last executing test programs:

10.895707s ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

10.202406785s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

9.686625794s ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

8.380020913s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

7.491111248s ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

7.456997523s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="6f16ee837f1c8199bcea5086b70bd2a4f366d758dcb2a0e6529cba6551ce2f71de00a8b97b9a1569975e86266705eee446525bbf96e6045a9b33b51b1b9d95472afaa1e2ed630c18b2b56019c4ab4993c5d4aa4f16371ad0efd5ef909b6e36dd1df05ecf9502a8aeee994673cb68efe4040a20e15217260b185b55a860322c8c7bf4d644cce9aa7cafac647f1883414ec79169553fb0fb876dabc7d7a56186a6a3c1348cfbbb294cc920c958a6cf734235fe44362707283f0000000000000006296cd6342d6be7dc877fdeb13d27c6e61cc1b224e1682bf3b443801cd229f2b35f673b723d1ba71227b75fd68556bc4fe795d477771519ed4665d7524348fa81b48bc94e4b", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

5.800057726s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

5.600029927s ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

3.87316337s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="6f16ee837f1c8199bcea5086b70bd2a4f366d758dcb2a0e6529cba6551ce2f71de00a8b97b9a1569975e86266705eee446525bbf96e6045a9b33b51b1b9d95472afaa1e2ed630c18b2b56019c4ab4993c5d4aa4f16371ad0efd5ef909b6e36dd1df05ecf9502a8aeee994673cb68efe4040a20e15217260b185b55a860322c8c7bf4d644cce9aa7cafac647f1883414ec79169553fb0fb876dabc7d7a56186a6a3c1348cfbbb294cc920c958a6cf734235fe44362707283f0000000000000006296cd6342d6be7dc877fdeb13d27c6e61cc1b224e1682bf3b443801cd229f2b35f673b723d1ba71227b75fd68556bc4fe795d477771519ed4665d7524348fa81b48bc94e4b", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

3.54346408s ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

1.440410771s ago: executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x4, &(0x7f0000000cc0)=ANY=[@ANYBLOB="180000ca201e33f8c40009000000000000000000008006690300000000009500d342bb92d8edeab6086f437dd174cca764c79671b10655454892ca9d7c1232da57277cda67357c45d2e30350ad34ec33b0ec416cfba0115e524813a41087677d90395c25aa95b570f21b3e5fd747ce833b6180ddbb2d4c69f649b059b34e811f6f10d959c6dbb4ee9cefbe861d127f43a4ce718b24a80c86aeb01e9249816387b430a6d50c17adfa70519458f2edeed45520f4a506acde397ca5390b461d7c48254abac87dbef1bc64e3954972c7a5277a39f15aca87ba38450cac2b79575306188692939bb6e847ed059f896fc3058282e9c85863e2c8a0bb0b249ce20c73a39a4dceb8affb4785a88b8d5039147dbbba18f70ffb2453f78f945950fb4840f23244e8337f2fe6cfefdf8d519c9830f66fc54583cc207798ab90c0c55cde864914da775afd7cead2f154359a6b11d8917db746d22b57032f247346ac76f4bd768ea8c089dfba44e3169830fd4e14958fa0c96f0724e95d2761108c4f4b6b495eb58305f75261480b6afa8077ef9410fc3f232794a2316bfa2b6b49ee78ceb78a4da89de52bca6f5f311d8814b23cd174860529ab908b8cde63619b8af5eae2dd130609882ce566fcf44800f6fa4688c2750d612377a535b397602fc85fbc1704599334c3295bff67027d47b957240b56ed2a3c40d97feddf673311a3ee31c98069405771580a981ae88a089800fc345340f18f51d2577630de7a5c2671fadbd162cb6e13411024c50f0b8be2d0a671968dd121656d7e3750407b9ae554c387fd2abbef2919e43659ab"], &(0x7f0000000700)='GPL\x00', 0x0, 0x9f, &(0x7f0000000740)=""/159, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000840)=[{0x4, 0x1, 0x5, 0xb}, {0x1, 0x5, 0x3, 0x2}, {0x3, 0x3, 0x3, 0x6}], 0x10, 0x27f191f5}, 0x90)
r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18)
r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@o_path={&(0x7f00000009c0)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xa987, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48)
r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7f, '\x00', 0x0, r1, 0x2, 0x0, 0x5}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_ext={0x1c, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="852000000100000085100000020000001837000003c997983700000000000000"], &(0x7f0000000100)='GPL\x00', 0x101, 0x0, 0x0, 0x41100, 0x36, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000540)={0x7}, 0x8, 0x10, 0x0, 0x0, 0xe2e9, r2, 0x4, &(0x7f0000000b40)=[r3, r4, r5, r6], &(0x7f0000000b80)=[{0x1, 0x2, 0xe, 0x4}, {0x5, 0x4, 0x10, 0x9}, {0x5, 0x5, 0x1, 0x5}, {0x1, 0x5, 0xb, 0xa}], 0x10, 0x6}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x50800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r9, &(0x7f0000000180), 0x40001)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)
bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0)
r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000048000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000840)='kmem_cache_free\x00', r10}, 0x10)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0))
sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000380)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x4}}, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x21, 0x2080}, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x1}, 0x90)
write$cgroup_pid(r9, &(0x7f0000000c80), 0x12)
bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0)

1.236766212s ago: executing program 2:
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_devices(r0, &(0x7f0000000280)={'b', ' *:* ', 'rwm\x00'}, 0xa)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4}, 0x48)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r4}, 0x10)
ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412)
bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0)

1.149050775s ago: executing program 3:
perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000580)="7581b8e61d300e8b7b12e409213218212fdfe100928d84c2a8b9e43a7cbba10c3ea39a52af87561663266970423eaec339c57b2d254280ac1f10b1ef91a365f5bccc1f41a9bee33890c20d24f33412db1f17f15cfe057766597903a4d17d72363096185d9441946fdcdcddf22683b228b2d3ff5a436ce08041b172", 0x7b}, {&(0x7f0000000600)="77f744e34531eb0097e9f89a0e16fe42d784863645866018df9c7191ed5c01445a5bcd2f13290a395e8a5ab548eec41ff293e618ad47514cdcf426d2a158cdcfb6ce16069c21132c2c5baf526c1b9bcfd9fea6b8cdf1782926f30a435ee9ddfbf139a823e51bba3974a402cfaf9008aef9", 0x71}, {&(0x7f00000006c0)="54ca6ca03a622257b12a56009059e41a2f6f98a28ec655796b8db33dabf68b33bc9cd0ad7a3917f93b95821ccbc3d5f2345ea6e4be81f6f99bc9b53f8277c75dddd4f27ae3a666608dc667b36502e8a85c4e4e4b696ab51865942f8976c629589b3096f1fab5cf4ce1666b385d4ef7b2c9f9e9c2f50d569d5947ceceabc932890339f6b0c38570b6e77786fdb84cb8fe2db644afc6fadeed6f80725d2d53811bf099f877ed552cd08aa272a6a7e30569bd03", 0xb2}], 0x3}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0506617, &(0x7f0000000040)=0x2)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48)
perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)}, 0x10)
close(0xffffffffffffffff)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff94}, 0x40000022)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
sendmsg$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000008c0)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="84491e02db6bc9ecb8b1acdee57caa88d8cc35ed49728619ff5af2b52b478710d63363e9887a579294ebdab170e27f5dac370348f7a82f776989503bf6f08940df7a33f2a63d2a8785cf01000080000000000d2a062a80e902a556c154fe3f7af704060b16ef053c96f330b99e7c118694fb32868b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x90)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$MAP_CREATE(0x0, 0x0, 0x0)

1.022938574s ago: executing program 0:
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000005c0)=""/171, 0xab, <r1=>0x0, &(0x7f0000000380)=""/41, 0x29}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x6, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESHEX], 0x0, 0x0, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0xcce3, 0x1}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000840)}, 0x90)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
close(0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0)
r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff, 0x0, 0x800, 0xfbff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080))
ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400)
bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000d441336434f4247a000099656ce2af04417012d69c211f75877c678b12fb"], &(0x7f00000001c0)='GPL\x00'}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r7, 0xe0, &(0x7f0000000c80)={0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r9=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x8, 0x0, 0x0}}, 0x10)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48)
r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r8}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xa, 0x23, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184500000600000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000b7080000000000007b8af8ff00000000b7080000ff0f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183b0000050000000000000000000000186a0000050000000000000001000000", @ANYRESHEX], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0xc8, &(0x7f0000000700)=""/200, 0x41000, 0x8, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x2, 0xb, 0x7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r5, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r5, r2], &(0x7f0000000e00)=[{0x3, 0x3, 0x8, 0xb}, {0x1, 0x2, 0x1}, {0x2, 0x1, 0x3, 0x7}, {0x1, 0x2, 0x8, 0x4}], 0x10, 0xfffffffa}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x8, 0x0, 0x0}}, 0x10)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x2})

877.100107ms ago: executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
getpid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id, @generic={0x0, 0x0, 0x0, 0x101}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61154c000000000061138c0000000000bfa00000000000001503003008004e002d3501000000000095004100000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18487b6feb89752cd600000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bbff4bbe0000000000000000000000000044585397feaadda3fcc64e7b0c08f7ac5c64cb190f1712a3b10fc34eb758705f1751d8c8b712eb39d2b8ad44f129c2c9aedb15"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48)

801.023608ms ago: executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10)
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000004000000000000100ffec850000006d000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00'}, 0x10)
perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff002, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x8000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000007d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r3}, 0x10)
bpf$PROG_LOAD(0x2, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48)

684.969566ms ago: executing program 2:
openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=ANY=[], 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x37}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
close(r0)
close(0xffffffffffffffff)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r2=>0xffffffffffffffff})
close(r2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [r3, r2]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r3)
close(r4)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

617.965446ms ago: executing program 3:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4}, 0x90)
bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x11, 0x0, 0x0, 0x200, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000000}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0)
close(0xffffffffffffffff)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22fdb9"], 0xfdef)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r1=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x1})
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0xc}, 0x48)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r8=>0xffffffffffffffff, <r9=>0xffffffffffffffff})
sendmsg$unix(r9, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r6}, &(0x7f0000000600), &(0x7f0000000640)=r7}, 0x20)
recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r10=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[], 0xfdef)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0xa0}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080))

565.423684ms ago: executing program 2:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5b8582d9667e2d66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0x10, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000000480)=ANY=[@ANYRES64=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0xff9, &(0x7f0000002a00)=""/4089, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), ""/16, 0x0, 0x0, 0x0, 0x0, 0x20000000000001cb, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa3, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f0000000500), 0x8, 0x51, 0x8, 0x8, &(0x7f0000000980)}}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000100), 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000020000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000000c0)='ext4_unlink_enter\x00', r3}, 0x10)
unlink(&(0x7f0000000000)='./cgroup\x00')
recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0)
r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000380), 0x20000000}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0x4, 0x8, r4, 0xfffffffe}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYBLOB="2306a9887bc03e31c140fc0ec4dfdaebbda3b880eb10d8a128e1f792bf87679bc975ea4a00f3300e169d28a9aa71005b9ea64f941b0e65a8e4816396f93970fcccf163e1f8d0e4a2cd6893854ed400b07d0ed2feffd2b4a7c604bfd2ae617bc0f7491cba31bbdb21abf021bfa58ad4be8b", @ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x15)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000840)={r6, 0x0, &(0x7f00000007c0)=""/74}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0)
gettid()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540))
close(0xffffffffffffffff)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000"], 0xfdef)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0)

380.362762ms ago: executing program 3:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x10000}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0xfffffffc}, 0x0, 0x2, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x5800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x9)
socketpair(0x1, 0x1, 0x0, &(0x7f0000000740))
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffff5f, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r4=>0x0}}, 0x10)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f00000002c0)=0x84005)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040))
bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x1b, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000e1ffffff00000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018160000", @ANYRES32=r3, @ANYRES8=0x0, @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703008008000000b70400000100000085000000826b00009500000000000000"], 0x0, 0xbfd, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x5, 0x6, 0xffff0001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x0, 0x10, 0x4}, 0x90)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)='/proc/3\x00\xff\xff\xffat\x00QE\xf44.\xab%j'}, 0x30)
r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x4000000)
mkdirat$cgroup(r6, &(0x7f0000000100)='syz0\x00', 0x1ff)
bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x7fffffff, 0x1, 0xc898, 0x851, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xc}, 0x48)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000380)={0x2}, 0x8)
bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0)
mkdir(&(0x7f0000001000)='./cgroup/file0\x00', 0xb3bc3461c89e9469)

324.766961ms ago: executing program 3:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000001400)={0x0, 0x80, 0x8, 0x4, 0x7f, 0x1, 0x0, 0x1, 0x14004, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1}, 0x40, 0x9, 0xaa2c, 0x9, 0x7, 0x3, 0x2, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x1)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x20040000)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r1, &(0x7f00000001c0)='FROZEN\x00', 0x7)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xed, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1442}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1e1}}, @jmp={0x5, 0x0, 0x4, 0x8, 0xa, 0x0, 0xfffffffffffffff4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x4, 0x0, 0x0, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1c5e8, r2, 0x3, &(0x7f0000000c80)=[r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r1, r2], &(0x7f0000000cc0)=[{0x2}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000001810000200000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], 0x0}, 0x90)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040))
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r5, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB='\x00'], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r6}, &(0x7f0000000700), &(0x7f0000000740)='%pi6   \x00'}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0)
sendmsg$tipc(r7, 0x0, 0x4080)

266.022699ms ago: executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x15}, 0x20)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96')
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x7fff)
bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000003702000020febfff7a0af0fff8ff00f869a4f0ff00000000b70600001218d1fe2d640500000000002404000000ffffffd404000040000000b704000010000020620700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fca868f0399d909a63396c113943219aab9d607000000cb3924b611f5969f62c28b22edf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa8a23f1740637c48468766af54043000000ec44631ac2622cdcae18c3d14bfbe96dd87235b44174f7c034318508f49f09781dc7a2cfbb9a0f119e31975f551557f05dc2dc2739e2e735d0ab961dac07f4f6d8aa1c3f16765d427c0e01000000fe4c16737d50d2a4bfc463450d524eacf2b734b0289c7a3a16eeca71296746681d61af491e4fa734318e0d72b8dbbc2b2b869af2f87903000000b6ecc7de09a2257e908cd92e664fa7aba7f07474863333c460e34caf0806a7e2575a56fba3eadd8efbd5dae6c024585d972b1bf8c4e872bba38160be9e92b6ddb90fc51b894917b50876b5708e64e70f7d8225da90ce9bc019084873ed07c0c59c4ba053fe77e0d37ccc3318da2e9fefaf025527e734ed1de5d12b4c56ca3b03dc121086061d1f26821a428d28eefa22ead6a3dab9388da53263b81ebe6be197a48a63440000a356240c4e2df57457000100000000000000000000008d2516510b29804b3cc034c19cef0d773f01064709edd63a185cbab8456c25283b9514b220fe401503ff536478088eb9fd932a0703a7bf9ea40429b2d49177824f210a69f8e5227fd32e7d5a2c7ecf57ac64509224090000000000000096e5a55d2c805bf725b9d14756c8cfa292aae0872866cf9fe063317741a0db9081d4393a7f9bcc0917d60a11b4a9ece831660ce625de441cef915eba31255d163f7033045ceb97f8ea006efc5b84f75ca1fb74c9faef444eb12f46b435de87feb2f7f2d7fb659395e4b38178b5c67e6ac100000000000000001b2e77bd5de136fa1bec1a26c622bb9662d9ee70147acc5605aa2318855cb8b918000000c5f265dcb5dce05f94ea051c4e8dcdf37d01ad7aff64f84ce32b841c799f47c2949725285fc50f1dd3f5e264023082eec752704c1f598151aa7d29e0d79522df196278acf327a74777d1f658f50c27020198770ff8ebef9df1b750d56d4d195ad7a267c46b3348b0e03ed33b5bca13cafc304dc6da78d20f029742d8d2f36acfdd331081ca00c1d5c8b7bed2ef603d6e7f1764246aab2d7d531559a971939a038055ac28625ec837f824ff537cd67993a3589be73a18680da50287b9e962b1a0235c290346a21ca5de55c49c78e411c791617000ef8df75411a5d300000000000000e0ffffff004deb8d49806823655735bd6deb49edb2e42f4ed9e6e9080366660b847bf03c144f6796920726dcf29e9a6c808459e82cbb0000000000000000000000000000000000006b5530865aaa7aa6171f66f2bca881a4201588427bb65ed3d5e7a74e9b5ece44067d4a9875a310bc7ec42b844b9eb3c9083560ef5c92b8a01188d615efbf70893d2eaf76517e990021fa5020a71023bca1194ad87cade480ba3dce8f57294e31ca24a8d181210bb6d18ff2c58293c2e314a7447ed3a1c870908aa8e3b33e6a94c7381bce9fa71dcbb758451f247e38d80d66e03d7564a5cddfaf06574b05cefb2670f30c2d501ee625ce3ffc08f15b53d28ce552c1807bc6866f06098a0e5517068aa48f2a82496fe83ee85218fe7f52b48742c7055f2a144c13e9c54be60b0a4f979ef7eb216897875946dc6ca1571930b1cf7c93de103f5289f782ae538e02612c717a76c787a873936eb8dcf1bfe581cc8ef965a0424bc140939e3274e251e519d188f6af680402c49458065dccfcb4f0d4f2ec9cf6fb3cf0a1807e34fb8d0108007734c1d2bc6a9d32d2560a88bad976b6000100002b712e632eeca810fb73fc8aaef94acf8bde18b9149cadc688254eabbe91f943592ccf68e717bcc6852828bd621e3a9dcb1cc6f1a6d1915200d95087838c2dc0a002c3aa554f725b965714144652cdc14761b0236f1a05b7f50f4149057e63d713103b5a6c2919161efc165a2e6981d76d29c95ad9f180135fb8962f59495fd33be3a6d35274941790bc1bd9da5e9c67c39de2c9f6fe35b8f528edbd8ea2a77dccdc3fe247feb121d9440a3ea9012a9d23a7e3110b0f25c5f8bf803d688de4d92b5dfdbd69fb8b426b55c10ba01b5f18b10cce8de3369300000000"], &(0x7f0000000280)='GPL\x00'}, 0x48)
ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30)
perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0)
r4 = openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e6eb010018000000000000000c0000000c000000020000000000000000000006040000000000"], 0x0, 0x26}, 0x20)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f0000000040)}, 0x10)
write$cgroup_subtree(r4, 0x0, 0x0)
setsockopt$sock_attach_bpf(r2, 0x1, 0x26, &(0x7f0000000040), 0x4)
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)

166.353585ms ago: executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x7c3340, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'xfrm0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080))
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1})
ioctl$TUNSETLINK(r3, 0x400454cd, 0x308)
close(r2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000))
ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"})
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611063000000000007000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90)
write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd63726558"], 0xfdef)
perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r4, 0x0, 0x0}, 0x10)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8930, &(0x7f0000000500)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x01\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x04.\x9aL\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5<J\x1f\xba\xfc\x90(\x985\x93\xa8\xd4\xf0\xbdTy\x18\xc8\xa0\xbb\x99\x8c\xe0Q\xffCl\xbdX\xf73\xa1\xa2\'\x00\x00\x00\xfb\xce\x959x\xfeW\r\xf0{\xcaT\xecp)=\x9d\xdfG8\xa1\xe3=\xa6\x00\x98\xc1\xb3\x91-\xab\'W\x8al?d<JN\xcb\xd4H\xb0_jO\xf3\x90\xe8/l\xdfg)\x8d#\xfdo\xa9L\xdeA*\xec\xa1\x14,\xe8\x8d^\xb9r=\xc0\x18\xd4\x11dU[Ry\xed\xd6\x97\x8a\xe8\xca\x99\x10\x8e\xc8P\xa3\xae/\xdaof\x06\x7f\xf7\x80$f\b\x92\xae\xeb\xdd\"\x89\xb8\xf0\xc3\b\x00\x00\x00\x00\a\xf6\xfc\x1d\xd4\x893\xeb)\xc1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O!\xd2q\xda}\xe2\xa2\xfe\xfd)\\\xdf\x9aN\\\xaeyc\xe4g\xc0\x8a\n\v{\xa9H\\\xd1\x9d')

157.084626ms ago: executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
getpid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id, @generic={0x0, 0x0, 0x0, 0x101}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48)

106.352744ms ago: executing program 4:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000200))
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x1, 0x0, 0x0)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), 0x0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x23}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)

90.696566ms ago: executing program 4:
r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x11, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES8=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280))
socketpair(0x0, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x56)
sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x0)
recvmsg(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/250, 0xfa}, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x11, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000010000000000000035a01a181800000009000000000000000008000095000000000800000018000000800000000000000096000000184f0000080000000000000000000000184b0000f8ffffff0000000000000000850000007d00000085100000fbffff03000000000000000095000000000000009500"/136], &(0x7f0000001340)='GPL\x00', 0x2, 0xdf, &(0x7f0000001480)=""/223, 0x40e00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000015c0)={0x0, 0x5, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x2, 0x4, 0xb, 0x9}], 0x10, 0xff}, 0x90)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001040)=@bpf_lsm={0x1d, 0x10, &(0x7f00000006c0)=ANY=[@ANYBLOB="0d000000f0ffffff18450000feffffff0000000000000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb50200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xa5, &(0x7f0000000380)=""/165, 0x40f00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x7, 0x4, 0x200}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001000)=[{0x2, 0x5, 0x10, 0x2}, {0x0, 0x4, 0x10, 0xa}], 0x10, 0x2}, 0x90)
r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0xd, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x2}, @ringbuf_query, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @generic={0x9, 0x3, 0x7, 0x5, 0xdd}, @generic={0x3f, 0xa, 0x4, 0x7, 0x8440ec1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='GPL\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0xb1bc77aff1e35844, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x4, 0x7, 0x100}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6], &(0x7f0000000800)=[{0x3, 0x2, 0x7, 0x1}, {0x0, 0x2, 0xc, 0xc}, {0x3, 0x1, 0xe, 0x1}, {0x3, 0x4, 0x3, 0x5}], 0x10, 0x2}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@ifindex, 0x24, 0x1, 0x7, &(0x7f0000000200)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0]}, 0x40)
close(r3)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x90)

61.452411ms ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0))
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00'}, 0x70)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2}, 0x10)
socketpair(0x2, 0x1, 0x0, &(0x7f0000000040))
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000080))
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

27.117306ms ago: executing program 4:
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x4, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000080), &(0x7f0000000880)=r2}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=<r4=>0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x14, &(0x7f0000000040)=ANY=[@ANYRESHEX=r5, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001340)=ANY=[@ANYBLOB="9feb0100183ba9f9cbb6471a1930f5413048e2e783010000001c0000000600000002000e580000000e0200000000000000020400000000020c0000000000005f303000b51486bff59401764f15c339e7c125590e28096f571b67bd8289f4731d23b645fe9c94cfd83d54503dca1687ebce601c7bbed63a360c09fec968d20d78ca9c4f266f7379232fd71a05634b7f6b40a76d6df99f26c7a9763a8f0a0fd67b8642add79766ba777bee541513b7b9a302146a3c2f0e3a7c8cf19429647850ad5bbcd603af9b038c0be3"], &(0x7f0000000040)=""/203, 0x3a, 0xcb, 0x1}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='rxrpc_peer\x00', r6}, 0x10)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90)
unlink(0x0)
bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48)
perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x40a0}, 0x0, 0xffffffffffffffff, r8, 0x2)
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

5.911559ms ago: executing program 1:
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_freezer_state(r0, &(0x7f00000001c0)='FROZEN\x00', 0x7)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x200, 0x400, 0x2006, r0, 0x3, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0xa}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x4)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000421400000000000000000000181100", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000045a80200f4ffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x5f, &(0x7f0000000940)=""/95, 0x1e00, 0x42, '\x00', 0x0, 0x1c, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x3, 0xa, 0x0, 0x401}, 0x10, 0x1c5e8, 0xffffffffffffffff, 0x3, &(0x7f0000000c80)=[r0, r0, r2, r1, r1, r0, r1], &(0x7f0000000cc0)=[{0x2, 0x4}, {0x0, 0x1, 0x1}, {0x0, 0x2, 0xa, 0xc}], 0x10, 0x9}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x3, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000d00)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}]}, &(0x7f00000002c0)='GPL\x00'}, 0x80)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095000000000000009f06eb35144b59cf06b550ec96e09c9be1cb5caf6cbb35f9444a5d5069ed9884d3123aa6b751895003d7ce8dc342a603b5de6ab3a9a4bd3c7a87237e8c720a84a3dd64acbf2bbbb756c8fa6fcf65d97c5cee3573a66f28b90ad202158d71379e22c516af1217a9bc8f6b30e34fa6c4025624591207686c91534522da20be5cdd0b25ef08189d904e82d1864996cb29dc1811759eaaf4f4336abc583a390fd5bf3881f429061ef47caf2e8c11367112cbdfc985ebb0f513f16877383d8fe995e2e944cc283da6354e6c89cb2b76e309392d0dc3665c14dcbb92cef712ec0c778471"], &(0x7f00000002c0)='GPL\x00'}, 0x90)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90)
mkdir(&(0x7f0000000280)='./file0\x00', 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
write$cgroup_int(r6, &(0x7f0000000200), 0x43451)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x5, 0x0, 0x7, 0x10, r4, 0x4c, '\x00', 0x0, r6, 0x4}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7, <r8=>0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r8, &(0x7f0000000340), 0x0}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x7a05, 0x1700)

0s ago: executing program 3:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8, 0x85, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r1=>0x0}}, 0x10)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="99eb010018000000000000003c0000003c000000030000000000000000000008000000000b0000000000000a03000000040000000000000b0300000001000000000000020500000004000000000000d22b0db7553d0300"], &(0x7f0000000540)=""/79, 0x57, 0x4f, 0x0, 0x100}, 0x20)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000100)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c00)}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=r3, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x3}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x0, 0xee, &(0x7f0000000340)=""/238}, 0x80)
r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, @generic={0x8, 0x9, 0x3, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x1ff, 0x0, 0x0, 0x1e00, 0x1, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x8, 0x4f}, 0x10, 0xffffffffffffffff, r5, 0x5, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000400)=[{}, {0x0, 0x2, 0x10, 0xa}, {0x4, 0x2, 0x4000, 0xa}, {0x1, 0x5, 0xe, 0x8}, {0x5, 0x3, 0x10, 0x8}]}, 0x90)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff)
r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0)
write$cgroup_freezer_state(r7, &(0x7f0000000040)='FROZEN\x00', 0x7)
r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r8, &(0x7f0000000180), 0x12)
write$cgroup_freezer_state(r7, &(0x7f0000000080)='THAWED\x00', 0x7)
bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x19, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000300)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x22, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x4, 0x9, 0x82d, 0x80000000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xc9}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400006c00000000000100000400ffe0f50500000001000000000000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, 0x0)
bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040), 0x48)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc020660b, &(0x7f0000000040))
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x2, 0xc4, &(0x7f00000002c0)=""/196}, 0x80)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000140)}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x8, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000000240)=""/15, 0x28, 0xf, 0x0, 0xfffffff7}, 0x20)

kernel console output (not intermixed with test programs):

Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts.
2024/06/24 14:46:07 fuzzer started
2024/06/24 14:46:07 dialing manager at 10.128.0.163:30002
[   21.101118][   T23] audit: type=1400 audit(1719240367.760:66): avc:  denied  { node_bind } for  pid=344 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[   21.121495][   T23] audit: type=1400 audit(1719240367.760:67): avc:  denied  { name_bind } for  pid=344 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   21.175466][   T23] audit: type=1400 audit(1719240367.830:68): avc:  denied  { setattr } for  pid=355 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   21.198912][   T23] audit: type=1400 audit(1719240367.830:69): avc:  denied  { mounton } for  pid=356 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   21.225441][  T353] cgroup1: Unknown subsys name 'net'
[   21.230589][   T23] audit: type=1400 audit(1719240367.830:70): avc:  denied  { mount } for  pid=356 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   21.248437][  T353] cgroup1: Unknown subsys name 'net_prio'
[   21.254942][   T23] audit: type=1400 audit(1719240367.890:71): avc:  denied  { mounton } for  pid=353 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   21.260290][  T353] cgroup1: Unknown subsys name 'devices'
[   21.288127][  T362] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   21.288369][   T23] audit: type=1400 audit(1719240367.890:72): avc:  denied  { mount } for  pid=353 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   21.318530][   T23] audit: type=1400 audit(1719240367.950:73): avc:  denied  { unmount } for  pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   21.338075][   T23] audit: type=1400 audit(1719240367.950:74): avc:  denied  { relabelto } for  pid=362 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   21.363239][   T23] audit: type=1400 audit(1719240367.950:75): avc:  denied  { write } for  pid=362 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   21.396781][  T360] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   21.460876][  T353] cgroup1: Unknown subsys name 'hugetlb'
[   21.466545][  T353] cgroup1: Unknown subsys name 'rlimit'
2024/06/24 14:46:08 starting 5 executor processes
[   21.955775][  T370] bridge0: port 1(bridge_slave_0) entered blocking state
[   21.962681][  T370] bridge0: port 1(bridge_slave_0) entered disabled state
[   21.970088][  T370] device bridge_slave_0 entered promiscuous mode
[   21.986859][  T370] bridge0: port 2(bridge_slave_1) entered blocking state
[   21.993730][  T370] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.001305][  T370] device bridge_slave_1 entered promiscuous mode
[   22.094453][  T373] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.101550][  T373] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.109021][  T373] device bridge_slave_0 entered promiscuous mode
[   22.128986][  T373] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.135819][  T373] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.143179][  T373] device bridge_slave_1 entered promiscuous mode
[   22.187812][  T371] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.194640][  T371] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.202166][  T371] device bridge_slave_0 entered promiscuous mode
[   22.219882][  T371] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.226707][  T371] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.234068][  T371] device bridge_slave_1 entered promiscuous mode
[   22.259633][  T374] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.266460][  T374] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.274004][  T374] device bridge_slave_0 entered promiscuous mode
[   22.284479][  T374] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.291421][  T374] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.298851][  T374] device bridge_slave_1 entered promiscuous mode
[   22.308686][  T372] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.315502][  T372] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.322919][  T372] device bridge_slave_0 entered promiscuous mode
[   22.329721][  T372] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.336556][  T372] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.344103][  T372] device bridge_slave_1 entered promiscuous mode
[   22.475735][  T370] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.482673][  T370] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.489814][  T370] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.496546][  T370] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.569605][  T373] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.576561][  T373] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.583698][  T373] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.590464][  T373] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.602586][  T374] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.609427][  T374] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.616524][  T374] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.623326][  T374] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.635329][  T391] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.642337][  T391] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.649343][  T391] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.656744][  T391] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.664335][  T391] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.671342][  T391] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.679142][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   22.686373][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.722218][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.730428][  T124] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.737241][  T124] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.745241][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.753229][  T124] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.760063][  T124] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.785414][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   22.793605][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.801487][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.848215][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.855693][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.864086][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   22.872277][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.880433][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.887242][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.894717][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.902702][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.909530][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.927758][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   22.935927][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.944527][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.951364][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.958709][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   22.966815][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.975291][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.982131][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.989332][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   22.996511][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   23.003850][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   23.012007][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   23.020056][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   23.026868][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   23.040800][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   23.048653][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   23.056677][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   23.064698][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   23.071547][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   23.082998][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   23.090397][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   23.109292][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.117209][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.125249][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   23.136411][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   23.144744][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   23.151582][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   23.159058][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   23.167142][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   23.175179][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   23.182000][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   23.189456][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.197300][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.205177][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.213032][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.221226][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   23.237930][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.245849][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.253857][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.262001][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.277875][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.285883][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.310695][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.318880][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.327262][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.335754][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.343798][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.351827][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.359797][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.367849][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.383314][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.391410][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.399684][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.407810][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.431194][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.439892][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.447604][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.456705][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.464903][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.472577][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.493641][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.502132][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.518055][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.526407][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.544902][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.554550][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.563496][  T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.584668][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.592994][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.600887][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.608655][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.616286][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.624624][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.632659][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.653018][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.661588][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.669581][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.677590][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.695147][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.703493][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.724011][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.736825][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.747563][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.756113][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.783104][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.791551][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.800902][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.811249][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.828590][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.843591][  T403] 
[   23.845862][  T403] **********************************************************
[   23.854011][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.882369][  T403] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[   23.897328][  T403] **                                                      **
[   23.935538][  T403] ** trace_printk() being used. Allocating extra memory.  **
[   23.957674][  T410] 
[   23.963482][  T410] **********************************************************
[   23.964245][  T415] cgroup: syz-executor.4 (415) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future.
[   23.990855][  T403] **                                                      **
[   24.007878][  T410] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[   24.009244][    C0] hrtimer: interrupt took 11115 ns
[   24.021842][  T410] **                                                      **
[   24.035895][  T415] cgroup: "memory" requires setting use_hierarchy to 1 on the root
[   24.043887][  T403] ** This means that this is a DEBUG kernel and it is     **
[   24.047751][  T407] device syzkaller0 entered promiscuous mode
[   24.061581][  T410] ** trace_printk() being used. Allocating extra memory.  **
[   24.072702][  T410] **                                                      **
[   24.085820][  T410] ** This means that this is a DEBUG kernel and it is     **
[   24.093109][  T410] ** unsafe for production use.                           **
[   24.100372][  T410] **                                                      **
[   24.107629][  T410] ** If you see this message and you are not debugging    **
[   24.114890][  T410] ** the kernel, report this immediately to your vendor!  **
[   24.140225][  T410] **                                                      **
[   24.167793][  T410] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[   24.175401][  T403] ** unsafe for production use.                           **
[   24.194358][  T403] **                                                      **
[   24.202237][  T427] sock: process `syz-executor.4' is using obsolete setsockopt SO_BSDCOMPAT
[   24.210756][  T410] **********************************************************
[   24.225706][  T403] ** If you see this message and you are not debugging    **
[   24.233312][  T427] syz-executor.4[427] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   24.233360][  T427] syz-executor.4[427] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   24.263080][  T403] ** the kernel, report this immediately to your vendor!  **
[   24.475709][  T403] **                                                      **
[   24.484401][  T403] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[   24.491801][  T403] **********************************************************
[   25.151863][  T451] device syzkaller0 entered promiscuous mode
[   25.468958][  T484] sock: process `syz-executor.2' is using obsolete setsockopt SO_BSDCOMPAT
[   25.589235][  T492] syz-executor.2[492] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   25.589282][  T492] syz-executor.2[492] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   26.563389][  T519] device syzkaller0 entered promiscuous mode
[   26.809530][  T536] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 3283 (only 8 groups)
[   26.914648][  T513] syz-executor.1 (513) used greatest stack depth: 20984 bytes left
[   27.004619][  T551] ------------[ cut here ]------------
[   27.010399][  T551] perf buffer not large enough
[   27.010516][  T551] WARNING: CPU: 0 PID: 551 at kernel/trace/trace_event_perf.c:403 perf_trace_buf_alloc+0x229/0x2f0
[   27.025580][  T551] Modules linked in:
[   27.029318][  T551] CPU: 0 PID: 551 Comm: syz-executor.2 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0
[   27.039211][  T551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[   27.049132][  T551] RIP: 0010:perf_trace_buf_alloc+0x229/0x2f0
[   27.054924][  T551] Code: 48 89 e8 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa 11 fa ff c6 05 ec 6d df 04 01 48 c7 c7 c0 44 e0 84 e8 c7 c5 d0 ff <0f> 0b 31 ed eb d0 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 2e fe ff ff
[   27.074361][  T551] RSP: 0018:ffff8881eaf175e0 EFLAGS: 00010246
[   27.080261][  T551] RAX: cca8e38410d70400 RBX: ffff8881eaf176a0 RCX: 0000000000040000
[   27.088077][  T551] RDX: ffffc9000194a000 RSI: 000000000000b9dc RDI: 000000000000b9dd
[   27.095889][  T551] RBP: ffff8881eaf17710 R08: ffffffff814d4a22 R09: fffffbfff0dd7a0c
[   27.103693][  T551] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000001024
[   27.111503][  T551] R13: ffffffff85f85a20 R14: ffff8881eaf17680 R15: dffffc0000000000
[   27.119329][  T551] FS:  00007f4874c046c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[   27.128079][  T551] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   27.134501][  T551] CR2: 0000000000000000 CR3: 00000001e8c3e000 CR4: 00000000003406b0
[   27.142314][  T551] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   27.150126][  T551] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   27.157932][  T551] Call Trace:
[   27.161073][  T551]  ? __warn+0x162/0x250
[   27.165060][  T551]  ? report_bug+0x3a1/0x4e0
[   27.169396][  T551]  ? perf_trace_buf_alloc+0x229/0x2f0
[   27.174604][  T551]  ? perf_trace_buf_alloc+0x229/0x2f0
[   27.179810][  T551]  ? do_invalid_op+0x6e/0x110
[   27.184324][  T551]  ? invalid_op+0x1e/0x30
[   27.188491][  T551]  ? vprintk_emit+0x192/0x3f0
[   27.193000][  T551]  ? perf_trace_buf_alloc+0x229/0x2f0
[   27.198213][  T551]  perf_trace_inodepath+0x204/0x4f0
[   27.203248][  T551]  ? trace_event_raw_event_inodepath+0x340/0x340
[   27.209410][  T551]  success_walk_trace+0x33f/0x3d0
[   27.214265][  T551]  ? trace_event_raw_event_inodepath+0x340/0x340
[   27.220431][  T551]  ? __nd_alloc_stack+0x110/0x110
[   27.225288][  T551]  ? walk_component+0x1a0/0x590
[   27.229996][  T551]  ? handle_lookup_down+0x5b0/0x5b0
[   27.235009][  T551]  ? path_init+0x8bd/0xee0
[   27.239266][  T551]  complete_walk+0x10b/0x240
[   27.243689][  T551]  path_lookupat+0x296/0x3f0
[   27.248120][  T551]  do_o_path+0x91/0x230
[   27.252111][  T551]  ? do_tmpfile+0x400/0x400
[   27.256448][  T551]  ? path_openat+0x173/0x34b0
[   27.260963][  T551]  ? path_openat+0x2eb3/0x34b0
[   27.265561][  T551]  path_openat+0x2ec5/0x34b0
[   27.270009][  T551]  ? __perf_event_task_sched_in+0x219/0x2a0
[   27.275718][  T551]  ? debug_smp_processor_id+0x20/0x20
[   27.280929][  T551]  ? switch_mm_irqs_off+0x6b5/0xab0
[   27.285957][  T551]  ? _raw_spin_unlock_irq+0x4a/0x60
[   27.290999][  T551]  ? __schedule+0xb0d/0x1320
[   27.295457][  T551]  ? do_filp_open+0x450/0x450
[   27.299945][  T551]  ? is_mmconf_reserved+0x430/0x430
[   27.304965][  T551]  ? _raw_write_unlock_bh+0x30/0x43
[   27.310007][  T551]  do_filp_open+0x20b/0x450
[   27.314338][  T551]  ? vfs_tmpfile+0x2c0/0x2c0
[   27.318784][  T551]  ? _raw_spin_unlock+0x49/0x60
[   27.323451][  T551]  ? __alloc_fd+0x4c1/0x560
[   27.327806][  T551]  do_sys_open+0x39c/0x810
[   27.332054][  T551]  ? file_open_root+0x490/0x490
[   27.336738][  T551]  ? switch_fpu_return+0x1d4/0x410
[   27.341692][  T551]  do_syscall_64+0xca/0x1c0
[   27.346023][  T551]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1
[   27.351760][  T551] RIP: 0033:0x7f487588a0a9
[   27.356000][  T551] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[   27.375437][  T551] RSP: 002b:00007f4874c040c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[   27.383690][  T551] RAX: ffffffffffffffda RBX: 00007f48759c0f80 RCX: 00007f487588a0a9
[   27.391497][  T551] RDX: 0000000000200002 RSI: 0000000020000000 RDI: ffffffffffffff9c
[   27.399308][  T551] RBP: 00007f48758f9074 R08: 0000000000000000 R09: 0000000000000000
[   27.407115][  T551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   27.414930][  T551] R13: 000000000000000b R14: 00007f48759c0f80 R15: 00007ffdb0ec2d98
[   27.422746][  T551] ---[ end trace 44c1b02c0c034a68 ]---
[   27.538078][   T23] kauditd_printk_skb: 36 callbacks suppressed
[   27.538109][   T23] audit: type=1400 audit(1719240374.200:112): avc:  denied  { create } for  pid=556 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1
[   27.979794][  T587] sock: process `syz-executor.1' is using obsolete setsockopt SO_BSDCOMPAT
[   27.999544][  T587] syz-executor.1[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   27.999597][  T587] syz-executor.1[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   29.271755][   T23] audit: type=1400 audit(1719240375.930:113): avc:  denied  { create } for  pid=608 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[   29.626092][  T638] bridge0: port 2(bridge_slave_1) entered disabled state
[   29.634471][  T638] bridge0: port 1(bridge_slave_0) entered disabled state
[   30.039001][  T658] device sit0 entered promiscuous mode
[   30.689483][  T697] device syzkaller0 entered promiscuous mode
[   30.747204][   T23] audit: type=1400 audit(1719240377.400:114): avc:  denied  { create } for  pid=706 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[   30.772126][   T23] audit: type=1400 audit(1719240377.400:115): avc:  denied  { create } for  pid=706 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[   31.137715][   T23] audit: type=1400 audit(1719240377.790:116): avc:  denied  { create } for  pid=724 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1
[   32.225786][  T769] syz-executor.2[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   32.225886][  T769] syz-executor.2[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   32.498974][   T23] audit: type=1400 audit(1719240379.150:117): avc:  denied  { create } for  pid=792 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1
[   33.258281][   T23] audit: type=1400 audit(1719240379.920:118): avc:  denied  { create } for  pid=830 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[   34.021069][   T23] audit: type=1400 audit(1719240380.680:119): avc:  denied  { create } for  pid=866 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1
[   34.052155][  T867] bridge0: port 2(bridge_slave_1) entered disabled state
[   34.061454][  T867] bridge0: port 1(bridge_slave_0) entered disabled state
[   34.083715][  T867] device bridge_slave_1 left promiscuous mode
[   34.091456][  T867] bridge0: port 2(bridge_slave_1) entered disabled state
[   34.103696][  T867] device bridge_slave_0 left promiscuous mode
[   34.112147][  T867] bridge0: port 1(bridge_slave_0) entered disabled state
[   34.365407][   T23] audit: type=1400 audit(1719240381.020:120): avc:  denied  { write } for  pid=884 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   34.411249][   T23] audit: type=1400 audit(1719240381.060:121): avc:  denied  { create } for  pid=883 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[   34.460102][  T893] bridge0: port 2(bridge_slave_1) entered disabled state
[   34.467177][  T893] bridge0: port 1(bridge_slave_0) entered disabled state
[   34.508679][  T893] bridge0: port 2(bridge_slave_1) entered blocking state
[   34.515763][  T893] bridge0: port 2(bridge_slave_1) entered forwarding state
[   34.522905][  T893] bridge0: port 1(bridge_slave_0) entered blocking state
[   34.529750][  T893] bridge0: port 1(bridge_slave_0) entered forwarding state
[   34.567256][  T893] device bridge0 entered promiscuous mode
[   34.662885][   T23] audit: type=1400 audit(1719240381.320:122): avc:  denied  { create } for  pid=910 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[   34.716061][  T911] device syzkaller0 entered promiscuous mode
[   34.830171][  T921] device sit0 entered promiscuous mode
[   34.967112][  T930] device pim6reg1 entered promiscuous mode
[   34.981951][   T23] audit: type=1400 audit(1719240381.640:123): avc:  denied  { ioctl } for  pid=919 comm="syz-executor.0" path="socket:[14644]" dev="sockfs" ino=14644 ioctlcmd=0x54d0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   35.433964][  T949] device syzkaller0 entered promiscuous mode
[   35.501803][   T23] audit: type=1400 audit(1719240382.160:124): avc:  denied  { create } for  pid=951 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[   35.731428][  T966] device pim6reg1 entered promiscuous mode
[   35.834692][  T978] EXT4-fs warning (device sda1): ext4_ioctl:888: Setting inode version is not supported with metadata_csum enabled.
[   37.008313][   T23] audit: type=1400 audit(1719240383.670:125): avc:  denied  { create } for  pid=1008 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[   37.232976][ T1035] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0
[   37.332819][ T1025] device syzkaller0 entered promiscuous mode
[   37.821233][ T1047] device syzkaller0 entered promiscuous mode
[   37.841689][ T1029] syz-executor.0 (1029) used greatest stack depth: 20952 bytes left
[   40.511600][ T1128] device syzkaller0 entered promiscuous mode
[   41.286018][ T1159] bridge0: port 2(bridge_slave_1) entered blocking state
[   41.292892][ T1159] bridge0: port 2(bridge_slave_1) entered forwarding state
[   41.300053][ T1159] bridge0: port 1(bridge_slave_0) entered blocking state
[   41.306877][ T1159] bridge0: port 1(bridge_slave_0) entered forwarding state
[   41.339512][ T1159] device bridge0 entered promiscuous mode
[   41.444470][ T1171] device syzkaller0 entered promiscuous mode
[   41.587590][ T1181] device syzkaller0 entered promiscuous mode
[   42.198373][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   42.220506][   T23] audit: type=1400 audit(1719240388.880:126): avc:  denied  { create } for  pid=1240 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1
[   42.325799][ T1243] sock: sock_set_timeout: `syz-executor.3' (pid 1243) tries to set negative timeout
[   42.826445][ T1275] bridge0: port 2(bridge_slave_1) entered disabled state
[   42.833943][ T1275] bridge0: port 1(bridge_slave_0) entered disabled state
[   42.852562][ T1275] device bridge0 left promiscuous mode
[   43.104253][ T1295] device syzkaller0 entered promiscuous mode
[   44.191234][   T23] audit: type=1400 audit(1719240390.840:127): avc:  denied  { create } for  pid=1326 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[   44.333718][ T1346] bridge0: port 2(bridge_slave_1) entered disabled state
[   44.340761][ T1346] bridge0: port 1(bridge_slave_0) entered disabled state
[   44.465500][ T1354] bridge0: port 1(bridge_slave_0) entered disabled state
[   44.776001][ T1374] device vxcan1 entered promiscuous mode
[   45.186517][   T23] audit: type=1400 audit(1719240391.840:128): avc:  denied  { create } for  pid=1392 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[   45.326688][ T1401] device lo entered promiscuous mode
[   45.707786][ T1422] device syzkaller0 entered promiscuous mode
[   45.937812][ T1394] syz-executor.3 (1394) used greatest stack depth: 20728 bytes left
[   46.205405][   T23] audit: type=1400 audit(1719240392.860:129): avc:  denied  { create } for  pid=1465 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1
[   47.839588][   T23] audit: type=1400 audit(1719240394.500:130): avc:  denied  { ioctl } for  pid=1570 comm="syz-executor.1" path="net:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   49.436220][ T1621] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 5 (only 8 groups)
[   50.565762][   T23] audit: type=1400 audit(1719240397.220:131): avc:  denied  { create } for  pid=1654 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[   51.392479][   T23] audit: type=1400 audit(1719240398.040:132): avc:  denied  { create } for  pid=1662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[   51.635578][ T1689] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 59301 (only 8 groups)
[   51.658961][ T1692] bridge0: port 2(bridge_slave_1) entered disabled state
[   51.688796][ T1692] device bridge0 left promiscuous mode
[   51.747618][ T1695] device bridge_slave_1 left promiscuous mode
[   51.767849][ T1695] bridge0: port 2(bridge_slave_1) entered disabled state
[   51.807818][ T1695] device bridge_slave_0 left promiscuous mode
[   51.814370][ T1695] bridge0: port 1(bridge_slave_0) entered disabled state
[   52.507445][ T1732] bridge0: port 2(bridge_slave_1) entered disabled state
[   52.515671][ T1732] bridge0: port 1(bridge_slave_0) entered disabled state
[   53.083520][ T1757] EXT4-fs warning (device sda1): ext4_group_extend:1835: need to use ext2online to resize further
[   53.698281][ T1776] device wg2 entered promiscuous mode
[   53.828394][ T1785] syz-executor.2[1785] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   53.828554][ T1785] syz-executor.2[1785] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   54.372955][ T1797] gretap0: refused to change device tx_queue_len
[   54.652069][ T1806] device wg2 entered promiscuous mode
[   54.684249][  T370] syz-executor.1 (370) used greatest stack depth: 19320 bytes left
[   54.816156][   T23] audit: type=1400 audit(1719240401.470:133): avc:  denied  { create } for  pid=1815 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[   54.923289][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state
[   54.931386][ T1817] bridge0: port 1(bridge_slave_0) entered disabled state
[   54.938857][ T1817] device bridge_slave_0 entered promiscuous mode
[   54.946396][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state
[   54.953350][ T1817] bridge0: port 2(bridge_slave_1) entered disabled state
[   54.960740][ T1817] device bridge_slave_1 entered promiscuous mode
[   55.154157][ T1833] gretap0: refused to change device tx_queue_len
[   55.766776][   T23] audit: type=1400 audit(1719240402.420:134): avc:  denied  { append } for  pid=1849 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   55.852650][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   55.865936][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   55.916077][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   55.932260][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   55.998142][  T434] bridge0: port 1(bridge_slave_0) entered blocking state
[   56.005002][  T434] bridge0: port 1(bridge_slave_0) entered forwarding state
[   56.083429][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   56.136587][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   56.185119][  T434] bridge0: port 2(bridge_slave_1) entered blocking state
[   56.191993][  T434] bridge0: port 2(bridge_slave_1) entered forwarding state
[   56.297984][    T7] device bridge_slave_1 left promiscuous mode
[   56.304730][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   56.362840][    T7] device bridge_slave_0 left promiscuous mode
[   56.411840][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   56.599559][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   56.607141][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   56.665304][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   56.818459][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   56.826598][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   56.931906][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   56.968154][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   56.976557][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   57.058448][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   57.167086][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   57.197057][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   57.212343][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   57.230717][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   57.243224][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   57.251991][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   57.284610][   T23] audit: type=1400 audit(1719240403.940:135): avc:  denied  { mounton } for  pid=1817 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=11595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   57.405226][ T1890] device syzkaller0 entered promiscuous mode
[   58.001341][ T1902] bridge0: port 1(bridge_slave_0) entered blocking state
[   58.008356][ T1902] bridge0: port 1(bridge_slave_0) entered disabled state
[   58.015936][ T1902] device bridge_slave_0 entered promiscuous mode
[   58.025882][ T1902] bridge0: port 2(bridge_slave_1) entered blocking state
[   58.033847][ T1902] bridge0: port 2(bridge_slave_1) entered disabled state
[   58.042055][ T1902] device bridge_slave_1 entered promiscuous mode
[   58.164659][ T1902] bridge0: port 2(bridge_slave_1) entered blocking state
[   58.171611][ T1902] bridge0: port 2(bridge_slave_1) entered forwarding state
[   58.178735][ T1902] bridge0: port 1(bridge_slave_0) entered blocking state
[   58.185477][ T1902] bridge0: port 1(bridge_slave_0) entered forwarding state
[   58.530094][    T5] bridge0: port 1(bridge_slave_0) entered disabled state
[   58.558608][    T5] bridge0: port 2(bridge_slave_1) entered disabled state
[   58.590152][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   58.597522][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   58.718838][ T1950] device syzkaller0 left promiscuous mode
[   58.725289][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   58.734038][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   58.740880][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   58.757958][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   58.766231][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[   58.773069][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[   58.838999][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   58.874518][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   58.884979][    T7] device bridge_slave_1 left promiscuous mode
[   58.892252][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   58.900202][    T7] device bridge_slave_0 left promiscuous mode
[   58.906252][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.039679][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   59.070728][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   59.080023][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   59.098064][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   59.106236][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   59.133071][ T1981] syz-executor.2[1981] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   59.135005][ T1981] syz-executor.2[1981] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   59.135418][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   59.176604][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   59.198979][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   59.215674][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   59.255133][ T1986] syz-executor.2[1986] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   59.500100][ T1998] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.518571][ T1998] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.525927][ T1998] device bridge_slave_0 entered promiscuous mode
[   59.532949][ T1998] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.539873][ T1998] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.547214][ T1998] device bridge_slave_1 entered promiscuous mode
[   59.667604][ T1998] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.674607][ T1998] bridge0: port 2(bridge_slave_1) entered forwarding state
[   59.681760][ T1998] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.688601][ T1998] bridge0: port 1(bridge_slave_0) entered forwarding state
[   59.764473][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   59.772287][  T397] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.779689][  T397] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.802083][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   59.811165][  T433] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.818044][  T433] bridge0: port 1(bridge_slave_0) entered forwarding state
[   59.826905][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   59.835752][  T397] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.842606][  T397] bridge0: port 2(bridge_slave_1) entered forwarding state
[   59.871266][   T23] audit: type=1400 audit(1719240406.530:136): avc:  denied  { create } for  pid=2014 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1
[   59.892751][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   59.917183][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   59.956401][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   59.988672][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   60.010672][  T435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   60.053445][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   60.062261][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   60.078307][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   60.086440][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   60.207920][    T7] device bridge_slave_1 left promiscuous mode
[   60.214081][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.221562][    T7] device bridge_slave_0 left promiscuous mode
[   60.227541][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.528343][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.556830][ T2048] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.565263][ T2048] device bridge_slave_0 entered promiscuous mode
[   60.574394][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.581252][ T2048] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.596847][ T2048] device bridge_slave_1 entered promiscuous mode
[   60.786190][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.793141][ T2048] bridge0: port 2(bridge_slave_1) entered forwarding state
[   60.800288][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.807130][ T2048] bridge0: port 1(bridge_slave_0) entered forwarding state
[   60.926674][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   60.964471][   T13] bridge0: port 1(bridge_slave_0) entered disabled state
[   61.046286][   T13] bridge0: port 2(bridge_slave_1) entered disabled state
[   61.109180][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   61.176215][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   61.183088][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   61.495887][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   61.605790][   T23] audit: type=1400 audit(1719240408.260:137): avc:  denied  { create } for  pid=2086 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[   61.619697][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   61.632450][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   61.711560][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   61.725880][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   61.747737][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   61.764517][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   61.819319][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   61.863437][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   61.898762][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   61.907664][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   61.925817][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   61.934336][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   61.948695][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   61.956718][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   61.965011][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   61.973773][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   62.314736][   T23] audit: type=1400 audit(1719240408.970:138): avc:  denied  { create } for  pid=2135 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1
[   62.354347][ T2132] device syzkaller0 entered promiscuous mode
[   62.391964][    T7] device bridge_slave_1 left promiscuous mode
[   62.398025][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   62.405239][    T7] device bridge_slave_0 left promiscuous mode
[   62.411381][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   62.476758][ T2139] device wg2 left promiscuous mode
[   62.545167][ T2128] bridge0: port 1(bridge_slave_0) entered blocking state
[   62.570730][ T2128] bridge0: port 1(bridge_slave_0) entered disabled state
[   62.578216][ T2128] device bridge_slave_0 entered promiscuous mode
[   62.599974][ T2128] bridge0: port 2(bridge_slave_1) entered blocking state
[   62.609154][ T2128] bridge0: port 2(bridge_slave_1) entered disabled state
[   62.622349][ T2128] device bridge_slave_1 entered promiscuous mode
[   62.801851][ T2128] bridge0: port 2(bridge_slave_1) entered blocking state
[   62.808714][ T2128] bridge0: port 2(bridge_slave_1) entered forwarding state
[   62.815834][ T2128] bridge0: port 1(bridge_slave_0) entered blocking state
[   62.822599][ T2128] bridge0: port 1(bridge_slave_0) entered forwarding state
[   62.912426][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   62.932528][  T393] bridge0: port 1(bridge_slave_0) entered disabled state
[   62.973977][  T393] bridge0: port 2(bridge_slave_1) entered disabled state
[   62.999513][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   63.021729][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   63.028712][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   63.165636][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   63.229087][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   63.235951][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   63.358276][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   63.366223][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   63.413146][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   63.422977][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   63.514702][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   63.532935][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   63.606098][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   63.617315][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   63.645022][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   63.653532][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   63.670881][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   63.679263][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   63.687419][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   63.696684][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   64.193343][ T2217] device syzkaller0 entered promiscuous mode
[   64.356321][ T2225] Q�6��\b��Y�4��: renamed from lo
[   64.424922][   T23] audit: type=1400 audit(1719240411.080:139): avc:  denied  { create } for  pid=2234 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[   64.604959][ T2246] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.612282][ T2246] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.619705][ T2246] device bridge_slave_0 entered promiscuous mode
[   64.626861][ T2246] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.643934][ T2246] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.651508][ T2246] device bridge_slave_1 entered promiscuous mode
[   64.701831][    T7] device bridge_slave_1 left promiscuous mode
[   64.708044][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.727407][    T7] device bridge_slave_0 left promiscuous mode
[   64.733726][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.833871][ T2246] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.840917][ T2246] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.848043][ T2246] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.854787][ T2246] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.915453][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   64.932973][  T397] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.945785][  T397] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.988472][ T2278] device syzkaller0 entered promiscuous mode
[   64.995569][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   65.003960][  T393] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.010807][  T393] bridge0: port 1(bridge_slave_0) entered forwarding state
[   65.018625][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   65.026697][  T393] bridge0: port 2(bridge_slave_1) entered blocking state
[   65.033544][  T393] bridge0: port 2(bridge_slave_1) entered forwarding state
[   65.071789][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   65.090774][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   65.127506][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   65.155104][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   65.173372][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   65.189230][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   65.211547][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   65.368355][ T2307] gretap0: refused to change device tx_queue_len
[   65.630640][ T2325] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.637514][ T2325] bridge0: port 1(bridge_slave_0) entered disabled state
[   65.648304][ T2325] device bridge_slave_0 entered promiscuous mode
[   65.664534][ T2325] bridge0: port 2(bridge_slave_1) entered blocking state
[   65.671713][ T2325] bridge0: port 2(bridge_slave_1) entered disabled state
[   65.679194][ T2325] device bridge_slave_1 entered promiscuous mode
[   65.797545][ T2325] bridge0: port 2(bridge_slave_1) entered blocking state
[   65.804424][ T2325] bridge0: port 2(bridge_slave_1) entered forwarding state
[   65.811540][ T2325] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.818287][ T2325] bridge0: port 1(bridge_slave_0) entered forwarding state
[   65.887409][ T2343] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.894494][ T2343] bridge0: port 1(bridge_slave_0) entered disabled state
[   65.902899][ T2343] device bridge_slave_0 entered promiscuous mode
[   65.912162][    T7] device bridge_slave_1 left promiscuous mode
[   65.918276][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   65.926023][    T7] device bridge_slave_0 left promiscuous mode
[   65.932121][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   65.998219][ T2343] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.005249][ T2343] bridge0: port 2(bridge_slave_1) entered disabled state
[   66.012883][ T2343] device bridge_slave_1 entered promiscuous mode
[   66.045901][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   66.054648][  T392] bridge0: port 1(bridge_slave_0) entered disabled state
[   66.061955][  T392] bridge0: port 2(bridge_slave_1) entered disabled state
[   66.093045][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   66.106737][  T392] bridge0: port 1(bridge_slave_0) entered blocking state
[   66.113621][  T392] bridge0: port 1(bridge_slave_0) entered forwarding state
[   66.137208][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   66.154044][  T392] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.160926][  T392] bridge0: port 2(bridge_slave_1) entered forwarding state
[   66.198093][   T74] cfg80211: failed to load regulatory.db
[   66.237595][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   66.258232][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   66.275769][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   66.322225][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   66.354672][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   66.390449][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   66.399373][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   66.522399][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   66.532390][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   66.568069][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   66.576407][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   66.585782][  T434] bridge0: port 1(bridge_slave_0) entered blocking state
[   66.592641][  T434] bridge0: port 1(bridge_slave_0) entered forwarding state
[   66.646666][ T2364] bridge0: port 1(bridge_slave_0) entered blocking state
[   66.653831][ T2364] bridge0: port 1(bridge_slave_0) entered disabled state
[   66.664264][ T2364] device bridge_slave_0 entered promiscuous mode
[   66.683134][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   66.703403][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   66.717104][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   66.725369][  T434] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.732351][  T434] bridge0: port 2(bridge_slave_1) entered forwarding state
[   66.743757][ T2364] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.750684][ T2364] bridge0: port 2(bridge_slave_1) entered disabled state
[   66.758103][ T2364] device bridge_slave_1 entered promiscuous mode
[   66.768149][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   66.777113][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   66.786910][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   66.795164][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   66.882935][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   66.896682][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   66.968844][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   66.985120][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   67.055763][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   67.067136][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   67.099412][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   67.107572][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   67.129472][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   67.137809][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   67.152616][ T2374] bridge0: port 1(bridge_slave_0) entered blocking state
[   67.159867][ T2374] bridge0: port 1(bridge_slave_0) entered disabled state
[   67.167181][ T2374] device bridge_slave_0 entered promiscuous mode
[   67.178121][ T2374] bridge0: port 2(bridge_slave_1) entered blocking state
[   67.186687][ T2374] bridge0: port 2(bridge_slave_1) entered disabled state
[   67.197502][ T2374] device bridge_slave_1 entered promiscuous mode
[   67.250218][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   67.258168][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   67.266176][  T434] bridge0: port 1(bridge_slave_0) entered blocking state
[   67.273008][  T434] bridge0: port 1(bridge_slave_0) entered forwarding state
[   67.299144][   T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   67.308643][   T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   67.316674][   T74] bridge0: port 2(bridge_slave_1) entered blocking state
[   67.323686][   T74] bridge0: port 2(bridge_slave_1) entered forwarding state
[   67.341383][ T2395] device bridge0 entered promiscuous mode
[   67.349142][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   67.395279][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   67.431407][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   67.441548][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   67.494316][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   67.502477][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   67.511415][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   67.519649][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   67.562667][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   67.573127][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   67.583771][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   67.593002][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   67.684403][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   67.692970][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   67.714323][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   67.722911][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   67.731645][  T434] bridge0: port 1(bridge_slave_0) entered blocking state
[   67.738485][  T434] bridge0: port 1(bridge_slave_0) entered forwarding state
[   67.745974][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   67.762367][  T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   67.779189][  T434] bridge0: port 2(bridge_slave_1) entered blocking state
[   67.786123][  T434] bridge0: port 2(bridge_slave_1) entered forwarding state
[   67.820751][    T7] device bridge_slave_1 left promiscuous mode
[   67.826701][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   67.867228][    T7] device bridge_slave_0 left promiscuous mode
[   67.890968][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   67.944211][    T7] device bridge_slave_1 left promiscuous mode
[   67.956840][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   67.964537][    T7] device bridge_slave_0 left promiscuous mode
[   67.977151][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.010652][    T7] device bridge_slave_1 left promiscuous mode
[   68.023130][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   68.033629][    T7] device bridge_slave_0 left promiscuous mode
[   68.041889][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.367845][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   68.375310][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   68.383211][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   68.392511][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   68.401719][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   68.447082][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   68.455330][  T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   68.494033][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   68.506135][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   68.514000][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   68.522423][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   68.539098][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   68.547591][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   68.556007][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   68.564577][  T545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   69.022916][ T2441] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.030200][ T2441] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.037441][ T2441] device bridge_slave_0 entered promiscuous mode
[   69.050654][ T2441] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.057521][ T2441] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.064804][ T2441] device bridge_slave_1 entered promiscuous mode
[   69.071559][ T2440] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.078395][ T2440] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.085649][ T2440] device bridge_slave_0 entered promiscuous mode
[   69.097327][ T2440] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.104240][ T2440] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.111740][ T2440] device bridge_slave_1 entered promiscuous mode
[   69.147229][ T2444] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.154275][ T2444] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.161818][ T2444] device bridge_slave_0 entered promiscuous mode
[   69.172140][ T2444] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.179013][ T2444] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.186295][ T2444] device bridge_slave_1 entered promiscuous mode
[   69.302946][ T2440] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.309818][ T2440] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.316929][ T2440] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.323692][ T2440] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.340318][ T2441] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.347172][ T2441] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.354301][ T2441] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.361065][ T2441] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.415330][ T2444] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.422198][ T2444] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.429273][ T2444] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.436064][ T2444] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.448919][   T13] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.456090][   T13] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.463867][   T13] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.471274][   T13] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.478456][   T13] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.485419][   T13] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.514327][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   69.521600][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   69.538047][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   69.546137][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   69.554239][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   69.562591][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   69.570700][   T13] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.577548][   T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.584898][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   69.593075][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   69.601101][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.607926][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.618368][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   69.625668][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   69.652968][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   69.661449][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   69.669503][  T397] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.676335][  T397] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.683675][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   69.708396][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   69.716431][  T397] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.723280][  T397] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.730535][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   69.738781][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   69.746819][  T397] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.753664][  T397] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.830028][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   69.838928][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   69.847116][  T391] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.853981][  T391] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.870778][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   69.879245][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   69.886978][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   69.895974][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   69.922802][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   69.931023][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   69.939149][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   69.947018][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   69.955314][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   69.963508][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   70.018123][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   70.026343][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   70.034634][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   70.042891][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   70.051078][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   70.059706][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   70.113021][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   70.122423][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   70.131575][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   70.139799][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   70.148103][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   70.156370][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   70.192331][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   70.200901][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   70.209231][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   70.216974][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   70.226712][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   70.234989][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   70.243556][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   70.251720][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   70.259825][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   70.267934][  T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   70.305531][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   70.314720][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   70.324271][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   70.332646][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   70.341272][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   70.349871][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   70.371525][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   70.381056][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   70.414528][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   70.424897][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   70.462935][ T2482] device syzkaller0 entered promiscuous mode
[   70.690183][ T2489] bridge0: port 1(bridge_slave_0) entered blocking state
[   70.697020][ T2489] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.714642][ T2489] device bridge_slave_0 entered promiscuous mode
[   70.730847][ T2489] bridge0: port 2(bridge_slave_1) entered blocking state
[   70.746566][ T2489] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.763090][ T2489] device bridge_slave_1 entered promiscuous mode
[   70.835259][    T7] device bridge_slave_1 left promiscuous mode
[   70.841942][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.851342][    T7] device bridge_slave_0 left promiscuous mode
[   70.872046][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.897312][    T7] device bridge_slave_1 left promiscuous mode
[   70.915072][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.932249][    T7] device bridge_slave_0 left promiscuous mode
[   70.947974][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.968694][    T7] device bridge_slave_1 left promiscuous mode
[   70.974681][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.988016][    T7] device bridge_slave_0 left promiscuous mode
[   70.994004][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   71.453254][ T2504] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.460180][ T2504] bridge0: port 1(bridge_slave_0) entered disabled state
[   71.467558][ T2504] device bridge_slave_0 entered promiscuous mode
[   71.481502][ T2504] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.489318][ T2504] bridge0: port 2(bridge_slave_1) entered disabled state
[   71.496805][ T2504] device bridge_slave_1 entered promiscuous mode
[   71.551199][ T2489] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.558189][ T2489] bridge0: port 2(bridge_slave_1) entered forwarding state
[   71.565279][ T2489] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.572075][ T2489] bridge0: port 1(bridge_slave_0) entered forwarding state
[   71.595318][  T391] bridge0: port 1(bridge_slave_0) entered disabled state
[   71.602505][  T391] bridge0: port 2(bridge_slave_1) entered disabled state
[   71.693930][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   71.701878][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   71.728923][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   71.737386][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   71.745447][  T466] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.752278][  T466] bridge0: port 1(bridge_slave_0) entered forwarding state
[   71.760453][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   71.768752][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   71.776822][  T466] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.783654][  T466] bridge0: port 2(bridge_slave_1) entered forwarding state
[   71.813081][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   71.821672][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   71.829861][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   71.838517][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   71.872567][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   71.886825][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   71.898014][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   71.906005][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   71.947631][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   71.957373][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   71.966510][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   71.974857][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   71.983550][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   71.991867][   T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   72.015194][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   72.024407][   T23] audit: type=1400 audit(1719240418.690:140): avc:  denied  { create } for  pid=2552 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1
[   72.055712][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.064133][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   72.089319][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   72.105101][  T397] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.111959][  T397] bridge0: port 1(bridge_slave_0) entered forwarding state
[   72.149126][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   72.156803][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   72.168693][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   72.176846][   T13] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.183690][   T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[   72.215704][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   72.239758][  T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   72.264047][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   72.307141][  T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   72.365064][ T2561] device wg2 entered promiscuous mode
[   72.387373][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   72.417904][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   72.425992][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   72.446353][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   72.464970][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   72.687200][ T2576] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.694683][ T2576] bridge0: port 1(bridge_slave_0) entered disabled state
[   72.707998][ T2576] device bridge_slave_0 entered promiscuous mode
[   72.715293][ T2576] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.722188][ T2576] bridge0: port 2(bridge_slave_1) entered disabled state
[   72.741202][ T2576] device bridge_slave_1 entered promiscuous mode
[   72.990369][ T2576] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.997250][ T2576] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.004374][ T2576] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.011134][ T2576] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.217750][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   73.227551][ T2566] bridge0: port 1(bridge_slave_0) entered disabled state
[   73.234888][    C0] ------------[ cut here ]------------
[   73.240144][    C0] General protection fault in user access. Non-canonical address?
[   73.240209][    C0] WARNING: CPU: 0 PID: 10 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0x9b/0xc0
[   73.256894][    C0] Modules linked in:
[   73.260656][    C0] CPU: 0 PID: 10 Comm: ksoftirqd/0 Tainted: G        W         5.4.274-syzkaller-00002-g6f97bd951d82 #0
[   73.271567][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[   73.281478][    C0] RIP: 0010:ex_handler_uaccess+0x9b/0xc0
[   73.286957][    C0] Code: f7 e8 e9 a3 63 00 49 89 2e b0 01 5b 41 5e 41 5f 5d c3 e8 48 be 33 00 c6 05 52 1a 19 05 01 48 c7 c7 e0 d1 a6 84 e8 65 72 0a 00 <0f> 0b eb 9a 89 d9 80 e1 07 80 c1 03 38 c1 7c ac 48 89 df e8 1d a3
[   73.306378][    C0] RSP: 0018:ffff8881f5ddf650 EFLAGS: 00010046
[   73.312271][    C0] RAX: 63a3f2b450244300 RBX: ffffffff8480788c RCX: ffff8881f5dc9f80
[   73.320086][    C0] RDX: 0000000080000103 RSI: 000000000000061a RDI: 0000000000000001
[   73.327893][    C0] RBP: 000000000000000d R08: ffffffff814d4a22 R09: fffffbfff0dd7a10
[   73.335711][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
[   73.343643][    C0] R13: ffff8881f5ddf778 R14: ffff8881f5ddf778 R15: ffffffff84807894
[   73.351447][    C0] FS:  0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[   73.360220][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   73.366638][    C0] CR2: 0000001b32b25000 CR3: 00000001d7bdc000 CR4: 00000000003406b0
[   73.374465][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   73.382256][    C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[   73.390067][    C0] Call Trace:
[   73.393200][    C0]  ? __warn+0x162/0x250
[   73.397190][    C0]  ? report_bug+0x3a1/0x4e0
[   73.401528][    C0]  ? ex_handler_uaccess+0x9b/0xc0
[   73.406390][    C0]  ? ex_handler_uaccess+0x9b/0xc0
[   73.411253][    C0]  ? do_invalid_op+0x6e/0x110
[   73.415764][    C0]  ? invalid_op+0x1e/0x30
[   73.419926][    C0]  ? __start___ex_table+0x5864/0x5ebc
[   73.425133][    C0]  ? __start___ex_table+0x585c/0x5ebc
[   73.430344][    C0]  ? vprintk_emit+0x192/0x3f0
[   73.434858][    C0]  ? ex_handler_uaccess+0x9b/0xc0
[   73.439725][    C0]  ? ex_handler_fprestore+0xe0/0xe0
[   73.444750][    C0]  ? __start___ex_table+0x5864/0x5ebc
[   73.449963][    C0]  ? __start___ex_table+0x585c/0x5ebc
[   73.455163][    C0]  fixup_exception+0x93/0xd0
[   73.459594][    C0]  do_general_protection+0x1a3/0x3c0
[   73.464713][    C0]  ? do_trap+0x340/0x340
[   73.468801][    C0]  ? stack_trace_save+0x118/0x1c0
[   73.473665][    C0]  ? stack_trace_snprint+0x170/0x170
[   73.478778][    C0]  general_protection+0x28/0x30
[   73.483464][    C0] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0
[   73.489621][    C0] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 01 ca c3 66 66
[   73.509060][    C0] RSP: 0018:ffff8881f5ddf820 EFLAGS: 00050002
[   73.514975][    C0] RAX: ffffffff819965d7 RBX: ffff8881f5dca9d8 RCX: 0000000000000002
[   73.522776][    C0] RDX: 0000000000000002 RSI: fc1a000000000000 RDI: ffff8881f5ddf8c8
[   73.530590][    C0] RBP: 1ffff1103ebb953b R08: 0000000000000005 R09: ffffffff819965c0
[   73.538570][    C0] R10: ffff8881f5dc9f80 R11: 0000000000000003 R12: ffff8881f5ddf8c8
[   73.546372][    C0] R13: ffff8881f5dc9f80 R14: 1ffff1103ebb9563 R15: 0000000000000002
[   73.554198][    C0]  ? __check_object_size+0x70/0x3a0
[   73.559222][    C0]  ? __check_object_size+0x87/0x3a0
[   73.564259][    C0]  __probe_kernel_read+0xd9/0x190
[   73.569119][    C0]  bpf_probe_read+0x3f/0x80
[   73.573454][    C0]  bpf_prog_661afe553e78869a+0xf08/0x1000
[   73.579009][    C0]  bpf_trace_run3+0x128/0x2f0
[   73.583522][    C0]  ? bpf_trace_run2+0x2d0/0x2d0
[   73.588210][    C0]  ? pcpu_chunk_relocate+0xdc/0x3a0
[   73.593242][    C0]  ? __bpf_trace_percpu_alloc_percpu+0x50/0x50
[   73.599246][    C0]  free_percpu+0x5af/0x910
[   73.603502][    C0]  fib_nh_common_release+0x89/0x210
[   73.608522][    C0]  ? free_fib_info+0x90/0x90
[   73.612945][    C0]  free_fib_info_rcu+0x90/0x170
[   73.617632][    C0]  ? free_fib_info+0x90/0x90
[   73.622058][    C0]  rcu_do_batch+0x492/0xa00
[   73.626401][    C0]  ? local_bh_enable+0x20/0x20
[   73.631002][    C0]  ? _raw_spin_lock_irqsave+0xf9/0x210
[   73.636292][    C0]  ? _raw_spin_lock+0x1b0/0x1b0
[   73.640986][    C0]  rcu_core+0x4c8/0xcb0
[   73.644973][    C0]  ? check_preemption_disabled+0x9f/0x320
[   73.650531][    C0]  ? rcu_cpu_kthread_park+0x90/0x90
[   73.655560][    C0]  ? sched_clock_cpu+0x18/0x3a0
[   73.660274][    C0]  ? debug_smp_processor_id+0x20/0x20
[   73.665469][    C0]  ? irqtime_account_irq+0x6d/0x1b0
[   73.670494][    C0]  __do_softirq+0x23b/0x6b7
[   73.674850][    C0]  ? ksoftirqd_should_run+0x20/0x20
[   73.679865][    C0]  run_ksoftirqd+0x1f/0x30
[   73.684117][    C0]  smpboot_thread_fn+0x545/0x930
[   73.688898][    C0]  ? cpu_report_death+0x180/0x180
[   73.693752][    C0]  ? schedule+0x143/0x1d0
[   73.697916][    C0]  ? __kthread_parkme+0x177/0x1b0
[   73.702776][    C0]  kthread+0x2da/0x360
[   73.706683][    C0]  ? cpu_report_death+0x180/0x180
[   73.711542][    C0]  ? kthread_blkcg+0xd0/0xd0
[   73.715988][    C0]  ret_from_fork+0x1f/0x30
[   73.720224][    C0] ---[ end trace 44c1b02c0c034a69 ]---
[   73.730878][ T2566] bridge0: port 2(bridge_slave_1) entered disabled state
[   73.775008][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.784590][ T2566] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.791454][ T2566] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.799644][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   73.807775][ T2566] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.814618][ T2566] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.844469][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   73.854225][  T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   74.749510][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   74.765305][  T466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   74.801209][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   74.811238][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   74.834598][ T2622] bridge0: port 3(veth0_to_batadv) entered blocking state
[   74.843103][ T2622] bridge0: port 3(veth0_to_batadv) entered disabled state
[   74.853089][ T2622] device veth0_to_batadv entered promiscuous mode
[   74.860286][ T2622] bridge0: port 3(veth0_to_batadv) entered blocking state
[   74.867237][ T2622] bridge0: port 3(veth0_to_batadv) entered forwarding state
[   74.876544][ T2622] device veth0_to_batadv left promiscuous mode
[   74.883338][ T2622] bridge0: port 3(veth0_to_batadv) entered disabled state
[   74.925607][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   74.934608][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   74.974288][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   74.982751][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   75.035127][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   75.043616][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   75.052892][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   75.061290][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   75.073574][ T2591] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.080997][ T2591] bridge0: port 1(bridge_slave_0) entered disabled state
[   75.088426][ T2591] device bridge_slave_0 entered promiscuous mode
[   75.101327][ T2591] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.108297][ T2591] bridge0: port 2(bridge_slave_1) entered disabled state
[   75.115556][ T2591] device bridge_slave_1 entered promiscuous mode
[   75.193824][ T2591] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.200797][ T2591] bridge0: port 2(bridge_slave_1) entered forwarding state
[   75.207920][ T2591] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.214656][ T2591] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.245369][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.254171][  T391] bridge0: port 1(bridge_slave_0) entered disabled state
[   75.261811][  T391] bridge0: port 2(bridge_slave_1) entered disabled state
[   75.281663][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.289913][  T391] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.296867][  T391] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.304491][  T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   75.313395][  T391] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.320259][  T391] bridge0: port 2(bridge_slave_1) entered forwarding state
[   75.345266][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   75.359868][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   75.409338][    T7] device bridge_slave_1 left promiscuous mode
[   75.415789][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   75.457053][    T7] device bridge_slave_0 left promiscuous mode
[   75.474046][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   75.490787][    T7] device bridge_slave_1 left promiscuous mode
[   75.496803][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   75.510248][    T7] device bridge_slave_0 left promiscuous mode
[   75.518789][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   75.539089][    T7] device bridge_slave_1 left promiscuous mode
[   75.545032][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   75.552762][    T7] device bridge_slave_0 left promiscuous mode
[   75.559123][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[   75.792680][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   75.814649][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   75.823405][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   75.855589][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   75.864077][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   75.911590][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   75.920250][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   75.954575][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   75.972386][ T2564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   75.998228][   T23] audit: type=1400 audit(1719240422.650:141): avc:  denied  { write } for  pid=2668 comm="syz-executor.4" name="cgroup.subtree_control" dev="cgroup2" ino=333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[   76.038001][   T23] audit: type=1400 audit(1719240422.660:142): avc:  denied  { open } for  pid=2668 comm="syz-executor.4" path="<too_long>" dev="cgroup2" ino=333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[   76.067464][ T2676] device xfrm0 entered promiscuous mode
[   76.076074][ T2651] bridge0: port 1(bridge_slave_0) entered blocking state
[   76.083186][ T2651] bridge0: port 1(bridge_slave_0) entered disabled state
[   76.091332][ T2651] device bridge_slave_0 entered promiscuous mode
[   76.099758][ T2651] bridge0: port 2(bridge_slave_1) entered blocking state
[   76.106994][ T2651] bridge0: port 2(bridge_slave_1) entered disabled state
[   76.114774][ T2651] device bridge_slave_1 entered promiscuous mode
2024/06/24 14:47:02 SYZFATAL: executor 1 failed 11 times: executor 1: failed to write control pipe: write |1: broken pipe
SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)
 (errno 1: Operation not permitted)
loop exited with status 67