7a0d199fe67a41905fe10d956779027eb440b43a38792a0456174bfb0c769dc5e85a7c4b05bae4ce9004a8390828419dab9", 0x60}, {&(0x7f0000000400)="3fed979c351fbcba6d4e3539f928273830020a2b116f0131cccef3b24a9f6d1f96d5549b0cd3f0152d95d3e90323bb0339de0ed689513bc3f90b39fa0685aecbd3c211", 0x43}], 0x3, &(0x7f00000004c0), 0x0, 0x1}, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x80000, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000580)) r4 = openat$cgroup_int(r2, &(0x7f00000005c0)='memory.swap.max\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000600), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000640)='net_prio.ifpriomap\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x14, 0x1c, &(0x7f0000000680)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0x9, 0x3, 0x6, 0xfffffffffffffffe, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000000780)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @lirc_mode2=0x10, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x3, 0x9, 0x1, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000800)=[r2], &(0x7f0000000840)=[{0x5, 0x4, 0x8, 0x1}, {0x5, 0x4, 0xe, 0xa}], 0x10, 0xff}, 0x94) sendmsg$inet(r2, &(0x7f0000000c00)={&(0x7f0000000940)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000980)="f7f8159b9261f3aa22664db0262eb93f484c6ec3ce46e640127eee3122a567ac6e019ddc0c6ef9e0b263a09a9f3fb275db36e28bffa4447bd80a867639ed89790cc2c6bea5a947dde8b0a26779ab4de98dfde564c2c485795f15957b4f6ef08a8fd833e99c5e8b71d80f6e8aa976542b4aeeee7c4c90acc41c8a4c0141", 0x7d}, {&(0x7f0000000a00)="1d63914ba8e856d09870a0d1cfcee175d792f386f9ccc7b561d1dd1ecc789ce331aeae26b2a424494f3d823dd65e460e2a98843a2772adbf21d32a54936aaf397f3237faea834cca960152573ff1edafd1bb132904fca19626b6349070ed184b18e4c2059385811ec0df0096d0e37778a8e0e3fea22c4513b75c95d12acd5140709013cc24d590c11a4beb5b9331567bcf32bc0fa6cc5cfa2fd1312073388975214959911cf7ba8552e7276209fc3a86e15e2b", 0xb3}], 0x2, &(0x7f0000000b00)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x70, 0x0, 0x7, {[@ssrr={0x89, 0x1b, 0x97, [@dev={0xac, 0x14, 0x14, 0x9b}, @multicast2, @loopback, @empty, @private=0xa010100, @multicast1]}, @noop, @end, @timestamp={0x44, 0x14, 0xed, 0x0, 0x7, [0x9, 0x3, 0x100, 0x401]}, @timestamp_addr={0x44, 0x1c, 0xe0, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10000}, {@rand_addr=0x64010102, 0x10001}, {@rand_addr=0x64010101, 0x36}]}, @ssrr={0x89, 0x13, 0x80, [@remote, @loopback, @private=0xad36, @rand_addr=0x64010102]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffe01}}], 0xd0}, 0x4000) r6 = gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', r2, 0x4000, r4}, 0x18) r7 = openat$cgroup_ro(r2, &(0x7f0000000cc0)='freezer.parent_freezing\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000d00)=r6, 0x12) write$cgroup_subtree(r2, &(0x7f0000000d40)={[{0x2d, 'cpu'}]}, 0x5) close(r2) openat$cgroup_devices(r7, &(0x7f0000000d80)='devices.allow\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x5, 0x0, r7, 0x0, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001180)={r7, 0x20, &(0x7f0000001140)={&(0x7f0000001040)=""/109, 0x6d, 0x0, &(0x7f00000010c0)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x13, 0x10, &(0x7f0000000e40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x60c}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ec0)='GPL\x00', 0x3, 0xde, &(0x7f0000000f00)=""/222, 0x41100, 0x20, '\x00', 0x0, @fallback=0x1a, r7, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r9, r5, 0x8, 0x0, &(0x7f00000011c0)=[{0x0, 0x4, 0xf, 0x6}, {0x4, 0x5, 0x7, 0x9}, {0x4, 0x1, 0x3, 0x7}, {0x3, 0x5, 0xb, 0x1}, {0x0, 0x1, 0xf, 0x9}, {0x2, 0x2, 0x6, 0x3}, {0x4, 0x1, 0x5, 0x8}, {0x5, 0x4, 0x0, 0xa}], 0x10, 0x4}, 0x94) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001300)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r7, 0xe0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f00000013c0)=[0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0], 0x0, 0xa7, &(0x7f0000001440)=[{}], 0x8, 0x10, &(0x7f0000001480), &(0x7f00000014c0), 0x8, 0x70, 0x8, 0x8, &(0x7f0000001500)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001340)={@fallback, r2, 0x0, 0x20, r10, @void, @void, @void, @value=r11}, 0x20) openat$cgroup_type(r2, &(0x7f0000001680), 0x2, 0x0) openat$cgroup_pressure(r7, &(0x7f00000016c0)='cpu.pressure\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001700)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x4, '\x00', 0x0, r2, 0x4, 0x2, 0x5}, 0x50) perf_event_open(&(0x7f00000017c0)={0x4, 0x80, 0x3, 0x9, 0x60, 0x40, 0x0, 0x66, 0x15410, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000001780), 0x2}, 0x14880, 0x6818, 0x4e48, 0x3, 0x7ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, r6, 0xffffffffffffffff, r2, 0xb) openat$ppp(0xffffffffffffff9c, &(0x7f0000001840), 0x121280, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001900)={r7, 0xffffffffffffffff, 0x4, r7}, 0x10) 54.10261ms ago: executing program 5 (id=1716): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r3}, &(0x7f0000000600), &(0x7f0000000c80)='%-5lx \x00'}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)=']^@!\x00') ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000300)=r7) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x154fb}]}, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000007"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x10, &(0x7f0000000cc0)=ANY=[@ANYRESHEX=r4, @ANYBLOB="4319536006816241a052bec2334cee7faab1ce8225dd6921542d4ebea647e67afb284416d0da3d7fa2cbb7e43ff20da4a1fef042f34717e0ea5036b91e302d38fbfe4ed3508cbe6933d04babfa00f942baf395f7bcf42f178b351e4c05e0fe208bed0f2b7d8291722fc0106dfc4e35917912", @ANYBLOB="0000000000000000b702000000000040850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0xfd2d, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r10, 0x27, 0x0, 0x120, 0x0, 0x0, 0x2100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 0s ago: executing program 4 (id=1717): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x18000000, &(0x7f0000000040)="e3b685051641f269442172aa198a7236fd1b7981669b13187027291d11cd0235b30b3ca5040784de31d92d610d54e84edc4f564d72acd6512f5f593b802483bf93100c3b31d40e9ff4a84908930071d35383e06c82eaae6b942e2538bcfe0f7b4b3d6148eecf2b208d179f1b1180337b8963e2d57525a4fef638786bc0911044f3043e3ab82456fc25a268f1b24e376062e5290e9519b7fd0a46fbe208a8d15b1c0186f964b968bd81860b29f568f769697089397d5a61444a18e1cc", 0xbc, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000002c0)="5e08c1bbd94db0e9b9d8fecdc0098a0c8bbe67523c49b3677669513e5483d2717aef3e92b2dcb6b23c5f33c6") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={r1, r0, 0x0, 0x13e, &(0x7f0000000d40)='\xb6\x88\x11.\xbf\x10\xb5\xa3\x0eI\x0e\x06\x16\x97\xad\xa7\xbeT}\xf2*\xd1U\\d\x8dy\x1aD-\x91R\xb4\xb9\xde\x12\xcd\xc5P)\xd1\xba}\xd6\xf2Ck\x96\x06\x12\x91\xa1y\xc0\xe5x\x8eZ\xd4\x10G\x8e]#\xa7\x85\xe9\xcd\x0e+ \x17}\xdb48p&\xd3\xce\xf0\x8e\xeee\xe9\xc6\xfb\b\xc99\x90\x15\xce\x82\x11\xfe\xf0x\xc4\x011\x11\xb4V\x84M\x98\xe5^O\x93\xa4\xe5/\xd5Fa\xd4\xffJ>\xf1\xc0\x11<\xf8\x99\xc4\xbd\xb7\xb0w\xde\xc5MMq\xe1\x051\x83\x86\xf4\xf5\x16*\xf8z\xb8<\xa5J\xb6(\x8c\x81\xc4j!\x179\xf4A\x93\xf9\xadX\xac\xca\xb4\xe0\xd3\xadQ\xd3{8\xe7 )@\x97E\x9a\xcd\'\xf5\xe9Z(<\xb8\xca\xfe\x8fI\xa9\\4R\xe5\x92\xfa\xbf\xb6|\xf8\xc5\x00Xk\xa11J]\x06+\xab\x05f#\xb5\x85\xf8\xdf\xd8\xd4\x95\x98Y\xb6\xb9]\xf4\x8e\x02\xcbD|\x7f\xd3]\xb3\xbfJ\x15\x8d\x9e\x93\xca\x84R\xd5\x81\x8dp\xe3$\x8f\x8b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00r_\xba\x98/\xd8\xd9;\x96f\xa6{R\x81y\xa1\x90\t4_@r\'\x00\x00\x00\x00\x00\x00\x00\xc5\xee\xe0p\xc2i\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000bc0)={0x0, 0x80, 0x20, 0xf, 0x1, 0x1, 0x0, 0x4, 0x80008, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x3, 0x3}, 0x1000, 0x9, 0x1, 0x0, 0x10, 0x1, 0x9, 0x0, 0x9, 0x0, 0x3}, r1, 0x8, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x3, 0x3, 0xb, 0xa, 0x0, 0xffffffffffffffe8}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3f}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000010008500000022000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={&(0x7f0000000340)="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", 0x0, 0x0, 0x0}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r3, @ANYBLOB="0000000000000000690300000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b40)='./cgroup.net/syz1\x00', 0x1ff) kernel console output (not intermixed with test programs): 6.982663][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.989762][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.997415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.005761][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.013966][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.021037][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.028541][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.036616][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.044666][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.052881][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.061067][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.069572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.078076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.085958][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.094149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.101959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.109604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.125060][ T284] device veth0_vlan entered promiscuous mode [ 27.137486][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.145904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.154410][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.162550][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.170861][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.179071][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.187386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.195416][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.203467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.211728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.220034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.227623][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.236340][ T282] device veth1_macvtap entered promiscuous mode [ 27.250617][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.258466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.266647][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.283640][ T283] device veth0_vlan entered promiscuous mode [ 27.290369][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.298980][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.307464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.315363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.323997][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.331588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.345660][ T281] device veth0_vlan entered promiscuous mode [ 27.357417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.365869][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.374543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.382690][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.391175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.399679][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.408198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.416415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.424952][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.433404][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.442117][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.449750][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.461300][ T285] device veth0_vlan entered promiscuous mode [ 27.467819][ T284] device veth1_macvtap entered promiscuous mode [ 27.480453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.488690][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.496275][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.505033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.513582][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.521123][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.531104][ T281] device veth1_macvtap entered promiscuous mode [ 27.548280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.557790][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 27.559005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.574356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.583031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.606040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.618166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.629107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.645945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.654299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.662867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.671355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.679968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.689520][ T285] device veth1_macvtap entered promiscuous mode [ 27.699960][ T283] device veth1_macvtap entered promiscuous mode [ 27.726970][ C0] hrtimer: interrupt took 131769 ns [ 27.735226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.743190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.752987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.784602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.793533][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.803047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.812545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.823525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.832763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.140993][ T330] device syzkaller0 entered promiscuous mode [ 29.486849][ C1] sched: RT throttling activated [ 29.694558][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 29.694574][ T30] audit: type=1400 audit(1772220706.276:112): avc: denied { create } for pid=343 comm="syz.2.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 30.953831][ T30] audit: type=1400 audit(1772220707.536:113): avc: denied { create } for pid=360 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.067195][ T30] audit: type=1400 audit(1772220707.566:114): avc: denied { write } for pid=360 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.247418][ T30] audit: type=1400 audit(1772220707.696:115): avc: denied { cpu } for pid=364 comm="syz.3.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.579844][ T373] device veth1_macvtap left promiscuous mode [ 31.586330][ T373] device macsec0 entered promiscuous mode [ 31.647993][ T371] device syzkaller0 entered promiscuous mode [ 31.819486][ T30] audit: type=1400 audit(1772220708.406:116): avc: denied { setopt } for pid=386 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.190972][ T409] device veth0_vlan left promiscuous mode [ 33.219710][ T409] device veth0_vlan entered promiscuous mode [ 33.350046][ T30] audit: type=1400 audit(1772220709.936:117): avc: denied { read } for pid=416 comm="syz.2.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.723403][ T30] audit: type=1400 audit(1772220712.306:118): avc: denied { create } for pid=453 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 36.537602][ T30] audit: type=1400 audit(1772220713.126:119): avc: denied { create } for pid=471 comm="syz.4.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 36.899575][ T493] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 36.919241][ T493] syzkaller0: linktype set to 778 [ 37.066620][ T497] device syzkaller0 entered promiscuous mode [ 37.414445][ T30] audit: type=1400 audit(1772220713.996:120): avc: denied { write } for pid=517 comm="syz.3.68" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 37.490147][ T30] audit: type=1400 audit(1772220714.076:121): avc: denied { create } for pid=517 comm="syz.3.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 38.048909][ T550] device syzkaller0 entered promiscuous mode [ 38.206490][ T566] device syzkaller0 entered promiscuous mode [ 38.300972][ T30] audit: type=1400 audit(1772220714.886:122): avc: denied { create } for pid=575 comm="syz.4.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 38.427319][ T30] audit: type=1400 audit(1772220715.006:123): avc: denied { create } for pid=575 comm="syz.4.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.833010][ T592] device syzkaller0 entered promiscuous mode [ 38.889757][ T596] device syzkaller0 entered promiscuous mode [ 39.040732][ T30] audit: type=1400 audit(1772220715.616:124): avc: denied { create } for pid=600 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 40.363809][ T626] syz.3.104 (626) used greatest stack depth: 22832 bytes left [ 40.806403][ T668] device syzkaller0 entered promiscuous mode [ 41.334197][ T30] audit: type=1400 audit(1772220717.916:125): avc: denied { create } for pid=695 comm="syz.0.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 41.371932][ T700] tap0: tun_chr_ioctl cmd 1074025677 [ 41.395611][ T700] tap0: linktype set to 823 [ 41.464495][ T702] device syzkaller0 entered promiscuous mode [ 42.110225][ T739] device veth1_macvtap left promiscuous mode [ 42.117043][ T739] device macsec0 entered promiscuous mode [ 42.579635][ T30] audit: type=1400 audit(1772220719.166:126): avc: denied { create } for pid=772 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 43.118296][ T644] syz.3.109 (644) used greatest stack depth: 22688 bytes left [ 44.298193][ T30] audit: type=1400 audit(1772220720.886:127): avc: denied { create } for pid=798 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 47.487379][ T30] audit: type=1400 audit(1772220724.076:128): avc: denied { create } for pid=827 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 47.640730][ T836] device syzkaller0 entered promiscuous mode [ 48.578518][ T30] audit: type=1400 audit(1772220725.166:129): avc: denied { create } for pid=888 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 48.703890][ T30] audit: type=1400 audit(1772220725.286:130): avc: denied { setattr } for pid=896 comm="syz.2.188" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 48.829072][ T898] device syzkaller0 entered promiscuous mode [ 51.780759][ T975] device syzkaller0 entered promiscuous mode [ 52.923528][ T30] audit: type=1400 audit(1772220729.506:131): avc: denied { create } for pid=1037 comm="syz.4.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 52.951613][ T1039] sock: sock_set_timeout: `syz.4.237' (pid 1039) tries to set negative timeout [ 53.617892][ T30] audit: type=1400 audit(1772220730.206:132): avc: denied { create } for pid=1078 comm="syz.4.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.645899][ T1079] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 54.155252][ T1096] device syzkaller0 entered promiscuous mode [ 56.053743][ T1219] IPv6: pim6reg1: Disabled Multicast RS [ 56.471463][ T1241] device sit0 entered promiscuous mode [ 57.109984][ T1307] device syzkaller0 entered promiscuous mode [ 57.288763][ T30] audit: type=1400 audit(1772220733.866:133): avc: denied { ioctl } for pid=1324 comm="syz.0.323" path="socket:[18252]" dev="sockfs" ino=18252 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.218981][ T1370] device syzkaller0 entered promiscuous mode [ 58.454331][ T30] audit: type=1400 audit(1772220735.036:134): avc: denied { create } for pid=1379 comm="syz.3.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 59.146450][ T1394] syz.4.343 (1394) used greatest stack depth: 22576 bytes left [ 59.204125][ T1421] device syzkaller0 entered promiscuous mode [ 59.717082][ T1436] syz.2.355 (1436) used greatest stack depth: 22400 bytes left [ 62.493455][ T1526] device syzkaller0 entered promiscuous mode [ 63.143282][ T1547] device syzkaller0 entered promiscuous mode [ 63.550779][ T1563] syz.1.399[1563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.552538][ T1563] syz.1.399[1563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.904690][ T1627] device syzkaller0 entered promiscuous mode [ 65.056578][ T30] audit: type=1400 audit(1772220741.636:135): avc: denied { create } for pid=1620 comm="syz.1.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 66.966345][ T1687] tap0: tun_chr_ioctl cmd 1074025677 [ 66.988096][ T1687] tap0: linktype set to 786 [ 67.151916][ T1703] device sit0 entered promiscuous mode [ 67.513257][ T30] audit: type=1400 audit(1772220744.096:136): avc: denied { append } for pid=1711 comm="syz.4.441" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 68.133357][ T1724] device syzkaller0 entered promiscuous mode [ 68.964694][ T1779] device syzkaller0 entered promiscuous mode [ 69.382573][ T30] audit: type=1400 audit(1772220745.966:137): avc: denied { create } for pid=1805 comm="syz.3.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 69.471879][ T1816] device syzkaller0 entered promiscuous mode [ 69.811639][ T30] audit: type=1400 audit(1772220746.396:138): avc: denied { create } for pid=1839 comm="syz.1.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 70.332038][ T1864] ÿÿÿÿÿÿ: renamed from vlan1 [ 70.402414][ T30] audit: type=1400 audit(1772220746.986:139): avc: denied { create } for pid=1886 comm="syz.2.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 70.794743][ T30] audit: type=1400 audit(1772220747.376:140): avc: denied { create } for pid=1923 comm="syz.3.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 70.918574][ T1907] device syzkaller0 entered promiscuous mode [ 71.159980][ T1938] sock: sock_set_timeout: `syz.1.506' (pid 1938) tries to set negative timeout [ 71.387003][ T1947] device syzkaller0 entered promiscuous mode [ 71.532681][ T1957] device syzkaller0 entered promiscuous mode [ 71.626706][ T1963] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.634074][ T1963] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.249559][ T1987] device syzkaller0 entered promiscuous mode [ 73.897106][ T2016] device syzkaller0 entered promiscuous mode [ 78.745736][ T2055] tap0: tun_chr_ioctl cmd 1074025684 [ 81.843501][ T2144] ------------[ cut here ]------------ [ 81.883642][ T2144] trace type BPF program uses run-time allocation [ 81.901989][ T2144] WARNING: CPU: 0 PID: 2144 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 81.932530][ T2144] Modules linked in: [ 81.936537][ T2144] CPU: 0 PID: 2144 Comm: syz.0.565 Not tainted syzkaller #0 [ 81.951932][ T2147] device syzkaller0 entered promiscuous mode [ 81.959060][ T2144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.976964][ T2144] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 81.997144][ T2144] Code: ee ff 48 c7 c6 60 46 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 96 1c ee ff c6 05 94 73 6a 05 01 48 c7 c7 c0 42 48 85 e8 83 0d 2f 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 82.020903][ T2169] device syzkaller0 entered promiscuous mode [ 82.028542][ T2144] RSP: 0018:ffffc900011bf428 EFLAGS: 00010246 [ 82.034680][ T2144] RAX: 22fdbec9cc37fd00 RBX: 0000000000000001 RCX: 0000000000080000 [ 82.072875][ T2144] RDX: ffffc9000134b000 RSI: 000000000000264d RDI: 000000000000264e [ 82.081251][ T2144] RBP: ffffc900011bf470 R08: ffff8881f7032f3f R09: 1ffff1103ee065e7 [ 82.089622][ T2144] R10: dffffc0000000000 R11: ffffed103ee065e8 R12: ffff8881100c8000 [ 82.098469][ T2144] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888117e88000 [ 82.107064][ T2144] FS: 00007fbc6b7526c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 82.163869][ T2144] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 82.171286][ T2144] CR2: 000000110c2e95c8 CR3: 000000012c55a000 CR4: 00000000003506a0 [ 82.179712][ T2144] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 82.194009][ T2144] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 82.202297][ T2144] Call Trace: [ 82.205745][ T2144] [ 82.209106][ T2144] resolve_pseudo_ldimm64+0x656/0x1180 [ 82.214716][ T2144] ? check_attach_btf_id+0xd70/0xd70 [ 82.220378][ T2144] ? __mark_reg_known+0x1b0/0x1b0 [ 82.296967][ T2144] ? security_capable+0x87/0xb0 [ 82.302042][ T2144] bpf_check+0x32c7/0xf370 [ 82.312191][ T2144] ? 0xffffffffa0028314 [ 82.316481][ T2144] ? is_bpf_text_address+0x177/0x190 [ 82.318950][ T2180] Ÿë: port 1(veth0_vlan) entered blocking state [ 82.328554][ T2180] Ÿë: port 1(veth0_vlan) entered disabled state [ 82.348929][ T2144] ? bpf_get_btf_vmlinux+0x60/0x60 [ 82.363021][ T2144] ? unwind_get_return_address+0x4d/0x90 [ 82.373475][ T2144] ? stack_trace_save+0xf0/0xf0 [ 82.400862][ T2144] ? arch_stack_walk+0xee/0x140 [ 82.470414][ T2144] ? stack_trace_save+0xa6/0xf0 [ 82.475511][ T2144] ? __stack_depot_save+0x34/0x480 [ 82.531574][ T2144] ? __kasan_slab_alloc+0x69/0xf0 [ 82.556641][ T2144] ? __kasan_kmalloc+0xec/0x110 [ 82.573909][ T2144] ? __kasan_kmalloc+0xda/0x110 [ 82.579321][ T2144] ? kmem_cache_alloc_trace+0x119/0x270 [ 82.584996][ T2144] ? selinux_bpf_prog_alloc+0x51/0x140 [ 82.590916][ T2144] ? security_bpf_prog_alloc+0x62/0x90 [ 82.596607][ T2144] ? bpf_prog_load+0x9f4/0x1640 [ 82.601826][ T2144] ? __sys_bpf+0x51d/0x7d0 [ 82.606575][ T2144] ? __x64_sys_bpf+0x7c/0x90 [ 82.611596][ T2144] ? x64_sys_call+0x4b9/0x9a0 [ 82.616391][ T2144] ? do_syscall_64+0x4c/0xa0 [ 82.627102][ T2144] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.636672][ T2144] ? check_stack_object+0x81/0x140 [ 82.642151][ T2144] ? memset+0x35/0x40 [ 82.646277][ T2144] ? bpf_obj_name_cpy+0x193/0x1e0 [ 82.651559][ T2144] bpf_prog_load+0x10c4/0x1640 [ 82.656508][ T2144] ? __anon_inode_getfd+0x35c/0x3d0 [ 82.662023][ T2144] ? map_freeze+0x360/0x360 [ 82.666736][ T2144] ? selinux_bpf+0xc7/0xf0 [ 82.675641][ T2144] ? security_bpf+0x82/0xa0 [ 82.680437][ T2144] __sys_bpf+0x51d/0x7d0 [ 82.684767][ T2144] ? bpf_link_show_fdinfo+0x330/0x330 [ 82.690419][ T2144] ? __kasan_check_write+0x14/0x20 [ 82.695650][ T2144] ? switch_fpu_return+0x15d/0x2c0 [ 82.725154][ T2144] __x64_sys_bpf+0x7c/0x90 [ 82.735253][ T2144] x64_sys_call+0x4b9/0x9a0 [ 82.742074][ T2144] do_syscall_64+0x4c/0xa0 [ 82.747073][ T2144] ? clear_bhb_loop+0x50/0xa0 [ 82.751893][ T2144] ? clear_bhb_loop+0x50/0xa0 [ 82.756733][ T2144] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.763510][ T2144] RIP: 0033:0x7fbc6ccf7799 [ 82.768149][ T2144] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.788750][ T2144] RSP: 002b:00007fbc6b752028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.797331][ T2144] RAX: ffffffffffffffda RBX: 00007fbc6cf70fa0 RCX: 00007fbc6ccf7799 [ 82.808393][ T2144] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 82.816479][ T2144] RBP: 00007fbc6cd8dbd9 R08: 0000000000000000 R09: 0000000000000000 [ 82.817101][ T2187] device syzkaller0 entered promiscuous mode [ 82.824669][ T2144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 82.838737][ T2144] R13: 00007fbc6cf71038 R14: 00007fbc6cf70fa0 R15: 00007ffc4a6de3a8 [ 82.846958][ T2144] [ 82.850249][ T2144] ---[ end trace d8c1226f860719ac ]--- [ 83.377093][ T2215] device syzkaller0 entered promiscuous mode [ 83.501356][ T2207] device syzkaller0 entered promiscuous mode [ 83.600421][ T2246] device veth1_macvtap left promiscuous mode [ 83.606643][ T2246] device macsec0 entered promiscuous mode [ 84.153983][ T2275] device syzkaller0 entered promiscuous mode [ 84.236417][ T2282] device syzkaller0 entered promiscuous mode [ 84.666336][ T30] audit: type=1400 audit(1772220761.246:141): avc: denied { ioctl } for pid=2308 comm="syz.2.621" path="uts:[4026532291]" dev="nsfs" ino=4026532291 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.718657][ T2317] device sit0 left promiscuous mode [ 84.898862][ T2323] device syzkaller0 entered promiscuous mode [ 85.175470][ T2346] device syzkaller0 entered promiscuous mode [ 86.802857][ T2429] device syzkaller0 entered promiscuous mode [ 87.803496][ T2530] device syzkaller0 entered promiscuous mode [ 89.655614][ T30] audit: type=1400 audit(1772220766.236:142): avc: denied { attach_queue } for pid=2612 comm="syz.1.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 89.721778][ T2613] device syzkaller0 entered promiscuous mode [ 89.929837][ T30] audit: type=1400 audit(1772220766.516:143): avc: denied { create } for pid=2645 comm="syz.4.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 90.133429][ T30] audit: type=1400 audit(1772220766.716:144): avc: denied { create } for pid=2652 comm="syz.3.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 90.516240][ T2649] device syzkaller0 entered promiscuous mode [ 93.437178][ T2753] device syzkaller0 entered promiscuous mode [ 94.609571][ T2807] device syzkaller0 entered promiscuous mode [ 94.866121][ T2817] syz.0.775 uses obsolete (PF_INET,SOCK_PACKET) [ 95.151558][ T2836] syz.4.781 (2836) used greatest stack depth: 22272 bytes left [ 96.086973][ T2856] device bridge0 entered promiscuous mode [ 96.130118][ T30] audit: type=1400 audit(1772220772.716:145): avc: denied { create } for pid=2855 comm="syz.2.789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 96.189005][ T2860] tap0: tun_chr_ioctl cmd 1074025675 [ 96.194463][ T2860] tap0: persist enabled [ 96.227149][ T2861] tap0: tun_chr_ioctl cmd 1074025675 [ 96.256469][ T2861] tap0: persist enabled [ 96.295879][ T2863] tap0: tun_chr_ioctl cmd 1074025675 [ 96.315183][ T2863] tap0: persist enabled [ 96.345499][ T2861] tap0: tun_chr_ioctl cmd 1074025675 [ 96.370953][ T2861] tap0: persist enabled [ 96.378951][ T2861] tap0: tun_chr_ioctl cmd 2147767507 [ 96.384493][ T2860] tap0: tun_chr_ioctl cmd 1074025675 [ 96.389982][ T2860] tap0: persist enabled [ 96.394379][ T2865] device sit0 entered promiscuous mode [ 96.548714][ T2897] device macsec0 left promiscuous mode [ 96.713556][ T2936] device syzkaller0 entered promiscuous mode [ 96.977242][ T2960] device sit0 entered promiscuous mode [ 97.825800][ T3010] device veth1_macvtap left promiscuous mode [ 97.848684][ T3010] device macsec0 entered promiscuous mode [ 100.285029][ T3118] device bridge0 entered promiscuous mode [ 102.222683][ T3189] &nr: renamed from bond_slave_1 [ 102.443224][ T3201] device syzkaller0 entered promiscuous mode [ 103.785675][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 103.860818][ T3230] Q±6ã`Ò˜: renamed from lo [ 104.039608][ T30] audit: type=1400 audit(1772220780.626:146): avc: denied { create } for pid=3231 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 106.155226][ T3292] device syzkaller0 entered promiscuous mode [ 106.729786][ T3316] device veth0_vlan left promiscuous mode [ 106.757162][ T3316] device veth0_vlan entered promiscuous mode [ 106.841555][ T3319] device syzkaller0 entered promiscuous mode [ 107.239109][ T3361] tap0: tun_chr_ioctl cmd 1074025672 [ 107.270021][ T3361] tap0: ignored: set checksum enabled [ 107.323713][ T3366] tap0: tun_chr_ioctl cmd 1074025680 [ 108.593792][ T30] audit: type=1400 audit(1772220785.176:147): avc: denied { create } for pid=3427 comm="syz.0.980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 108.910707][ T3459] bond_slave_1: mtu less than device minimum [ 109.114206][ T30] audit: type=1400 audit(1772220785.696:148): avc: denied { read } for pid=3473 comm="syz.4.996" dev="nsfs" ino=4026532293 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 109.167758][ T30] audit: type=1400 audit(1772220785.696:149): avc: denied { open } for pid=3473 comm="syz.4.996" path="cgroup:[4026532293]" dev="nsfs" ino=4026532293 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 109.661537][ T3505] device sit0 left promiscuous mode [ 109.975121][ T3525] device bond_slave_1 entered promiscuous mode [ 109.992049][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 110.002086][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.106772][ T3529] device syzkaller0 entered promiscuous mode [ 110.290432][ T3539] device syzkaller0 entered promiscuous mode [ 110.809883][ T3601] FAULT_INJECTION: forcing a failure. [ 110.809883][ T3601] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 110.842217][ T3601] CPU: 1 PID: 3601 Comm: syz.1.1039 Tainted: G W syzkaller #0 [ 110.851045][ T3601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.861138][ T3601] Call Trace: [ 110.864690][ T3601] [ 110.867672][ T3601] __dump_stack+0x21/0x30 [ 110.872052][ T3601] dump_stack_lvl+0x110/0x170 [ 110.876772][ T3601] ? show_regs_print_info+0x20/0x20 [ 110.882031][ T3601] ? vfs_write+0xc72/0xfd0 [ 110.886490][ T3601] dump_stack+0x15/0x20 [ 110.890747][ T3601] should_fail+0x3c1/0x510 [ 110.895207][ T3601] should_fail_usercopy+0x1a/0x20 [ 110.900274][ T3601] _copy_from_user+0x20/0xd0 [ 110.905343][ T3601] __sys_bpf+0x258/0x7d0 [ 110.909626][ T3601] ? bpf_link_show_fdinfo+0x330/0x330 [ 110.915038][ T3601] ? debug_smp_processor_id+0x17/0x20 [ 110.920452][ T3601] __x64_sys_bpf+0x7c/0x90 [ 110.924915][ T3601] x64_sys_call+0x4b9/0x9a0 [ 110.929454][ T3601] do_syscall_64+0x4c/0xa0 [ 110.933901][ T3601] ? clear_bhb_loop+0x50/0xa0 [ 110.938610][ T3601] ? clear_bhb_loop+0x50/0xa0 [ 110.943318][ T3601] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.949251][ T3601] RIP: 0033:0x7f707d4bf799 [ 110.953733][ T3601] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 110.973365][ T3601] RSP: 002b:00007f707bf1a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.981654][ T3608] device syzkaller0 entered promiscuous mode [ 110.981823][ T3601] RAX: ffffffffffffffda RBX: 00007f707d738fa0 RCX: 00007f707d4bf799 [ 110.995809][ T3601] RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 [ 111.003813][ T3601] RBP: 00007f707bf1a090 R08: 0000000000000000 R09: 0000000000000000 [ 111.011812][ T3601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.019807][ T3601] R13: 00007f707d739038 R14: 00007f707d738fa0 R15: 00007ffd32329e48 [ 111.027818][ T3601] [ 111.119234][ T3613] device syzkaller0 entered promiscuous mode [ 111.198692][ T3615] device syzkaller0 entered promiscuous mode [ 111.564028][ T3648] FAULT_INJECTION: forcing a failure. [ 111.564028][ T3648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.644040][ T3648] CPU: 1 PID: 3648 Comm: syz.1.1054 Tainted: G W syzkaller #0 [ 111.652868][ T3648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 111.662944][ T3648] Call Trace: [ 111.666234][ T3648] [ 111.669186][ T3648] __dump_stack+0x21/0x30 [ 111.673564][ T3648] dump_stack_lvl+0x110/0x170 [ 111.678273][ T3648] ? show_regs_print_info+0x20/0x20 [ 111.683503][ T3648] dump_stack+0x15/0x20 [ 111.687804][ T3648] should_fail+0x3c1/0x510 [ 111.692249][ T3648] should_fail_usercopy+0x1a/0x20 [ 111.697292][ T3648] strncpy_from_user+0x24/0x2e0 [ 111.702185][ T3648] bpf_prog_load+0x1fb/0x1640 [ 111.706878][ T3648] ? proc_fail_nth_write+0x180/0x200 [ 111.712211][ T3648] ? map_freeze+0x360/0x360 [ 111.716733][ T3648] ? selinux_bpf+0xc7/0xf0 [ 111.721167][ T3648] ? security_bpf+0x82/0xa0 [ 111.725678][ T3648] __sys_bpf+0x51d/0x7d0 [ 111.729937][ T3648] ? bpf_link_show_fdinfo+0x330/0x330 [ 111.735319][ T3648] ? debug_smp_processor_id+0x17/0x20 [ 111.740709][ T3648] __x64_sys_bpf+0x7c/0x90 [ 111.745138][ T3648] x64_sys_call+0x4b9/0x9a0 [ 111.749655][ T3648] do_syscall_64+0x4c/0xa0 [ 111.754084][ T3648] ? clear_bhb_loop+0x50/0xa0 [ 111.758770][ T3648] ? clear_bhb_loop+0x50/0xa0 [ 111.763463][ T3648] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 111.769369][ T3648] RIP: 0033:0x7f707d4bf799 [ 111.773820][ T3648] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 111.793439][ T3648] RSP: 002b:00007f707bf1a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.801864][ T3648] RAX: ffffffffffffffda RBX: 00007f707d738fa0 RCX: 00007f707d4bf799 [ 111.809853][ T3648] RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 [ 111.817839][ T3648] RBP: 00007f707bf1a090 R08: 0000000000000000 R09: 0000000000000000 [ 111.825824][ T3648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.833808][ T3648] R13: 00007f707d739038 R14: 00007f707d738fa0 R15: 00007ffd32329e48 [ 111.841804][ T3648] [ 111.974158][ T3667] nr0: tun_chr_ioctl cmd 1074025677 [ 111.980787][ T3667] nr0: linktype set to 825 [ 112.146718][ T3672] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.154931][ T3672] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.226609][ T3672] device bridge_slave_1 left promiscuous mode [ 112.241305][ T3672] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.272023][ T3672] device bridge_slave_0 left promiscuous mode [ 112.284755][ T3672] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.497533][ T30] audit: type=1400 audit(1772220789.086:150): avc: denied { ioctl } for pid=3676 comm="syz.3.1065" path="cgroup:[4026532529]" dev="nsfs" ino=4026532529 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 112.628301][ T3685] device syzkaller0 entered promiscuous mode [ 112.639535][ T3685] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 112.967718][ T3702] FAULT_INJECTION: forcing a failure. [ 112.967718][ T3702] name failslab, interval 1, probability 0, space 0, times 1 [ 113.040145][ T3702] CPU: 0 PID: 3702 Comm: syz.4.1074 Tainted: G W syzkaller #0 [ 113.048981][ T3702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 113.059067][ T3702] Call Trace: [ 113.062402][ T3702] [ 113.065355][ T3702] __dump_stack+0x21/0x30 [ 113.069720][ T3702] dump_stack_lvl+0x110/0x170 [ 113.074427][ T3702] ? show_regs_print_info+0x20/0x20 [ 113.079659][ T3702] ? __kernel_text_address+0xa0/0x100 [ 113.085066][ T3702] dump_stack+0x15/0x20 [ 113.089252][ T3702] should_fail+0x3c1/0x510 [ 113.093690][ T3702] __should_failslab+0xa4/0xe0 [ 113.098501][ T3702] should_failslab+0x9/0x20 [ 113.103033][ T3702] slab_pre_alloc_hook+0x3b/0xe0 [ 113.108009][ T3702] kmem_cache_alloc_trace+0x48/0x270 [ 113.113325][ T3702] ? __get_vm_area_node+0x11d/0x350 [ 113.118555][ T3702] __get_vm_area_node+0x11d/0x350 [ 113.123616][ T3702] __vmalloc_node_range+0xdf/0xaf0 [ 113.128767][ T3702] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.134346][ T3702] ? selinux_capset+0xf0/0xf0 [ 113.139059][ T3702] ? _kstrtoull+0x3c0/0x4d0 [ 113.143597][ T3702] ? avc_has_perm_noaudit+0x391/0x490 [ 113.149013][ T3702] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.154591][ T3702] __vmalloc+0x79/0x90 [ 113.158688][ T3702] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.164265][ T3702] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.169678][ T3702] bpf_prog_alloc+0x1f/0x1e0 [ 113.174553][ T3702] bpf_prog_load+0x822/0x1640 [ 113.179264][ T3702] ? map_freeze+0x360/0x360 [ 113.183808][ T3702] ? selinux_bpf+0xc7/0xf0 [ 113.188260][ T3702] ? security_bpf+0x82/0xa0 [ 113.192787][ T3702] __sys_bpf+0x51d/0x7d0 [ 113.197055][ T3702] ? bpf_link_show_fdinfo+0x330/0x330 [ 113.202458][ T3702] ? debug_smp_processor_id+0x17/0x20 [ 113.207859][ T3702] __x64_sys_bpf+0x7c/0x90 [ 113.212300][ T3702] x64_sys_call+0x4b9/0x9a0 [ 113.216835][ T3702] do_syscall_64+0x4c/0xa0 [ 113.221286][ T3702] ? clear_bhb_loop+0x50/0xa0 [ 113.225996][ T3702] ? clear_bhb_loop+0x50/0xa0 [ 113.230705][ T3702] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.236634][ T3702] RIP: 0033:0x7f54a7cf4799 [ 113.241087][ T3702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 113.260735][ T3702] RSP: 002b:00007f54a674f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.269226][ T3702] RAX: ffffffffffffffda RBX: 00007f54a7f6dfa0 RCX: 00007f54a7cf4799 [ 113.277233][ T3702] RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 [ 113.285340][ T3702] RBP: 00007f54a674f090 R08: 0000000000000000 R09: 0000000000000000 [ 113.293396][ T3702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.301403][ T3702] R13: 00007f54a7f6e038 R14: 00007f54a7f6dfa0 R15: 00007ffdc21ae478 [ 113.309416][ T3702] [ 113.484405][ T3702] syz.4.1074: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 113.562090][ T3702] CPU: 1 PID: 3702 Comm: syz.4.1074 Tainted: G W syzkaller #0 [ 113.571309][ T3702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 113.581807][ T3702] Call Trace: [ 113.585113][ T3702] [ 113.588084][ T3702] __dump_stack+0x21/0x30 [ 113.592478][ T3702] dump_stack_lvl+0x110/0x170 [ 113.597625][ T3702] ? show_regs_print_info+0x20/0x20 [ 113.602881][ T3702] ? pr_cont_kernfs_name+0xe3/0xf0 [ 113.608400][ T3702] dump_stack+0x15/0x20 [ 113.613006][ T3702] warn_alloc+0x1dc/0x200 [ 113.617365][ T3702] ? __should_failslab+0xa4/0xe0 [ 113.622364][ T3702] ? zone_watermark_ok_safe+0x270/0x270 [ 113.627950][ T3702] ? __get_vm_area_node+0x11d/0x350 [ 113.633605][ T3702] ? __get_vm_area_node+0x33e/0x350 [ 113.639259][ T3702] __vmalloc_node_range+0x152/0xaf0 [ 113.644942][ T3702] ? selinux_capset+0xf0/0xf0 [ 113.649652][ T3702] ? _kstrtoull+0x3c0/0x4d0 [ 113.654580][ T3702] ? avc_has_perm_noaudit+0x391/0x490 [ 113.659998][ T3702] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.665578][ T3702] __vmalloc+0x79/0x90 [ 113.669678][ T3702] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.675265][ T3702] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 113.681110][ T3702] bpf_prog_alloc+0x1f/0x1e0 [ 113.686123][ T3702] bpf_prog_load+0x822/0x1640 [ 113.690831][ T3702] ? map_freeze+0x360/0x360 [ 113.695787][ T3702] ? selinux_bpf+0xc7/0xf0 [ 113.700227][ T3702] ? security_bpf+0x82/0xa0 [ 113.704776][ T3702] __sys_bpf+0x51d/0x7d0 [ 113.709495][ T3702] ? bpf_link_show_fdinfo+0x330/0x330 [ 113.714919][ T3702] ? debug_smp_processor_id+0x17/0x20 [ 113.720751][ T3702] __x64_sys_bpf+0x7c/0x90 [ 113.725583][ T3702] x64_sys_call+0x4b9/0x9a0 [ 113.730117][ T3702] do_syscall_64+0x4c/0xa0 [ 113.734562][ T3702] ? clear_bhb_loop+0x50/0xa0 [ 113.739270][ T3702] ? clear_bhb_loop+0x50/0xa0 [ 113.743974][ T3702] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.750336][ T3702] RIP: 0033:0x7f54a7cf4799 [ 113.754777][ T3702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 113.775256][ T3702] RSP: 002b:00007f54a674f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.784127][ T3702] RAX: ffffffffffffffda RBX: 00007f54a7f6dfa0 RCX: 00007f54a7cf4799 [ 113.792570][ T3702] RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 [ 113.801003][ T3702] RBP: 00007f54a674f090 R08: 0000000000000000 R09: 0000000000000000 [ 113.809010][ T3702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.817416][ T3702] R13: 00007f54a7f6e038 R14: 00007f54a7f6dfa0 R15: 00007ffdc21ae478 [ 113.825817][ T3702] [ 113.846723][ T3702] Mem-Info: [ 113.850482][ T3702] active_anon:40 inactive_anon:28449 isolated_anon:0 [ 113.850482][ T3702] active_file:23186 inactive_file:3454 isolated_file:0 [ 113.850482][ T3702] unevictable:0 dirty:98 writeback:0 [ 113.850482][ T3702] slab_reclaimable:8195 slab_unreclaimable:75566 [ 113.850482][ T3702] mapped:39251 shmem:17683 pagetables:730 bounce:0 [ 113.850482][ T3702] kernel_misc_reclaimable:0 [ 113.850482][ T3702] free:1286480 free_pcp:21034 free_cma:0 [ 113.910294][ T3702] Node 0 active_anon:160kB inactive_anon:115596kB active_file:92744kB inactive_file:13816kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:157004kB dirty:392kB writeback:0kB shmem:72532kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4940kB pagetables:2920kB all_unreclaimable? no [ 113.943260][ T3702] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982764kB mlocked:0kB bounce:0kB free_pcp:3992kB local_pcp:3936kB free_cma:0kB [ 113.979152][ T3702] lowmem_reserve[]: 0 3941 3941 [ 113.991138][ T3702] Normal free:2144468kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:160kB inactive_anon:117556kB active_file:92744kB inactive_file:13816kB unevictable:0kB writepending:392kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:76600kB local_pcp:47860kB free_cma:0kB [ 114.187159][ T3702] lowmem_reserve[]: 0 0 0 [ 114.191749][ T3702] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 114.290576][ T3702] Normal: 1470*4kB (ME) 895*8kB (UME) 409*16kB (UM) 46*32kB (ME) 36*64kB (UME) 4*128kB (UM) 3*256kB (UME) 1*512kB (U) 2*1024kB (UE) 3*2048kB (UME) 498*4096kB (M) = 2073152kB [ 114.401579][ T3702] 50508 total pagecache pages [ 114.406322][ T3702] 0 pages in swap cache [ 114.432652][ T3702] Swap cache stats: add 0, delete 0, find 0/0 [ 117.351232][ T3702] Free swap = 124996kB [ 117.367916][ T3702] Total swap = 124996kB [ 117.382557][ T3702] 2097051 pages RAM [ 117.416928][ T3702] 0 pages HighMem/MovableOnly [ 117.442728][ T3702] 342336 pages reserved [ 117.476586][ T3702] 0 pages cma reserved [ 118.055598][ T3766] tap0: tun_chr_ioctl cmd 35108 [ 118.204158][ T3774] tap0: tun_chr_ioctl cmd 2147767511 [ 118.337108][ T3784] bridge0: port 3(veth1) entered blocking state [ 118.360554][ T3784] bridge0: port 3(veth1) entered disabled state [ 118.385770][ T3784] device veth1 entered promiscuous mode [ 118.464548][ T3784] device veth1 left promiscuous mode [ 118.475945][ T3784] bridge0: port 3(veth1) entered disabled state [ 118.679875][ T3798] FAULT_INJECTION: forcing a failure. [ 118.679875][ T3798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.729818][ T3798] CPU: 0 PID: 3798 Comm: syz.1.1106 Tainted: G W syzkaller #0 [ 118.738655][ T3798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 118.748743][ T3798] Call Trace: [ 118.752041][ T3798] [ 118.755432][ T3798] __dump_stack+0x21/0x30 [ 118.759795][ T3798] dump_stack_lvl+0x110/0x170 [ 118.764522][ T3798] ? show_regs_print_info+0x20/0x20 [ 118.769750][ T3798] ? vfs_write+0xc72/0xfd0 [ 118.774561][ T3798] dump_stack+0x15/0x20 [ 118.778738][ T3798] should_fail+0x3c1/0x510 [ 118.783180][ T3798] should_fail_usercopy+0x1a/0x20 [ 118.788224][ T3798] _copy_from_user+0x20/0xd0 [ 118.792842][ T3798] __sys_bpf+0x258/0x7d0 [ 118.797134][ T3798] ? bpf_link_show_fdinfo+0x330/0x330 [ 118.802956][ T3798] ? debug_smp_processor_id+0x17/0x20 [ 118.808744][ T3798] __x64_sys_bpf+0x7c/0x90 [ 118.813192][ T3798] x64_sys_call+0x4b9/0x9a0 [ 118.817716][ T3798] do_syscall_64+0x4c/0xa0 [ 118.822166][ T3798] ? clear_bhb_loop+0x50/0xa0 [ 118.826868][ T3798] ? clear_bhb_loop+0x50/0xa0 [ 118.831568][ T3798] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.837486][ T3798] RIP: 0033:0x7f707d4bf799 [ 118.841923][ T3798] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.862075][ T3798] RSP: 002b:00007f707bf1a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.870547][ T3798] RAX: ffffffffffffffda RBX: 00007f707d738fa0 RCX: 00007f707d4bf799 [ 118.878984][ T3798] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 118.887006][ T3798] RBP: 00007f707bf1a090 R08: 0000000000000000 R09: 0000000000000000 [ 118.895003][ T3798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.902988][ T3798] R13: 00007f707d739038 R14: 00007f707d738fa0 R15: 00007ffd32329e48 [ 118.911004][ T3798] [ 119.629607][ T3842] FAULT_INJECTION: forcing a failure. [ 119.629607][ T3842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.642813][ T3842] CPU: 1 PID: 3842 Comm: syz.4.1123 Tainted: G W syzkaller #0 [ 119.652047][ T3842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 119.662558][ T3842] Call Trace: [ 119.665863][ T3842] [ 119.668808][ T3842] __dump_stack+0x21/0x30 [ 119.673170][ T3842] dump_stack_lvl+0x110/0x170 [ 119.677865][ T3842] ? show_regs_print_info+0x20/0x20 [ 119.683093][ T3842] ? stack_trace_save+0xa6/0xf0 [ 119.687984][ T3842] dump_stack+0x15/0x20 [ 119.692168][ T3842] should_fail+0x3c1/0x510 [ 119.696607][ T3842] should_fail_usercopy+0x1a/0x20 [ 119.701646][ T3842] strncpy_from_user+0x24/0x2e0 [ 119.706662][ T3842] ? slab_free_freelist_hook+0xc2/0x190 [ 119.712244][ T3842] ? kmem_cache_free+0x100/0x320 [ 119.717205][ T3842] ? putname+0x111/0x160 [ 119.721480][ T3842] ? do_sys_openat2+0x6df/0x7f0 [ 119.726356][ T3842] ? __x64_sys_openat+0x136/0x160 [ 119.731406][ T3842] strncpy_from_user_nofault+0x73/0x150 [ 119.736977][ T3842] bpf_probe_read_compat_str+0xe6/0x180 [ 119.742548][ T3842] bpf_prog_65271ff8f24cc488+0x37/0x478 [ 119.748108][ T3842] __bpf_prog_test_run_raw_tp+0x132/0x2c0 [ 119.753852][ T3842] ? kstrtol_from_user+0x2a0/0x2a0 [ 119.758977][ T3842] ? bpf_prog_test_run_raw_tp+0x680/0x680 [ 119.764723][ T3842] bpf_prog_test_run_raw_tp+0x3f6/0x680 [ 119.770296][ T3842] ? bpf_prog_test_run_tracing+0x500/0x500 [ 119.776127][ T3842] ? fput_many+0x15a/0x1a0 [ 119.780564][ T3842] ? bpf_prog_test_run_tracing+0x500/0x500 [ 119.786387][ T3842] bpf_prog_test_run+0x3d5/0x630 [ 119.791337][ T3842] ? bpf_prog_query+0x230/0x230 [ 119.796206][ T3842] ? selinux_bpf+0xce/0xf0 [ 119.800636][ T3842] ? security_bpf+0x82/0xa0 [ 119.805156][ T3842] __sys_bpf+0x590/0x7d0 [ 119.809444][ T3842] ? bpf_link_show_fdinfo+0x330/0x330 [ 119.814841][ T3842] ? debug_smp_processor_id+0x17/0x20 [ 119.820224][ T3842] __x64_sys_bpf+0x7c/0x90 [ 119.824653][ T3842] x64_sys_call+0x4b9/0x9a0 [ 119.829169][ T3842] do_syscall_64+0x4c/0xa0 [ 119.833614][ T3842] ? clear_bhb_loop+0x50/0xa0 [ 119.838308][ T3842] ? clear_bhb_loop+0x50/0xa0 [ 119.843004][ T3842] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.848927][ T3842] RIP: 0033:0x7f54a7cf4799 [ 119.853367][ T3842] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 119.872987][ T3842] RSP: 002b:00007f54a674f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 119.881418][ T3842] RAX: ffffffffffffffda RBX: 00007f54a7f6dfa0 RCX: 00007f54a7cf4799 [ 119.889411][ T3842] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 119.897396][ T3842] RBP: 00007f54a674f090 R08: 0000000000000000 R09: 0000000000000000 [ 119.905390][ T3842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.913376][ T3842] R13: 00007f54a7f6e038 R14: 00007f54a7f6dfa0 R15: 00007ffdc21ae478 [ 119.921373][ T3842] [ 120.982678][ T30] audit: type=1400 audit(1772220797.566:151): avc: denied { create } for pid=3870 comm="syz.1.1132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 121.120285][ T3878] FAULT_INJECTION: forcing a failure. [ 121.120285][ T3878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.187002][ T3878] CPU: 0 PID: 3878 Comm: syz.1.1135 Tainted: G W syzkaller #0 [ 121.195825][ T3878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.205906][ T3878] Call Trace: [ 121.209249][ T3878] [ 121.212195][ T3878] __dump_stack+0x21/0x30 [ 121.216548][ T3878] dump_stack_lvl+0x110/0x170 [ 121.221267][ T3878] ? show_regs_print_info+0x20/0x20 [ 121.226498][ T3878] dump_stack+0x15/0x20 [ 121.230694][ T3878] should_fail+0x3c1/0x510 [ 121.235135][ T3878] should_fail_usercopy+0x1a/0x20 [ 121.240199][ T3878] _copy_to_user+0x20/0x90 [ 121.244644][ T3878] bpf_prog_test_run_raw_tp+0x500/0x680 [ 121.250217][ T3878] ? bpf_prog_test_run_tracing+0x500/0x500 [ 121.256055][ T3878] ? fput_many+0x15a/0x1a0 [ 121.260501][ T3878] ? bpf_prog_test_run_tracing+0x500/0x500 [ 121.266351][ T3878] bpf_prog_test_run+0x3d5/0x630 [ 121.271320][ T3878] ? bpf_prog_query+0x230/0x230 [ 121.276204][ T3878] ? selinux_bpf+0xce/0xf0 [ 121.280642][ T3878] ? security_bpf+0x82/0xa0 [ 121.285173][ T3878] __sys_bpf+0x590/0x7d0 [ 121.289443][ T3878] ? bpf_link_show_fdinfo+0x330/0x330 [ 121.294848][ T3878] ? debug_smp_processor_id+0x17/0x20 [ 121.300243][ T3878] __x64_sys_bpf+0x7c/0x90 [ 121.305105][ T3878] x64_sys_call+0x4b9/0x9a0 [ 121.309640][ T3878] do_syscall_64+0x4c/0xa0 [ 121.314087][ T3878] ? clear_bhb_loop+0x50/0xa0 [ 121.318794][ T3878] ? clear_bhb_loop+0x50/0xa0 [ 121.323879][ T3878] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 121.329811][ T3878] RIP: 0033:0x7f707d4bf799 [ 121.334252][ T3878] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.353911][ T3878] RSP: 002b:00007f707bf1a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.362341][ T3878] RAX: ffffffffffffffda RBX: 00007f707d738fa0 RCX: 00007f707d4bf799 [ 121.370324][ T3878] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 121.378315][ T3878] RBP: 00007f707bf1a090 R08: 0000000000000000 R09: 0000000000000000 [ 121.386306][ T3878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.394287][ T3878] R13: 00007f707d739038 R14: 00007f707d738fa0 R15: 00007ffd32329e48 [ 121.402280][ T3878] [ 121.582541][ T3884] device syzkaller0 entered promiscuous mode [ 121.922007][ T3916] FAULT_INJECTION: forcing a failure. [ 121.922007][ T3916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.996934][ T3916] CPU: 0 PID: 3916 Comm: syz.3.1148 Tainted: G W syzkaller #0 [ 122.006182][ T3916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 122.016268][ T3916] Call Trace: [ 122.019574][ T3916] [ 122.022537][ T3916] __dump_stack+0x21/0x30 [ 122.026905][ T3916] dump_stack_lvl+0x110/0x170 [ 122.031616][ T3916] ? show_regs_print_info+0x20/0x20 [ 122.036851][ T3916] dump_stack+0x15/0x20 [ 122.041076][ T3916] should_fail+0x3c1/0x510 [ 122.045533][ T3916] should_fail_usercopy+0x1a/0x20 [ 122.051024][ T3916] _copy_to_user+0x20/0x90 [ 122.055477][ T3916] simple_read_from_buffer+0xe9/0x160 [ 122.060880][ T3916] proc_fail_nth_read+0x1a6/0x220 [ 122.066362][ T3916] ? proc_fault_inject_write+0x310/0x310 [ 122.072036][ T3916] ? security_file_permission+0x83/0xa0 [ 122.077612][ T3916] ? proc_fault_inject_write+0x310/0x310 [ 122.083266][ T3916] vfs_read+0x28d/0xc40 [ 122.087439][ T3916] ? __kasan_check_write+0x14/0x20 [ 122.092563][ T3916] ? kernel_read+0x1f0/0x1f0 [ 122.097165][ T3916] ? __kasan_check_write+0x14/0x20 [ 122.102287][ T3916] ? mutex_lock+0x9b/0x1c0 [ 122.106716][ T3916] ? wait_for_completion_killable_timeout+0x10/0x10 [ 122.113315][ T3916] ? __fget_files+0x2c4/0x320 [ 122.118011][ T3916] ? __fdget_pos+0x2d2/0x380 [ 122.122614][ T3916] ? ksys_read+0x71/0x250 [ 122.126949][ T3916] ksys_read+0x149/0x250 [ 122.131201][ T3916] ? vfs_write+0xfd0/0xfd0 [ 122.135622][ T3916] ? debug_smp_processor_id+0x17/0x20 [ 122.141013][ T3916] __x64_sys_read+0x7b/0x90 [ 122.145552][ T3916] x64_sys_call+0x96d/0x9a0 [ 122.150067][ T3916] do_syscall_64+0x4c/0xa0 [ 122.154498][ T3916] ? clear_bhb_loop+0x50/0xa0 [ 122.159186][ T3916] ? clear_bhb_loop+0x50/0xa0 [ 122.163876][ T3916] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 122.169786][ T3916] RIP: 0033:0x7f78bf3adfce [ 122.174215][ T3916] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 122.193830][ T3916] RSP: 002b:00007f78bde47fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 122.202263][ T3916] RAX: ffffffffffffffda RBX: 00007f78bde486c0 RCX: 00007f78bf3adfce [ 122.210252][ T3916] RDX: 000000000000000f RSI: 00007f78bde480a0 RDI: 0000000000000005 [ 122.218248][ T3916] RBP: 00007f78bde48090 R08: 0000000000000000 R09: 0000000000000000 [ 122.226235][ T3916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.234216][ T3916] R13: 00007f78bf667038 R14: 00007f78bf666fa0 R15: 00007ffd708fa9c8 [ 122.242206][ T3916] [ 122.256072][ T30] audit: type=1400 audit(1772220798.836:152): avc: denied { create } for pid=3917 comm="syz.2.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 122.587553][ T3941] device syzkaller0 entered promiscuous mode [ 122.654862][ T3952] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.662551][ T3952] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.682233][ T3952] device bridge0 left promiscuous mode [ 122.694187][ T3957] device bridge_slave_1 left promiscuous mode [ 122.707772][ T3957] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.715584][ T3957] device bridge_slave_0 left promiscuous mode [ 122.744322][ T3957] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.059607][ T281] syz-executor (281) used greatest stack depth: 21760 bytes left [ 123.347129][ T3981] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.359754][ T3981] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.375018][ T3981] device bridge_slave_0 entered promiscuous mode [ 123.407298][ T3981] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.419889][ T3981] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.428432][ T3981] device bridge_slave_1 entered promiscuous mode [ 123.583386][ T30] audit: type=1400 audit(1772220800.166:153): avc: denied { create } for pid=3981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 123.610791][ T3981] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.617909][ T3981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.625492][ T3981] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.632585][ T3981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.641780][ T30] audit: type=1400 audit(1772220800.186:154): avc: denied { write } for pid=3981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 123.667925][ T30] audit: type=1400 audit(1772220800.186:155): avc: denied { read } for pid=3981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 123.715510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.737450][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.757180][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.776481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.794313][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.801459][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.842524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.851054][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.858267][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.877650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.926889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.602658][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.645519][ T3981] device veth0_vlan entered promiscuous mode [ 125.675875][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.685624][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.718689][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.735130][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.804632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.823233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.848775][ T3981] device veth1_macvtap entered promiscuous mode [ 126.300582][ T4021] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.307761][ T4021] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.315330][ T4021] device bridge_slave_0 entered promiscuous mode [ 126.324616][ T4021] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.331948][ T4021] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.351397][ T4021] device bridge_slave_1 entered promiscuous mode [ 126.358453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.366308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.381379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.390866][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.399544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.538738][ T4057] device syzkaller0 entered promiscuous mode [ 126.626294][ T3981] syz-executor (3981) used greatest stack depth: 21728 bytes left [ 127.055882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.084000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.342484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.356302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.392958][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.400096][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.461742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.503223][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.547469][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.554575][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.629222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.647261][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.677215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.707231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.746879][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.764911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 127.847474][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.896349][ T4021] device veth0_vlan entered promiscuous mode [ 127.920969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 127.947372][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.973081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.998418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.038720][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 128.050337][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.083305][ T4021] device veth1_macvtap entered promiscuous mode [ 128.123064][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 128.132840][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.147452][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.186558][ T4070] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.193914][ T4070] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.201726][ T4070] device bridge_slave_0 entered promiscuous mode [ 128.211661][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.227583][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.255381][ T4070] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.262806][ T4070] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.271041][ T4070] device bridge_slave_1 entered promiscuous mode [ 128.576868][ T4070] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.583964][ T4070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.591299][ T4070] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.598383][ T4070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.764171][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.774255][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.890941][ T302] device bridge_slave_1 left promiscuous mode [ 128.907101][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.941824][ T302] device bridge_slave_0 left promiscuous mode [ 128.966233][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.998390][ T302] device veth1_macvtap left promiscuous mode [ 129.015309][ T302] device veth0_vlan left promiscuous mode [ 129.505157][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.537340][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.606006][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.703938][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.756950][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.764070][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.798762][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.837393][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.858672][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.865787][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.951977][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.963931][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.047107][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.077063][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.178814][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.193638][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.303149][ T4070] device veth0_vlan entered promiscuous mode [ 130.347566][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.357215][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.377936][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.407890][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.588326][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.607248][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.618242][ T4070] device veth1_macvtap entered promiscuous mode [ 130.707046][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.732792][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.797890][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.820082][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.837338][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.804216][ T4183] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.870415][ T4183] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.887473][ T4183] device bridge_slave_0 entered promiscuous mode [ 131.931381][ T4183] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.943985][ T4183] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.087890][ T4183] device bridge_slave_1 entered promiscuous mode [ 132.404373][ T4206] device syzkaller0 entered promiscuous mode [ 132.648222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.660838][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.713620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.744739][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.763684][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.770892][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.801417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.818349][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.857702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.888439][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.895541][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.942811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.951644][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.960755][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.023018][ T4183] device veth0_vlan entered promiscuous mode [ 133.037788][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.053263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.087383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.127519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.136474][ T302] device bridge_slave_1 left promiscuous mode [ 133.143668][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.176708][ T302] device bridge_slave_0 left promiscuous mode [ 133.183080][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.200628][ T302] device bridge_slave_1 left promiscuous mode [ 133.208281][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.216005][ T302] device bridge_slave_0 left promiscuous mode [ 133.250830][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.267204][ T302] device veth1_macvtap left promiscuous mode [ 133.307183][ T302] device veth0_vlan left promiscuous mode [ 133.617796][ T4183] device veth1_macvtap entered promiscuous mode [ 133.670138][ T4248] device syzkaller0 entered promiscuous mode [ 133.754529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.764495][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.834099][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.843202][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.966254][ T4279] device syzkaller0 entered promiscuous mode [ 133.974726][ T1253] syzkaller0: tun_net_xmit 48 [ 134.000274][ T4279] syzkaller0: tun_net_xmit 1280 [ 134.039645][ T4279] syzkaller0: create flow: hash 1436886339 index 1 [ 134.125936][ T4278] syzkaller0: delete flow: hash 1436886339 index 1 [ 134.862177][ T4302] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.869505][ T4302] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.878085][ T4302] device bridge_slave_0 entered promiscuous mode [ 134.894732][ T4302] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.901862][ T4302] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.967905][ T4302] device bridge_slave_1 entered promiscuous mode [ 135.084381][ T4316] device syzkaller0 entered promiscuous mode [ 135.294507][ T4316] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 135.301555][ T4316] syzkaller0: Linktype set failed because interface is up [ 135.597724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.605311][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.672576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.681236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.689887][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.697000][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.705563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.714519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.723906][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.731005][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.836667][ T4340] device syzkaller0 entered promiscuous mode [ 135.873781][ T302] device bridge_slave_1 left promiscuous mode [ 135.881232][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.896147][ T302] device bridge_slave_0 left promiscuous mode [ 135.902737][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.911598][ T302] device veth1_macvtap left promiscuous mode [ 135.917820][ T302] device veth0_vlan left promiscuous mode [ 136.042267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.050282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.058740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.128444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.137877][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.146103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.155444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.166374][ T4302] device veth0_vlan entered promiscuous mode [ 136.237136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.247909][ T4302] device veth1_macvtap entered promiscuous mode [ 136.274220][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.283948][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.300331][ T4380] device syzkaller0 entered promiscuous mode [ 138.535761][ T4391] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.548478][ T4391] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.556598][ T4391] device bridge_slave_0 entered promiscuous mode [ 138.584412][ T4412] device pim6reg1 entered promiscuous mode [ 138.592361][ T4391] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.605007][ T4391] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.613282][ T4391] device bridge_slave_1 entered promiscuous mode [ 138.630369][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 138.745096][ T302] device bridge_slave_1 left promiscuous mode [ 138.756366][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.805512][ T302] device bridge_slave_0 left promiscuous mode [ 138.811834][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.834261][ T302] device veth1_macvtap left promiscuous mode [ 138.840556][ T302] device veth0_vlan left promiscuous mode [ 139.053180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.062165][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.088289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.097709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.106085][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.113207][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.138192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.153251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.170116][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.177256][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.249499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.269316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.284359][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.313352][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.328613][ T4391] device veth0_vlan entered promiscuous mode [ 139.335487][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.345337][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.353331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.371814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.381461][ T4391] device veth1_macvtap entered promiscuous mode [ 139.425190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.447198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.048712][ T302] device bridge_slave_1 left promiscuous mode [ 140.054943][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.062675][ T302] device bridge_slave_0 left promiscuous mode [ 140.068921][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.076922][ T302] device veth1_macvtap left promiscuous mode [ 140.082949][ T302] device veth0_vlan left promiscuous mode [ 140.758633][ T4488] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.834933][ T4488] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.884252][ T4488] device bridge_slave_0 entered promiscuous mode [ 140.952187][ T4488] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.986403][ T4488] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.037341][ T4488] device bridge_slave_1 entered promiscuous mode [ 141.103594][ T4488] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.110721][ T4488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.118060][ T4488] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.125110][ T4488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.171808][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.238402][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.256724][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.269614][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.301899][ T4499] device sit0 entered promiscuous mode [ 141.410073][ T4507] device sit0 entered promiscuous mode [ 141.513389][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.526201][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.533358][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.553690][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.569705][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.576936][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.661525][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.670515][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.700139][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.750795][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.764758][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.793086][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.812642][ T4488] device veth0_vlan entered promiscuous mode [ 141.852515][ T4488] device veth1_macvtap entered promiscuous mode [ 141.859632][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.876710][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.885744][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.938439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.957283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.976430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.988044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.082354][ T4576] device syzkaller0 entered promiscuous mode [ 146.607624][ T4613] device syzkaller0 entered promiscuous mode [ 146.771982][ T4590] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.847755][ T4590] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.861926][ T4590] device bridge_slave_0 entered promiscuous mode [ 146.874705][ T4590] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.952949][ T4590] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.960835][ T4590] device bridge_slave_1 entered promiscuous mode [ 147.280873][ T358] device bridge_slave_1 left promiscuous mode [ 147.288903][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.316757][ T358] device bridge_slave_0 left promiscuous mode [ 147.326328][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.341343][ T358] device veth1_macvtap left promiscuous mode [ 147.351886][ T358] device veth0_vlan left promiscuous mode [ 147.543976][ T4590] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.551096][ T4590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.558462][ T4590] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.565791][ T4590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.119584][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.129568][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.151312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.159154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.181338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.203464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.211989][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.219082][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.248363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.257351][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.268046][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.275127][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.289928][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.300160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.308394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.316692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.332937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.341844][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.356343][ T4590] device veth0_vlan entered promiscuous mode [ 149.367748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.375865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.397374][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.415822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.435277][ T4590] device veth1_macvtap entered promiscuous mode [ 149.453965][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.469283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.487214][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.535134][ T4695] device syzkaller0 entered promiscuous mode [ 149.546189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.555408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.567952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.576525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.682282][ T4712] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.690784][ T4712] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.704751][ T4712] device bridge0 left promiscuous mode [ 149.742141][ T4715] device bridge_slave_1 left promiscuous mode [ 149.774207][ T4715] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.807057][ T4715] device bridge_slave_0 left promiscuous mode [ 149.813262][ T4715] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.161987][ T4725] device syzkaller0 entered promiscuous mode [ 151.302775][ T4751] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.339801][ T4751] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.378035][ T4751] device bridge_slave_0 entered promiscuous mode [ 151.418369][ T4751] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.437461][ T4751] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.458110][ T4751] device bridge_slave_1 entered promiscuous mode [ 151.477365][ T358] device bridge_slave_1 left promiscuous mode [ 151.484817][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.727582][ T358] device bridge_slave_0 left promiscuous mode [ 153.733814][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.789246][ T358] device veth1_macvtap left promiscuous mode [ 153.823535][ T358] device veth0_vlan left promiscuous mode [ 154.442367][ T4751] device veth0_vlan entered promiscuous mode [ 154.469829][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.512464][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.536062][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.555861][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.617780][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.666073][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.705855][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.734319][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.764160][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.781941][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.804505][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.811660][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.842983][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.863447][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.880414][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.887648][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.904689][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.971142][ T4751] device veth1_macvtap entered promiscuous mode [ 154.987653][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.068907][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.078829][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.109529][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.142043][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.465743][ T4836] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 155.487776][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 156.433780][ T4857] FAULT_INJECTION: forcing a failure. [ 156.433780][ T4857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.457583][ T4857] CPU: 0 PID: 4857 Comm: syz.4.1430 Tainted: G W syzkaller #0 [ 156.466412][ T4857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 156.476490][ T4857] Call Trace: [ 156.479787][ T4857] [ 156.482729][ T4857] __dump_stack+0x21/0x30 [ 156.487082][ T4857] dump_stack_lvl+0x110/0x170 [ 156.491778][ T4857] ? show_regs_print_info+0x20/0x20 [ 156.496987][ T4857] ? vfs_write+0xc72/0xfd0 [ 156.501425][ T4857] dump_stack+0x15/0x20 [ 156.505593][ T4857] should_fail+0x3c1/0x510 [ 156.510049][ T4857] should_fail_usercopy+0x1a/0x20 [ 156.515101][ T4857] _copy_from_user+0x20/0xd0 [ 156.519730][ T4857] __sys_bpf+0x258/0x7d0 [ 156.523991][ T4857] ? bpf_link_show_fdinfo+0x330/0x330 [ 156.529379][ T4857] ? debug_smp_processor_id+0x17/0x20 [ 156.534771][ T4857] __x64_sys_bpf+0x7c/0x90 [ 156.539208][ T4857] x64_sys_call+0x4b9/0x9a0 [ 156.543727][ T4857] do_syscall_64+0x4c/0xa0 [ 156.548263][ T4857] ? clear_bhb_loop+0x50/0xa0 [ 156.552956][ T4857] ? clear_bhb_loop+0x50/0xa0 [ 156.557655][ T4857] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.563578][ T4857] RIP: 0033:0x7f54a7cf4799 [ 156.568009][ T4857] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.587788][ T4857] RSP: 002b:00007f54a674f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.596232][ T4857] RAX: ffffffffffffffda RBX: 00007f54a7f6dfa0 RCX: 00007f54a7cf4799 [ 156.604225][ T4857] RDX: 0000000000000094 RSI: 0000200000000100 RDI: 0000000000000005 [ 156.612215][ T4857] RBP: 00007f54a674f090 R08: 0000000000000000 R09: 0000000000000000 [ 156.620203][ T4857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.628193][ T4857] R13: 00007f54a7f6e038 R14: 00007f54a7f6dfa0 R15: 00007ffdc21ae478 [ 156.636183][ T4857] [ 156.743574][ T4861] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.762012][ T4861] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.769747][ T4861] device bridge_slave_0 entered promiscuous mode [ 156.784549][ T4861] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.793299][ T4861] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.801238][ T4861] device bridge_slave_1 entered promiscuous mode [ 156.839609][ T4882] device syzkaller0 entered promiscuous mode [ 157.250609][ T358] device bridge_slave_1 left promiscuous mode [ 157.258203][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.266651][ T358] device bridge_slave_0 left promiscuous mode [ 157.281158][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.314550][ T4914] FAULT_INJECTION: forcing a failure. [ 157.314550][ T4914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.327948][ T4914] CPU: 1 PID: 4914 Comm: syz.5.1445 Tainted: G W syzkaller #0 [ 157.336757][ T4914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 157.346847][ T4914] Call Trace: [ 157.350148][ T4914] [ 157.353100][ T4914] __dump_stack+0x21/0x30 [ 157.357465][ T4914] dump_stack_lvl+0x110/0x170 [ 157.362167][ T4914] ? show_regs_print_info+0x20/0x20 [ 157.367407][ T4914] dump_stack+0x15/0x20 [ 157.371599][ T4914] should_fail+0x3c1/0x510 [ 157.376048][ T4914] should_fail_usercopy+0x1a/0x20 [ 157.381096][ T4914] strncpy_from_user+0x24/0x2e0 [ 157.385982][ T4914] bpf_prog_load+0x1fb/0x1640 [ 157.390679][ T4914] ? proc_fail_nth_write+0x180/0x200 [ 157.395983][ T4914] ? map_freeze+0x360/0x360 [ 157.400510][ T4914] ? selinux_bpf+0xc7/0xf0 [ 157.404939][ T4914] ? security_bpf+0x82/0xa0 [ 157.409457][ T4914] __sys_bpf+0x51d/0x7d0 [ 157.413710][ T4914] ? bpf_link_show_fdinfo+0x330/0x330 [ 157.419114][ T4914] ? debug_smp_processor_id+0x17/0x20 [ 157.424508][ T4914] __x64_sys_bpf+0x7c/0x90 [ 157.428948][ T4914] x64_sys_call+0x4b9/0x9a0 [ 157.433468][ T4914] do_syscall_64+0x4c/0xa0 [ 157.437903][ T4914] ? clear_bhb_loop+0x50/0xa0 [ 157.442600][ T4914] ? clear_bhb_loop+0x50/0xa0 [ 157.447294][ T4914] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 157.453208][ T4914] RIP: 0033:0x7f0646819799 [ 157.457654][ T4914] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 157.477382][ T4914] RSP: 002b:00007f0645274028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 157.485827][ T4914] RAX: ffffffffffffffda RBX: 00007f0646a92fa0 RCX: 00007f0646819799 [ 157.493821][ T4914] RDX: 0000000000000094 RSI: 0000200000000100 RDI: 0000000000000005 [ 157.501811][ T4914] RBP: 00007f0645274090 R08: 0000000000000000 R09: 0000000000000000 [ 157.509797][ T4914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.517786][ T4914] R13: 00007f0646a93038 R14: 00007f0646a92fa0 R15: 00007ffc97a04178 [ 157.525790][ T4914] [ 157.535142][ T358] device veth1_macvtap left promiscuous mode [ 157.545024][ T358] device veth0_vlan left promiscuous mode [ 161.613942][ T4927] device syzkaller0 entered promiscuous mode [ 161.653995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.668410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.709256][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.719162][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.727830][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.734914][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.769789][ T4861] device veth0_vlan entered promiscuous mode [ 161.783656][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.798340][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.812463][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.824477][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.831614][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.854457][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.871561][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.888457][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.909830][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.935952][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.958725][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.982511][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.004973][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.031623][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.039363][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.053642][ T4861] device veth1_macvtap entered promiscuous mode [ 162.089757][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.108297][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.175636][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.306906][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.325610][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.335461][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 162.365980][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.578847][ T4944] device lo entered promiscuous mode [ 162.727332][ T4947] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.734633][ T4947] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.001415][ T4958] device sit0 entered promiscuous mode [ 164.140493][ T358] device bridge_slave_1 left promiscuous mode [ 164.146764][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.164823][ T358] device bridge_slave_0 left promiscuous mode [ 164.197147][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.252851][ T358] device veth1_macvtap left promiscuous mode [ 164.267013][ T358] device veth0_vlan left promiscuous mode [ 164.736679][ T4968] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.744169][ T4968] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.751918][ T4968] device bridge_slave_0 entered promiscuous mode [ 164.759147][ T4968] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.776844][ T4968] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.784428][ T4968] device bridge_slave_1 entered promiscuous mode [ 164.841909][ T4999] device syzkaller0 entered promiscuous mode [ 164.860063][ T4998] tap1: tun_chr_ioctl cmd 1074025672 [ 164.865961][ T4998] tap1: ignored: set checksum disabled [ 164.872101][ T4998] tap1: tun_chr_ioctl cmd 1074025677 [ 164.877718][ T4998] tap1: linktype set to 768 [ 164.957038][ T4968] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.964147][ T4968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.989870][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.006704][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.019424][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.037947][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.047999][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.057636][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.064735][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.072406][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.081463][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.088560][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.121530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.138153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.155428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.169375][ T4968] device veth0_vlan entered promiscuous mode [ 165.182714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.194432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.203889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.225246][ T4968] device veth1_macvtap entered promiscuous mode [ 165.236510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.246737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.256935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.188249][ T8] device bridge_slave_1 left promiscuous mode [ 166.194394][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.202022][ T8] device bridge_slave_0 left promiscuous mode [ 166.208259][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.216239][ T8] device veth1_macvtap left promiscuous mode [ 166.222334][ T8] device veth0_vlan left promiscuous mode [ 166.766351][ T5054] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.773594][ T5054] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.781650][ T5054] device bridge_slave_0 entered promiscuous mode [ 166.789586][ T5054] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.804916][ T5054] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.835109][ T5054] device bridge_slave_1 entered promiscuous mode [ 166.988823][ T5069] device syzkaller0 entered promiscuous mode [ 167.328144][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.338115][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.369678][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.384039][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.394309][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.401436][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.409015][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.417545][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.426161][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.433270][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.446575][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.456424][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.465097][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.504818][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.532852][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.541854][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.560056][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.580346][ T5054] device veth0_vlan entered promiscuous mode [ 167.659897][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.710493][ T5054] device veth1_macvtap entered promiscuous mode [ 167.748944][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.806999][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.787630][ T8] device bridge_slave_1 left promiscuous mode [ 168.793769][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.801430][ T8] device bridge_slave_0 left promiscuous mode [ 168.807657][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.815700][ T8] device veth1_macvtap left promiscuous mode [ 168.821786][ T8] device veth0_vlan left promiscuous mode [ 169.821149][ T5121] tap0: tun_chr_ioctl cmd 2147767511 [ 169.831084][ T5108] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.861663][ T5108] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.888514][ T5108] device bridge_slave_0 entered promiscuous mode [ 170.172609][ T5108] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.180315][ T5108] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.190763][ T5108] device bridge_slave_1 entered promiscuous mode [ 170.364680][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.442866][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.514355][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.526680][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.535302][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.542420][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.550937][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.606069][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.627394][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.655103][ T5149] syz.4.1513[5149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.656287][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.674734][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.758109][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.771495][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.785756][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.799906][ T5108] device veth0_vlan entered promiscuous mode [ 170.814784][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.912245][ T5108] device veth1_macvtap entered promiscuous mode [ 170.921371][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.930054][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.937811][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.971726][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.980602][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.147576][ T302] device bridge_slave_1 left promiscuous mode [ 172.153725][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.161448][ T302] device bridge_slave_0 left promiscuous mode [ 172.167625][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.175674][ T302] device veth1_macvtap left promiscuous mode [ 172.181767][ T302] device veth0_vlan left promiscuous mode [ 172.604578][ T5182] device syzkaller0 entered promiscuous mode [ 172.672346][ T5191] device syzkaller0 entered promiscuous mode [ 173.568624][ T5207] device syzkaller0 entered promiscuous mode [ 173.590855][ T5189] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.616865][ T5189] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.624470][ T5189] device bridge_slave_0 entered promiscuous mode [ 173.632194][ T5189] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.655241][ T5189] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.670580][ T5189] device bridge_slave_1 entered promiscuous mode [ 173.802813][ T5189] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.809939][ T5189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.850112][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.861736][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.871454][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.880180][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.887952][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.895562][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.904483][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.912945][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.920045][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.984436][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.001721][ T5189] device veth0_vlan entered promiscuous mode [ 174.008468][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.027832][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.035446][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.050357][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.061223][ T5189] device veth1_macvtap entered promiscuous mode [ 174.072925][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.093264][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.647491][ T358] device bridge_slave_1 left promiscuous mode [ 174.653639][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.661479][ T358] device bridge_slave_0 left promiscuous mode [ 174.667924][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.676235][ T358] device veth1_macvtap left promiscuous mode [ 174.682533][ T358] device veth0_vlan left promiscuous mode [ 175.832348][ T5243] device syzkaller0 entered promiscuous mode [ 175.952041][ T5249] device syzkaller0 entered promiscuous mode [ 176.194182][ T5258] device syzkaller0 entered promiscuous mode [ 176.219182][ T5248] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.226367][ T5248] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.234199][ T5248] device bridge_slave_0 entered promiscuous mode [ 176.245716][ T5248] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.253206][ T5248] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.260997][ T5248] device bridge_slave_1 entered promiscuous mode [ 176.563868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.572100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.639319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.657368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.699830][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.706974][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.714782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.723319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.731887][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.739011][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.746542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.755742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.763995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.896329][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.904649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.969021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.011738][ T5248] device veth0_vlan entered promiscuous mode [ 177.021970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.030449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.038075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.145724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.169734][ T5248] device veth1_macvtap entered promiscuous mode [ 177.206079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.215864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.261573][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.270202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.737530][ T358] device bridge_slave_1 left promiscuous mode [ 178.743798][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.751377][ T358] device bridge_slave_0 left promiscuous mode [ 178.757551][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.765385][ T358] device veth1_macvtap left promiscuous mode [ 178.771464][ T358] device veth0_vlan left promiscuous mode [ 179.151782][ T5309] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.159375][ T5309] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.166972][ T5309] device bridge_slave_0 entered promiscuous mode [ 179.174440][ T5309] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.181562][ T5309] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.192094][ T5309] device bridge_slave_1 entered promiscuous mode [ 179.289480][ T5309] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.296681][ T5309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.304157][ T5309] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.311250][ T5309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.343166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.353182][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.363995][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.391513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.399969][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.407083][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.414949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.423566][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.430691][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.438638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.477579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.497220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.522030][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.547724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.584600][ T5309] device veth0_vlan entered promiscuous mode [ 179.606669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.626670][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.662036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.685012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.704949][ T5309] device veth1_macvtap entered promiscuous mode [ 179.721671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.730125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.738660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.751347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.760379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.788932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.797716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.588061][ T302] device bridge_slave_1 left promiscuous mode [ 180.594203][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.601816][ T302] device bridge_slave_0 left promiscuous mode [ 180.608010][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.615815][ T302] device veth1_macvtap left promiscuous mode [ 180.621900][ T302] device veth0_vlan left promiscuous mode [ 181.520972][ T5368] sock: sock_set_timeout: `syz.5.1578' (pid 5368) tries to set negative timeout [ 181.742700][ T5373] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.760104][ T5373] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.769220][ T5373] device bridge_slave_0 entered promiscuous mode [ 181.776255][ T5388] device sit0 left promiscuous mode [ 181.799527][ T5373] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.806609][ T5373] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.827775][ T5373] device bridge_slave_1 entered promiscuous mode [ 182.021293][ T5373] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.028503][ T5373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.035890][ T5373] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.042974][ T5373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.073679][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.087006][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.107243][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.129036][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.137965][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.145032][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.153096][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.162064][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.169144][ T358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.176567][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.184716][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.202027][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.214546][ T5373] device veth0_vlan entered promiscuous mode [ 182.231377][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.239695][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.247308][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.260932][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.271685][ T5373] device veth1_macvtap entered promiscuous mode [ 182.288058][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.302383][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.267703][ T302] device bridge_slave_1 left promiscuous mode [ 183.273935][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.281568][ T302] device bridge_slave_0 left promiscuous mode [ 183.287777][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.295772][ T302] device veth1_macvtap left promiscuous mode [ 183.301836][ T302] device veth0_vlan left promiscuous mode [ 184.135555][ T5487] device veth0_vlan left promiscuous mode [ 184.145620][ T5487] device veth0_vlan entered promiscuous mode [ 184.153374][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.168687][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.196617][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.370723][ T5495] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.378004][ T5495] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.385598][ T5495] device bridge_slave_0 entered promiscuous mode [ 184.393231][ T5495] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.400526][ T5495] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.408606][ T5495] device bridge_slave_1 entered promiscuous mode [ 184.521278][ T5524] syz.3.1611[5524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.562666][ T5495] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.581130][ T5495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.588475][ T5495] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.595557][ T5495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.728856][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.740136][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.895218][ T5543] device syzkaller0 entered promiscuous mode [ 184.945961][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.953579][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.093780][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.108872][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.118219][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.125300][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.133505][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.143724][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.154038][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.161127][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.217887][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.229563][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.239067][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.248726][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.351352][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.364947][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.379125][ T5495] device veth0_vlan entered promiscuous mode [ 185.385479][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.396595][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.422090][ T5495] device veth1_macvtap entered promiscuous mode [ 185.456619][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.464548][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.489194][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.512123][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.528051][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.566281][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.605996][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.633482][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.642448][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.735516][ T5591] tap0: tun_chr_ioctl cmd 1074025677 [ 185.741803][ T5591] tap0: linktype set to 823 [ 186.947510][ T302] device bridge_slave_1 left promiscuous mode [ 186.953641][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.961257][ T302] device bridge_slave_0 left promiscuous mode [ 186.967403][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.975336][ T302] device veth1_macvtap left promiscuous mode [ 186.981447][ T302] device veth0_vlan left promiscuous mode [ 187.792004][ T5613] device syzkaller0 entered promiscuous mode [ 187.890648][ T5614] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.899171][ T5614] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.907090][ T5614] device bridge_slave_0 entered promiscuous mode [ 187.939413][ T5614] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.949921][ T5614] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.957753][ T5614] device bridge_slave_1 entered promiscuous mode [ 188.147762][ T5614] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.154882][ T5614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.162227][ T5614] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.169305][ T5614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.225749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.256995][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.306949][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.393652][ T5639] device syzkaller0 entered promiscuous mode [ 188.402457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.413947][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.421058][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.454771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.463723][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.470853][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.568260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.578625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.742845][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.767920][ T5647] device syzkaller0 entered promiscuous mode [ 188.825770][ T5614] device veth0_vlan entered promiscuous mode [ 188.835016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.843397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.851260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.010475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.019414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.029276][ T5614] device veth1_macvtap entered promiscuous mode [ 189.049887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.060095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.075026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.124096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.156334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.567960][ T302] device bridge_slave_1 left promiscuous mode [ 190.574180][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.581781][ T302] device bridge_slave_0 left promiscuous mode [ 190.587981][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.595936][ T302] device veth1_macvtap left promiscuous mode [ 190.602097][ T302] device veth0_vlan left promiscuous mode [ 191.373240][ T5693] device vlan0 entered promiscuous mode [ 191.455749][ T5697] device syzkaller0 entered promiscuous mode [ 191.614762][ T30] audit: type=1400 audit(1772220868.196:156): avc: denied { read write } for pid=5708 comm="syz.5.1666" name="cgroup.subtree_control" dev="cgroup2" ino=529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 191.697568][ T30] audit: type=1400 audit(1772220868.226:157): avc: denied { open } for pid=5708 comm="syz.5.1666" path="" dev="cgroup2" ino=529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 191.905913][ T5719] syzkaller0: refused to change device tx_queue_len [ 191.928870][ T5706] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.936175][ T5706] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.951385][ T5706] device bridge_slave_0 entered promiscuous mode [ 191.965439][ T5706] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.993593][ T5706] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.005690][ T5706] device bridge_slave_1 entered promiscuous mode [ 192.182295][ T5760] device macsec0 entered promiscuous mode [ 192.211625][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.219305][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.254413][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.302664][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.312499][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.319618][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.329859][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.366933][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.375196][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.382285][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.390102][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.438791][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.488386][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.527230][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.549194][ T5706] device veth0_vlan entered promiscuous mode [ 192.717041][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.795934][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.817623][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.955475][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.006221][ T5706] device veth1_macvtap entered promiscuous mode [ 193.042797][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.176821][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.217949][ T8] device bridge_slave_1 left promiscuous mode [ 194.224101][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.231754][ T8] device bridge_slave_0 left promiscuous mode [ 194.237978][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.245973][ T8] device veth1_macvtap left promiscuous mode [ 194.252078][ T8] device veth0_vlan left promiscuous mode [ 195.552566][ T5810] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.559964][ T5810] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.567583][ T5810] device bridge_slave_0 entered promiscuous mode [ 195.574870][ T5810] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.582177][ T5810] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.589781][ T5810] device bridge_slave_1 entered promiscuous mode [ 195.889090][ T30] audit: type=1400 audit(1772220872.476:158): avc: denied { create } for pid=5821 comm="syz.3.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 196.073392][ T5810] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.080528][ T5810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.087888][ T5810] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.094950][ T5810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.268745][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.288559][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.395828][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.474940][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.487615][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.513529][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.564426][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.571672][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.707122][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.715861][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.724414][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.731516][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.739565][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.752338][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.760690][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.778207][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.890471][ T5863] device syzkaller0 entered promiscuous mode [ 197.168342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.182211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.281525][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.289577][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.315982][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.325170][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.351370][ T5877] device syzkaller0 entered promiscuous mode [ 197.359553][ T5810] device veth0_vlan entered promiscuous mode [ 197.386038][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.395327][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.405710][ T5810] device veth1_macvtap entered promiscuous mode [ 197.425249][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.433732][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.442725][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.452716][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.461419][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=1170 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 197.956826][ T30] audit: type=1400 audit(1772220874.536:159): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14856]" dev="pipefs" ino=14856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 198.046391][ T5896] device syzkaller0 entered promiscuous mode [ 198.571090][ T282] syz-executor (282) used greatest stack depth: 21184 bytes left [ 199.588424][ T302] device bridge_slave_1 left promiscuous mode [ 199.594567][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.602159][ T302] device bridge_slave_0 left promiscuous mode [ 199.608403][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.617191][ T302] device veth1_macvtap left promiscuous mode [ 199.623440][ T302] device veth1_macvtap left promiscuous mode [ 199.629649][ T302] device veth0_vlan left promiscuous mode [ 202.027713][ T302] device bridge_slave_1 left promiscuous mode [ 202.033856][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.041427][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.049111][ T302] Ÿë: port 1(veth0_vlan) entered disabled state [ 202.056889][ T302] device veth1_macvtap left promiscuous mode [ 202.728959][ T30] audit: type=1400 audit(1772220879.316:160): avc: denied { read } for pid=5902 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 202.905880][ T30] audit: type=1400 audit(1772220879.486:161): avc: denied { search } for pid=5914 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 202.981721][ T30] audit: type=1400 audit(1772220879.566:162): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 203.005712][ T30] audit: type=1400 audit(1772220879.566:163): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 203.028004][ T30] audit: type=1400 audit(1772220879.566:164): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 203.054621][ T30] audit: type=1400 audit(1772220879.636:165): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 203.115962][ T30] audit: type=1400 audit(1772220879.696:166): avc: denied { search } for pid=5928 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 203.138368][ T30] audit: type=1400 audit(1772220879.696:167): avc: denied { write } for pid=5928 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 203.160501][ T30] audit: type=1400 audit(1772220879.696:168): avc: denied { add_name } for pid=5928 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 203.181979][ T30] audit: type=1400 audit(1772220879.696:169): avc: denied { create } for pid=5928 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping system [ 203.203591][ T30] audit: type=1400 audit(1772220879.726:170): avc: denied { read open } for pid=5928 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=4524 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 message bus: [ 203.230001][ T30] audit: type=1400 audit(1772220879.726:171): avc: denied { lock } for pid=5928 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=4524 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: devtmpfs busy - remounted read-only [ 204.662870][ T5948] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 206.706300][ T5949] kvm: exiting hardware virtualization [ 206.712603][ T5949] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 206.719359][ T5949] ACPI: PM: Preparing to enter system sleep state S5 [ 206.726457][ T5949] reboot: Power down serialport: VM disconnected.