last executing test programs: 4.317133946s ago: executing program 0 (id=1820): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xf5, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x20, &(0x7f00000007c0)={&(0x7f0000000600)=""/152, 0x98, 0x0, &(0x7f00000006c0)=""/249, 0xf9}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2c, 0xa, 0x3ff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000600), 0x12) openat$cgroup_procs(r6, &(0x7f0000000ac0)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r7, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r8}, 0xc) close(r9) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0xb, &(0x7f0000000180)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc35e}}, @alu={0x7, 0x0, 0xd, 0xb, 0x3, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000e80)=""/4096, 0x40f00, 0x0, '\x00', r1, @fallback=0xf, r2, 0x8, &(0x7f0000000580)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x7, 0x9, 0x800}, 0x10, r3, r10, 0x2, &(0x7f0000000940)=[r0], &(0x7f00000009c0)=[{0x0, 0x4, 0x7, 0x9}, {0x0, 0x4, 0xc, 0x1}], 0x10, 0xa8f, @void, @value}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.899195252s ago: executing program 3 (id=1825): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f0000003fc0)}, 0xe) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r5, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) 3.715033205s ago: executing program 0 (id=1828): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x0, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20408, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x0, 0x9}, 0x10404, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4000, 0x5, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x70}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) 3.539544517s ago: executing program 3 (id=1832): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7ae20a00ff00000000711064000000000005000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000003000), 0x201, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x54}, {0x6}]}) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') 3.516606178s ago: executing program 2 (id=1834): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x40000007, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000f8ffffffffffffff5f", @ANYRES16], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 3.512871248s ago: executing program 0 (id=1835): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.405883359s ago: executing program 0 (id=1837): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfdef) sendmsg$inet(r2, &(0x7f0000000940)={&(0x7f00000002c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000580)}, {&(0x7f0000000700)="a41f3049b31fe4b8dfed4b87fafef9c0f0dc80928f2b54a2216189f25bf28cb221c7fc2b500b575c1c58c53d5b5a51354179d0a6679fe393b771c0ae2eff2ab2a3de88e41592e1be2e5f6b900ec6fb1899fed292601c37c544102bbc941df390b994cab77e61a95c77653016e383a94d61cfe6709504991b011ea346", 0x7c}, {0x0}, {&(0x7f00000007c0)}], 0x4}, 0x80) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) unlink(&(0x7f0000000000)='./cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x15, 0x10, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.233289412s ago: executing program 2 (id=1839): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xf5, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x20, &(0x7f00000007c0)={&(0x7f0000000600)=""/152, 0x98, 0x0, &(0x7f00000006c0)=""/249, 0xf9}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2c, 0xa, 0x3ff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000600), 0x12) openat$cgroup_procs(r6, &(0x7f0000000ac0)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r7, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r8}, 0xc) close(r9) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0xb, &(0x7f0000000180)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc35e}}, @alu={0x7, 0x0, 0xd, 0xb, 0x3, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000e80)=""/4096, 0x40f00, 0x0, '\x00', r1, @fallback=0xf, r2, 0x8, &(0x7f0000000580)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x7, 0x9, 0x800}, 0x10, r3, r10, 0x2, &(0x7f0000000940)=[r0], &(0x7f00000009c0)=[{0x0, 0x4, 0x7, 0x9}, {0x0, 0x4, 0xc, 0x1}], 0x10, 0xa8f, @void, @value}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.221315123s ago: executing program 0 (id=1840): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0xebff) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)='F', 0x0}, 0x50) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000600)=@base={0xa, 0x17, 0x1ff, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000840)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ff}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @generic={0x79}, @initr0={0x18, 0x0, 0x0, 0x0, 0x11000000}, @exit, @alu={0x5, 0x0, 0xd, 0xa}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x28) close(r4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup=r0, r0, 0x29, 0xc, r0, @void, @value=r0}, 0x20) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair(0x10, 0x2, 0x10, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1400000004000000040000000900000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_int(r0, &(0x7f0000000200)=0x6c, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='percpu_free_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_devices(r2, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xffdd) 3.152097713s ago: executing program 3 (id=1842): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x323, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/3, 0x3}], 0x5, &(0x7f0000002840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x40010042) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x20}, 0x1f00) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00086c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x8, 0x0, 0x103, 0x10020, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x100000000000000) 3.139601734s ago: executing program 1 (id=1843): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f0000003fc0)}, 0xe) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r5, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) 3.000831956s ago: executing program 4 (id=1844): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200003, 0x0, @perf_config_ext={0x7}, 0x0, 0x6, 0x0, 0x7, 0x1fd, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.653513311s ago: executing program 1 (id=1845): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x0, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20408, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x0, 0x9}, 0x10404, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4000, 0x5, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x70}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) 2.627887281s ago: executing program 4 (id=1846): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0xfffffdcb, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xb8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, 0x0) 2.568293872s ago: executing program 0 (id=1847): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/1423], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x49, 0x10, &(0x7f0000000340), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x40) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x4, 0x4, 0x1, 0x0, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2.274030386s ago: executing program 4 (id=1848): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f0000003fc0)}, 0xe) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r5, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) 2.129849769s ago: executing program 3 (id=1849): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x40000007, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000f8ffffffffffffff5f", @ANYRES16], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 2.06810961s ago: executing program 1 (id=1850): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x40000007, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000f8ffffffffffffff5f", @ANYRES16], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 1.675461135s ago: executing program 3 (id=1851): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfdef) sendmsg$inet(r2, &(0x7f0000000940)={&(0x7f00000002c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000580)}, {&(0x7f0000000700)="a41f3049b31fe4b8dfed4b87fafef9c0f0dc80928f2b54a2216189f25bf28cb221c7fc2b500b575c1c58c53d5b5a51354179d0a6679fe393b771c0ae2eff2ab2a3de88e41592e1be2e5f6b900ec6fb1899fed292601c37c544102bbc941df390b994cab77e61a95c77653016e383a94d61cfe6709504991b011ea346", 0x7c}, {0x0}, {&(0x7f00000007c0)}], 0x4}, 0x80) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) unlink(&(0x7f0000000000)='./cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x15, 0x10, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.595964686s ago: executing program 1 (id=1852): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x3f, 0x0, &(0x7f0000000140)="4d4b4f1ee69da7b1503f5e9c052df50ce16600e7cf357d7cb23a12286235812e7d8f558e70470c6dfd7ce20ea7f0540c3ed388d9047c890b99fff232a714df", 0x0, 0x8, 0x0, 0x0, 0x57, &(0x7f0000000200), &(0x7f0000000300)="00b057b01126cc107f06f2b5b228dbed7a61cd8d8b89b8a91fd5f83c08ff0ed359ec091d8a5f4b6d526d28f0da2e9c342dba86e8b88094b6d1cbff86c0c6e11ed82b32fa58e00d52f140846cd7a283e82937c51d6a2250", 0x0, 0x0, 0x10}, 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x79, 0x0, &(0x7f0000000500)="66b9a0276c0fbf1ee3229376c59f5a8c7fd2271cc283de422da78e870ee25f7439893e77058c302a6e10ee3977acb9b87cf6c662ad01524c85751a799715a9ba73bd33de78d4ba41391c9abc3d588fc54d4f52ac3b208857d8e7a02d273f029f4e882c1dbe5e406beaacfd1ed95f59368d2bacf13c684f62d4", 0x0, 0x6, 0x0, 0x73e, 0x0, &(0x7f0000001380)="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", 0x0, 0x2, 0x0, 0x7}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0xe, &(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xf5, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x20, &(0x7f00000007c0)={&(0x7f0000000600)=""/152, 0x98, 0x0, &(0x7f00000006c0)=""/249, 0xf9}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2c, 0xa, 0x3ff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000600), 0x12) openat$cgroup_procs(r6, &(0x7f0000000ac0)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r7, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r8}, 0xc) close(r9) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0xb, &(0x7f0000000180)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc35e}}, @alu={0x7, 0x0, 0xd, 0xb, 0x3, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000e80)=""/4096, 0x40f00, 0x0, '\x00', r1, @fallback=0xf, r2, 0x8, &(0x7f0000000580)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x7, 0x9, 0x800}, 0x10, r3, r10, 0x2, &(0x7f0000000940)=[r0], &(0x7f00000009c0)=[{0x0, 0x4, 0x7, 0x9}, {0x0, 0x4, 0xc, 0x1}], 0x10, 0xa8f, @void, @value}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x94}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 587.967961ms ago: executing program 1 (id=1855): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) close(r0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77aa"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x5, '\x00', 0x0, r3, 0x1, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 587.573691ms ago: executing program 2 (id=1856): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f0000003fc0)}, 0xe) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 586.701001ms ago: executing program 2 (id=1857): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x0, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20408, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x0, 0x9}, 0x10404, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4000, 0x5, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x70}, 0x100) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) 432.930824ms ago: executing program 2 (id=1858): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x0, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20408, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x0, 0x9}, 0x10404, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4000, 0x5, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x70}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) 404.707404ms ago: executing program 4 (id=1859): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7ae20a00ff00000000711064000000000005000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000003000), 0x201, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x54}, {0x6}]}) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@generic={0x0, 0x0, 0x10}, 0x18) unlink(&(0x7f00000002c0)='./file0\x00') 403.730584ms ago: executing program 1 (id=1860): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f0000003fc0)}, 0xe) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r5, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 155.305468ms ago: executing program 4 (id=1861): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x40000007, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000f8ffffffffffffff5f", @ANYRES16], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 0s ago: executing program 2 (id=1862): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x40000007, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000f8ffffffffffffff5f", @ANYRES16], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.20' (ED25519) to the list of known hosts. [ 21.037464][ T23] audit: type=1400 audit(1747271432.410:81): avc: denied { mounton } for pid=328 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.038807][ T328] cgroup1: Unknown subsys name 'net' [ 21.060467][ T23] audit: type=1400 audit(1747271432.410:82): avc: denied { mount } for pid=328 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.066857][ T328] cgroup1: Unknown subsys name 'net_prio' [ 21.094864][ T328] cgroup1: Unknown subsys name 'devices' [ 21.101489][ T23] audit: type=1400 audit(1747271432.480:83): avc: denied { unmount } for pid=328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.273204][ T328] cgroup1: Unknown subsys name 'hugetlb' [ 21.279169][ T328] cgroup1: Unknown subsys name 'rlimit' [ 21.445392][ T23] audit: type=1400 audit(1747271432.820:84): avc: denied { setattr } for pid=328 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.469092][ T23] audit: type=1400 audit(1747271432.820:85): avc: denied { mounton } for pid=328 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.470046][ T331] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.494691][ T23] audit: type=1400 audit(1747271432.820:86): avc: denied { mount } for pid=328 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.526599][ T23] audit: type=1400 audit(1747271432.880:87): avc: denied { relabelto } for pid=331 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.552531][ T23] audit: type=1400 audit(1747271432.880:88): avc: denied { write } for pid=331 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.579844][ T23] audit: type=1400 audit(1747271432.950:89): avc: denied { read } for pid=328 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.606830][ T23] audit: type=1400 audit(1747271432.950:90): avc: denied { open } for pid=328 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.607091][ T328] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.040102][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.047853][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.055819][ T338] device bridge_slave_0 entered promiscuous mode [ 22.064768][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.072198][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.079768][ T338] device bridge_slave_1 entered promiscuous mode [ 22.141690][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.149197][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.156948][ T340] device bridge_slave_0 entered promiscuous mode [ 22.165606][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.172833][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.180274][ T340] device bridge_slave_1 entered promiscuous mode [ 22.243759][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.251669][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.259149][ T341] device bridge_slave_0 entered promiscuous mode [ 22.268889][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.276005][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.283684][ T341] device bridge_slave_1 entered promiscuous mode [ 22.315037][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.322495][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.329980][ T339] device bridge_slave_0 entered promiscuous mode [ 22.336945][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.344293][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.352140][ T342] device bridge_slave_0 entered promiscuous mode [ 22.359549][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.366847][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.374374][ T342] device bridge_slave_1 entered promiscuous mode [ 22.391672][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.398732][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.406200][ T339] device bridge_slave_1 entered promiscuous mode [ 22.470127][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.478372][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.486227][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.493976][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.543876][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.551179][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.558747][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.566011][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.578489][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.585799][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.593121][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.601722][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.637043][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.645434][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.654094][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.661873][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.669756][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.677084][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.685289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.692817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.713335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.722048][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.729140][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.753978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.762010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.770543][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.777603][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.797777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.806459][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.813894][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.821875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.830038][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.837233][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.852179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.871313][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.879967][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.888572][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.897275][ T102] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.904506][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.912104][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.920001][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.928209][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.935799][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.961777][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.969641][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.978137][ T102] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.985337][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.993845][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.002444][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.009623][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.017056][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.025334][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.033416][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.041389][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.072445][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.081229][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.089282][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.098494][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.107309][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.118064][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.125926][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.144358][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.152824][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.160964][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.169266][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.178539][ T102] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.185592][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.193428][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.212807][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.221725][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.229898][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.237281][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.245100][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.253401][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.261787][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.270265][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.282579][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.291518][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.318226][ T341] request_module fs-gadgetfs succeeded, but still no fs? [ 23.318528][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.334554][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.347554][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.356411][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.366204][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.374735][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.383390][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.391664][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.399975][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.408820][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.448794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.457352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.465905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.475239][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.483922][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.492619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.501338][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.509139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.517139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.525911][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.534825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.543166][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.551449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.559561][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.568875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.577189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.585865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.594655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.631664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.643575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.652794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.664986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.784529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.844241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.880769][ C1] hrtimer: interrupt took 23997 ns [ 24.606264][ T380] syz.2.7 uses obsolete (PF_INET,SOCK_PACKET) [ 25.295584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.304747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.591932][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.601310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.610110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.618969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.640463][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.649164][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.665243][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.673190][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.680720][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.687895][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.695351][ T398] device bridge0 entered promiscuous mode [ 29.065442][ T23] kauditd_printk_skb: 44 callbacks suppressed [ 29.065453][ T23] audit: type=1400 audit(1747271440.430:135): avc: denied { map_read map_write } for pid=403 comm="syz.2.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.739295][ T422] bridge0: port 3(veth0) entered blocking state [ 30.789733][ T422] bridge0: port 3(veth0) entered disabled state [ 30.850946][ T422] device veth0 entered promiscuous mode [ 30.949251][ T422] bridge0: port 3(veth0) entered blocking state [ 30.955971][ T422] bridge0: port 3(veth0) entered forwarding state [ 31.210954][ T425] device veth0 left promiscuous mode [ 31.306843][ T425] bridge0: port 3(veth0) entered disabled state [ 32.400236][ T440] cgroup: syz.1.23 (440) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.574401][ T440] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 33.414170][ T23] audit: type=1400 audit(1747271444.790:136): avc: denied { write } for pid=449 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.802035][ T460] bridge0: port 3(veth0) entered blocking state [ 33.808571][ T460] bridge0: port 3(veth0) entered disabled state [ 33.848889][ T460] device veth0 entered promiscuous mode [ 33.856019][ T460] bridge0: port 3(veth0) entered blocking state [ 33.863207][ T460] bridge0: port 3(veth0) entered forwarding state [ 33.892984][ T464] device veth0 left promiscuous mode [ 33.901609][ T464] bridge0: port 3(veth0) entered disabled state [ 36.453592][ T23] audit: type=1400 audit(1747271447.830:137): avc: denied { write } for pid=505 comm="syz.3.48" name="cgroup.subtree_control" dev="cgroup2" ino=214 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 36.764183][ T23] audit: type=1400 audit(1747271447.830:138): avc: denied { open } for pid=505 comm="syz.3.48" path="" dev="cgroup2" ino=214 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 37.683524][ T534] bridge0: port 3(veth0) entered blocking state [ 37.692200][ T534] bridge0: port 3(veth0) entered disabled state [ 37.709191][ T534] device veth0 entered promiscuous mode [ 37.725798][ T534] bridge0: port 3(veth0) entered blocking state [ 37.732422][ T534] bridge0: port 3(veth0) entered forwarding state [ 37.757733][ T537] device veth0 left promiscuous mode [ 37.763316][ T537] bridge0: port 3(veth0) entered disabled state [ 39.297644][ T23] audit: type=1400 audit(1747271450.660:139): avc: denied { append } for pid=555 comm="syz.3.58" name="ppp" dev="devtmpfs" ino=9793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.599464][ T579] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.635383][ T579] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.763920][ T587] bridge0: port 3(veth0) entered blocking state [ 39.770381][ T587] bridge0: port 3(veth0) entered disabled state [ 39.783170][ T587] device veth0 entered promiscuous mode [ 39.790007][ T587] bridge0: port 3(veth0) entered blocking state [ 39.796620][ T587] bridge0: port 3(veth0) entered forwarding state [ 39.810606][ T589] device veth0 left promiscuous mode [ 39.816243][ T589] bridge0: port 3(veth0) entered disabled state [ 39.823127][ T582] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.830186][ T582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.837618][ T582] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.845047][ T582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.852791][ T582] device bridge0 entered promiscuous mode [ 41.673283][ T631] bridge0: port 3(veth0) entered blocking state [ 41.679742][ T631] bridge0: port 3(veth0) entered disabled state [ 41.722221][ T631] device veth0 entered promiscuous mode [ 41.739073][ T631] bridge0: port 3(veth0) entered blocking state [ 41.745621][ T631] bridge0: port 3(veth0) entered forwarding state [ 41.773184][ T634] device veth0 left promiscuous mode [ 41.778590][ T634] bridge0: port 3(veth0) entered disabled state [ 43.235118][ T666] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.242359][ T666] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.400057][ T661] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.408962][ T661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.429336][ T661] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.438286][ T661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.632690][ T661] device bridge0 entered promiscuous mode [ 44.320920][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.842401][ T702] bridge0: port 3(veth0) entered blocking state [ 44.855391][ T702] bridge0: port 3(veth0) entered disabled state [ 44.879896][ T702] device veth0 entered promiscuous mode [ 44.887348][ T702] bridge0: port 3(veth0) entered blocking state [ 44.893871][ T702] bridge0: port 3(veth0) entered forwarding state [ 45.474882][ T711] bridge0: port 3(veth0) entered disabled state [ 45.481352][ T711] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.488523][ T711] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.791342][ T724] bridge0: port 3(veth0) entered blocking state [ 45.845533][ T724] bridge0: port 3(veth0) entered disabled state [ 45.879140][ T724] device veth0 entered promiscuous mode [ 45.889298][ T724] bridge0: port 3(veth0) entered blocking state [ 45.895698][ T724] bridge0: port 3(veth0) entered forwarding state [ 45.930178][ T730] device veth0 left promiscuous mode [ 45.940917][ T730] bridge0: port 3(veth0) entered disabled state [ 45.984332][ T729] device syzkaller0 entered promiscuous mode [ 46.001651][ T729] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 46.123340][ T743] bridge0: port 3(veth0) entered blocking state [ 46.130627][ T743] bridge0: port 3(veth0) entered disabled state [ 46.142115][ T743] device veth0 entered promiscuous mode [ 46.149114][ T743] bridge0: port 3(veth0) entered blocking state [ 46.155586][ T743] bridge0: port 3(veth0) entered forwarding state [ 46.665008][ T760] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.440212][ T785] device veth0 left promiscuous mode [ 47.477863][ T785] bridge0: port 3(veth0) entered disabled state [ 50.694148][ T23] audit: type=1400 audit(1747271462.070:140): avc: denied { ioctl } for pid=841 comm="syz.1.151" path="mnt:[4026532609]" dev="nsfs" ino=4026532609 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 50.834913][ T857] bridge0: port 3(veth0) entered blocking state [ 50.891262][ T857] bridge0: port 3(veth0) entered disabled state [ 50.937987][ T857] device veth0 entered promiscuous mode [ 50.949254][ T857] bridge0: port 3(veth0) entered blocking state [ 50.955887][ T857] bridge0: port 3(veth0) entered forwarding state [ 50.969126][ T865] device veth0 left promiscuous mode [ 50.978762][ T865] bridge0: port 3(veth0) entered disabled state [ 51.039230][ T873] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.142281][ T23] audit: type=1400 audit(1747271462.520:141): avc: denied { create } for pid=874 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 51.176557][ T869] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.245826][ T869] device bridge0 left promiscuous mode [ 51.578349][ T878] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.585997][ T878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.605062][ T878] device bridge0 entered promiscuous mode [ 52.381074][ T912] bridge0: port 3(veth0) entered blocking state [ 52.437862][ T912] bridge0: port 3(veth0) entered disabled state [ 52.451208][ T912] device veth0 entered promiscuous mode [ 52.478468][ T912] bridge0: port 3(veth0) entered blocking state [ 52.484807][ T912] bridge0: port 3(veth0) entered forwarding state [ 52.501739][ T916] bridge0: port 3(veth0) entered blocking state [ 52.528870][ T916] bridge0: port 3(veth0) entered disabled state [ 52.546196][ T916] device veth0 entered promiscuous mode [ 52.591617][ T916] bridge0: port 3(veth0) entered blocking state [ 52.598435][ T916] bridge0: port 3(veth0) entered forwarding state [ 52.628860][ T915] device veth0 left promiscuous mode [ 52.637502][ T915] bridge0: port 3(veth0) entered disabled state [ 52.653798][ T923] device veth0 left promiscuous mode [ 52.667009][ T923] bridge0: port 3(veth0) entered disabled state [ 52.740412][ T933] bridge0: port 3(veth0) entered blocking state [ 52.757456][ T933] bridge0: port 3(veth0) entered disabled state [ 52.778881][ T933] device veth0 entered promiscuous mode [ 52.788667][ T933] bridge0: port 3(veth0) entered blocking state [ 52.795378][ T933] bridge0: port 3(veth0) entered forwarding state [ 52.821694][ T938] device veth0 left promiscuous mode [ 52.858255][ T938] bridge0: port 3(veth0) entered disabled state [ 52.968631][ T935] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.004556][ T935] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.588455][ T939] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.595845][ T939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.603558][ T939] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.610603][ T939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.651608][ T939] device bridge0 entered promiscuous mode [ 54.054346][ T967] bridge0: port 3(veth0) entered blocking state [ 54.086151][ T967] bridge0: port 3(veth0) entered disabled state [ 54.129954][ T967] device veth0 entered promiscuous mode [ 54.200116][ T967] bridge0: port 3(veth0) entered blocking state [ 54.206737][ T967] bridge0: port 3(veth0) entered forwarding state [ 54.444355][ T963] device syzkaller0 entered promiscuous mode [ 54.477355][ T972] device veth0 left promiscuous mode [ 54.490988][ T972] bridge0: port 3(veth0) entered disabled state [ 56.305789][ T23] audit: type=1400 audit(1747271467.590:142): avc: denied { cpu } for pid=1043 comm="syz.1.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 56.905969][ T1069] device syzkaller0 entered promiscuous mode [ 57.030159][ T23] audit: type=1400 audit(1747271468.400:143): avc: denied { create } for pid=1081 comm="syz.3.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 59.906894][ T1167] device veth0 left promiscuous mode [ 59.918338][ T23] audit: type=1400 audit(1747271471.290:144): avc: denied { create } for pid=1163 comm="syz.2.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 60.081649][ T1167] bridge0: port 3(veth0) entered disabled state [ 61.455398][ T1216] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.004769][ T1244] bridge0: port 3(veth0) entered blocking state [ 62.022885][ T1244] bridge0: port 3(veth0) entered disabled state [ 62.034708][ T1242] [ 62.037178][ T1242] ********************************************************** [ 62.055933][ T1244] device veth0 entered promiscuous mode [ 62.084218][ T1247] device veth0 left promiscuous mode [ 62.100930][ T1247] bridge0: port 3(veth0) entered disabled state [ 62.147821][ T1242] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 62.250853][ T1242] ** ** [ 62.340430][ T1242] ** trace_printk() being used. Allocating extra memory. ** [ 62.492493][ T1242] ** ** [ 62.510125][ T1242] ** This means that this is a DEBUG kernel and it is ** [ 62.530311][ T1242] ** unsafe for production use. ** [ 62.540074][ T1242] ** ** [ 62.621031][ T1242] ** If you see this message and you are not debugging ** [ 62.700839][ T1242] ** the kernel, report this immediately to your vendor! ** [ 62.712299][ T1242] ** ** [ 62.797362][ T1242] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 62.856145][ T1242] ********************************************************** [ 62.970829][ T1271] device lo entered promiscuous mode [ 64.461249][ T1325] bridge0: port 3(veth0) entered blocking state [ 64.470410][ T1325] bridge0: port 3(veth0) entered disabled state [ 64.565176][ T1325] device veth0 entered promiscuous mode [ 64.687222][ T1325] bridge0: port 3(veth0) entered blocking state [ 64.693619][ T1325] bridge0: port 3(veth0) entered forwarding state [ 65.020801][ T1330] device veth0 left promiscuous mode [ 65.026384][ T1330] bridge0: port 3(veth0) entered disabled state [ 65.471050][ T13] cfg80211: failed to load regulatory.db [ 65.691711][ T1352] bridge0: port 3(veth0) entered blocking state [ 65.708584][ T1352] bridge0: port 3(veth0) entered disabled state [ 65.756844][ T1352] device veth0 entered promiscuous mode [ 65.771420][ T1352] bridge0: port 3(veth0) entered blocking state [ 65.778015][ T1352] bridge0: port 3(veth0) entered forwarding state [ 65.811645][ T1356] device veth0 left promiscuous mode [ 65.817075][ T1356] bridge0: port 3(veth0) entered disabled state [ 68.354476][ T23] audit: type=1400 audit(1747271479.720:145): avc: denied { create } for pid=1440 comm="syz.3.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 68.526948][ T1450] bridge0: port 3(veth0) entered blocking state [ 68.554445][ T1450] bridge0: port 3(veth0) entered disabled state [ 68.589568][ T1450] device veth0 entered promiscuous mode [ 68.622002][ T1450] bridge0: port 3(veth0) entered blocking state [ 68.628508][ T1450] bridge0: port 3(veth0) entered forwarding state [ 68.671203][ T1454] device veth0 left promiscuous mode [ 68.677275][ T1454] bridge0: port 3(veth0) entered disabled state [ 70.313457][ T1517] : renamed from bond_slave_1 [ 70.753961][ T23] audit: type=1400 audit(1747271482.100:146): avc: denied { create } for pid=1516 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 72.421634][ T1562] bridge0: port 3(veth0) entered blocking state [ 72.432274][ T1562] bridge0: port 3(veth0) entered disabled state [ 72.474127][ T1562] device veth0 entered promiscuous mode [ 72.494290][ T1562] bridge0: port 3(veth0) entered blocking state [ 72.500780][ T1562] bridge0: port 3(veth0) entered forwarding state [ 72.510278][ T1576] device veth0 left promiscuous mode [ 72.518656][ T1576] bridge0: port 3(veth0) entered disabled state [ 74.343957][ T1659] bridge0: port 3(veth0) entered blocking state [ 74.350641][ T1659] bridge0: port 3(veth0) entered disabled state [ 74.360781][ T1659] device veth0 entered promiscuous mode [ 74.366885][ T1659] bridge0: port 3(veth0) entered blocking state [ 74.373182][ T1659] bridge0: port 3(veth0) entered forwarding state [ 74.382521][ T1659] device veth0 left promiscuous mode [ 74.388321][ T1659] bridge0: port 3(veth0) entered disabled state [ 75.476038][ T23] audit: type=1400 audit(1747271486.850:147): avc: denied { read } for pid=1687 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.703392][ T1701] bridge0: port 3(veth0) entered blocking state [ 75.726013][ T1701] bridge0: port 3(veth0) entered disabled state [ 75.753329][ T1701] device veth0 entered promiscuous mode [ 75.769215][ T1701] bridge0: port 3(veth0) entered blocking state [ 75.775716][ T1701] bridge0: port 3(veth0) entered forwarding state [ 75.792536][ T1708] device veth0 left promiscuous mode [ 75.814967][ T1708] bridge0: port 3(veth0) entered disabled state [ 77.847042][ T1768] bridge0: port 3(veth0) entered blocking state [ 77.953282][ T1768] bridge0: port 3(veth0) entered disabled state [ 77.988939][ T1768] device veth0 entered promiscuous mode [ 78.022243][ T1768] bridge0: port 3(veth0) entered blocking state [ 78.028653][ T1768] bridge0: port 3(veth0) entered forwarding state [ 78.115873][ T1777] device veth0 left promiscuous mode [ 78.121321][ T1777] bridge0: port 3(veth0) entered disabled state [ 78.854251][ T1799] device wg2 entered promiscuous mode [ 81.649692][ T1873] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.808491][ T1886] bridge0: port 3(veth0) entered blocking state [ 81.821244][ T1886] bridge0: port 3(veth0) entered disabled state [ 81.835904][ T1886] device veth0 entered promiscuous mode [ 81.851857][ T1886] bridge0: port 3(veth0) entered blocking state [ 81.858408][ T1886] bridge0: port 3(veth0) entered forwarding state [ 81.867778][ T1889] device veth0 left promiscuous mode [ 81.880476][ T1889] bridge0: port 3(veth0) entered disabled state [ 82.734309][ T1917] bridge0: port 3(veth0) entered blocking state [ 82.901077][ T1917] bridge0: port 3(veth0) entered disabled state [ 82.923552][ T1917] device veth0 entered promiscuous mode [ 82.935836][ T1917] bridge0: port 3(veth0) entered blocking state [ 82.942254][ T1917] bridge0: port 3(veth0) entered forwarding state [ 82.981522][ T1918] device veth0 left promiscuous mode [ 82.986945][ T1918] bridge0: port 3(veth0) entered disabled state [ 83.020947][ T1920] bridge0: port 3(veth0) entered blocking state [ 83.032848][ T1920] bridge0: port 3(veth0) entered disabled state [ 83.081051][ T1920] device veth0 entered promiscuous mode [ 83.087544][ T1920] bridge0: port 3(veth0) entered blocking state [ 83.094226][ T1920] bridge0: port 3(veth0) entered forwarding state [ 83.103539][ T1926] device veth0 left promiscuous mode [ 83.109125][ T1926] bridge0: port 3(veth0) entered disabled state [ 83.283209][ T1933] bridge0: port 3(veth0) entered blocking state [ 83.299933][ T1933] bridge0: port 3(veth0) entered disabled state [ 83.327502][ T1933] device veth0 entered promiscuous mode [ 83.334540][ T1933] bridge0: port 3(veth0) entered blocking state [ 83.341273][ T1933] bridge0: port 3(veth0) entered forwarding state [ 83.468862][ T1941] device syzkaller0 entered promiscuous mode [ 83.737981][ T23] audit: type=1400 audit(1747271495.110:148): avc: denied { setattr } for pid=1927 comm="syz.1.516" path="/net/tun" dev="devtmpfs" ino=10367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 83.800968][ T1955] bridge0: port 3(veth0) entered blocking state [ 83.817385][ T1955] bridge0: port 3(veth0) entered disabled state [ 83.855039][ T1955] device veth0 entered promiscuous mode [ 83.900013][ T1955] bridge0: port 3(veth0) entered blocking state [ 83.906479][ T1955] bridge0: port 3(veth0) entered forwarding state [ 83.931036][ T1962] bridge0: port 3(veth0) entered blocking state [ 83.958510][ T1962] bridge0: port 3(veth0) entered disabled state [ 83.970992][ T1962] device veth0 entered promiscuous mode [ 83.980841][ T1964] : renamed from bond_slave_1 [ 84.013979][ T1959] device veth0 left promiscuous mode [ 84.019376][ T1959] bridge0: port 3(veth0) entered disabled state [ 84.051151][ T1965] device veth0 left promiscuous mode [ 84.109223][ T1965] bridge0: port 3(veth0) entered disabled state [ 86.131483][ T2013] bridge0: port 3(veth0) entered blocking state [ 86.138411][ T2013] bridge0: port 3(veth0) entered disabled state [ 86.154110][ T2013] device veth0 entered promiscuous mode [ 86.242049][ T2015] bridge0: port 3(veth0) entered blocking state [ 86.249511][ T2015] bridge0: port 3(veth0) entered disabled state [ 86.267940][ T2015] device veth0 entered promiscuous mode [ 86.280071][ T2015] bridge0: port 3(veth0) entered blocking state [ 86.287179][ T2015] bridge0: port 3(veth0) entered forwarding state [ 86.296622][ T2018] device veth0 left promiscuous mode [ 86.302269][ T2018] bridge0: port 3(veth0) entered disabled state [ 86.309110][ T2020] device veth0 left promiscuous mode [ 86.314853][ T2020] bridge0: port 3(veth0) entered disabled state [ 86.643633][ T2030] bridge0: port 3(veth0) entered blocking state [ 86.650838][ T2030] bridge0: port 3(veth0) entered disabled state [ 86.658123][ T2030] device veth0 entered promiscuous mode [ 86.665265][ T2030] bridge0: port 3(veth0) entered blocking state [ 86.671829][ T2030] bridge0: port 3(veth0) entered forwarding state [ 86.681126][ T2030] device veth0 left promiscuous mode [ 86.686781][ T2030] bridge0: port 3(veth0) entered disabled state [ 87.021152][ T2034] device sit0 entered promiscuous mode [ 89.581953][ T2057] device veth0 left promiscuous mode [ 89.588097][ T2057] bridge0: port 3(veth0) entered disabled state [ 89.825533][ T2064] bridge0: port 3(veth0) entered blocking state [ 89.891260][ T2064] bridge0: port 3(veth0) entered disabled state [ 89.898044][ T2064] device veth0 entered promiscuous mode [ 89.921675][ T2064] bridge0: port 3(veth0) entered blocking state [ 89.927969][ T2064] bridge0: port 3(veth0) entered forwarding state [ 89.959632][ T2067] device veth0 left promiscuous mode [ 89.965722][ T2067] bridge0: port 3(veth0) entered disabled state [ 90.426916][ T2089] bridge0: port 3(veth0) entered blocking state [ 90.468980][ T2089] bridge0: port 3(veth0) entered disabled state [ 90.502979][ T2089] device veth0 entered promiscuous mode [ 90.520049][ T2089] bridge0: port 3(veth0) entered blocking state [ 90.526442][ T2089] bridge0: port 3(veth0) entered forwarding state [ 90.544278][ T2093] device veth0 left promiscuous mode [ 90.550024][ T2093] bridge0: port 3(veth0) entered disabled state [ 90.640580][ T23] audit: type=1400 audit(1747271502.010:149): avc: denied { write } for pid=2098 comm="syz.2.572" name="ppp" dev="devtmpfs" ino=9793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 90.701270][ T2101] bridge0: port 3(veth0) entered blocking state [ 90.715135][ T2101] bridge0: port 3(veth0) entered disabled state [ 90.726710][ T2101] device veth0 entered promiscuous mode [ 90.732864][ T2101] bridge0: port 3(veth0) entered blocking state [ 90.739206][ T2101] bridge0: port 3(veth0) entered forwarding state [ 90.771011][ T2104] device veth0 left promiscuous mode [ 90.780363][ T2104] bridge0: port 3(veth0) entered disabled state [ 90.804064][ T2096] : renamed from bond_slave_1 [ 90.895749][ T2110] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.903910][ T2110] device bridge0 left promiscuous mode [ 91.526083][ T2127] device sit0 entered promiscuous mode [ 91.873549][ T2134] bridge0: port 3(veth0) entered blocking state [ 91.887934][ T2134] bridge0: port 3(veth0) entered disabled state [ 91.913464][ T2134] device veth0 entered promiscuous mode [ 91.920234][ T2134] bridge0: port 3(veth0) entered blocking state [ 91.926681][ T2134] bridge0: port 3(veth0) entered forwarding state [ 92.137379][ T2148] device veth0 left promiscuous mode [ 92.146486][ T2148] bridge0: port 3(veth0) entered disabled state [ 94.171694][ T23] audit: type=1400 audit(1747271505.550:150): avc: denied { create } for pid=2169 comm="syz.3.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.325517][ T2182] device sit0 entered promiscuous mode [ 94.821740][ T2188] bridge0: port 3(veth0) entered blocking state [ 94.828271][ T2188] bridge0: port 3(veth0) entered disabled state [ 94.920551][ T2188] device veth0 entered promiscuous mode [ 94.927909][ T2188] bridge0: port 3(veth0) entered blocking state [ 94.934331][ T2188] bridge0: port 3(veth0) entered forwarding state [ 95.094057][ T2191] device veth0 left promiscuous mode [ 95.099544][ T2191] bridge0: port 3(veth0) entered disabled state [ 95.460973][ T2207] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.468401][ T2207] device bridge0 left promiscuous mode [ 98.131488][ T2236] bridge0: port 3(veth0) entered blocking state [ 98.140177][ T2236] bridge0: port 3(veth0) entered disabled state [ 98.191742][ T2236] device veth0 entered promiscuous mode [ 98.273606][ T2236] bridge0: port 3(veth0) entered blocking state [ 98.280212][ T2236] bridge0: port 3(veth0) entered forwarding state [ 98.431743][ T2243] device veth0 left promiscuous mode [ 98.437655][ T2243] bridge0: port 3(veth0) entered disabled state [ 98.719498][ T2260] device sit0 entered promiscuous mode [ 99.353804][ T2286] bridge0: port 3(veth0) entered blocking state [ 99.431854][ T2286] bridge0: port 3(veth0) entered disabled state [ 99.477052][ T2286] device veth0 entered promiscuous mode [ 99.491848][ T2286] bridge0: port 3(veth0) entered blocking state [ 99.498319][ T2286] bridge0: port 3(veth0) entered forwarding state [ 100.012538][ T2291] device veth0 left promiscuous mode [ 100.018421][ T2291] bridge0: port 3(veth0) entered disabled state [ 100.162791][ T2308] bridge0: port 3(veth0) entered blocking state [ 100.172912][ T2308] bridge0: port 3(veth0) entered disabled state [ 100.302803][ T2308] device veth0 entered promiscuous mode [ 100.322346][ T2308] bridge0: port 3(veth0) entered blocking state [ 100.329514][ T2308] bridge0: port 3(veth0) entered forwarding state [ 100.449839][ T2317] device veth0 left promiscuous mode [ 100.483456][ T2317] bridge0: port 3(veth0) entered disabled state [ 101.253336][ T2340] bridge0: port 3(veth0) entered blocking state [ 101.280992][ T2340] bridge0: port 3(veth0) entered disabled state [ 101.314530][ T2340] device veth0 entered promiscuous mode [ 101.342095][ T2340] bridge0: port 3(veth0) entered blocking state [ 101.348511][ T2340] bridge0: port 3(veth0) entered forwarding state [ 101.364865][ T2345] device veth0 left promiscuous mode [ 101.381805][ T2345] bridge0: port 3(veth0) entered disabled state [ 101.454662][ T2354] bridge0: port 3(veth0) entered blocking state [ 101.468122][ T2354] bridge0: port 3(veth0) entered disabled state [ 101.481004][ T2354] device veth0 entered promiscuous mode [ 101.488315][ T2354] bridge0: port 3(veth0) entered blocking state [ 101.494876][ T2354] bridge0: port 3(veth0) entered forwarding state [ 101.505534][ T2361] device veth0 left promiscuous mode [ 101.511092][ T2361] bridge0: port 3(veth0) entered disabled state [ 102.390233][ T2393] bridge0: port 3(veth0) entered blocking state [ 102.397888][ T2393] bridge0: port 3(veth0) entered disabled state [ 102.414039][ T2393] device veth0 entered promiscuous mode [ 102.426228][ T2396] bridge0: port 3(veth0) entered blocking state [ 102.434284][ T2396] bridge0: port 3(veth0) entered disabled state [ 102.462726][ T2396] device veth0 entered promiscuous mode [ 102.475294][ T2400] device veth0 left promiscuous mode [ 102.481277][ T2400] bridge0: port 3(veth0) entered disabled state [ 102.489024][ T2399] device veth0 left promiscuous mode [ 102.495054][ T2399] bridge0: port 3(veth0) entered disabled state [ 102.975187][ T2426] bridge0: port 3(veth0) entered blocking state [ 102.982047][ T2426] bridge0: port 3(veth0) entered disabled state [ 102.992625][ T2426] device veth0 entered promiscuous mode [ 102.999528][ T2426] bridge0: port 3(veth0) entered blocking state [ 103.005997][ T2426] bridge0: port 3(veth0) entered forwarding state [ 103.025775][ T2422] device pim6reg1 entered promiscuous mode [ 103.038410][ T2428] device lo entered promiscuous mode [ 103.378550][ T2447] bridge0: port 3(veth0) entered blocking state [ 103.402604][ T2447] bridge0: port 3(veth0) entered disabled state [ 103.414166][ T2447] device veth0 entered promiscuous mode [ 103.474047][ T2451] device veth0 left promiscuous mode [ 103.480240][ T2451] bridge0: port 3(veth0) entered disabled state [ 103.527951][ T2457] bridge0: port 3(veth0) entered blocking state [ 103.567456][ T2457] bridge0: port 3(veth0) entered disabled state [ 103.629564][ T23] audit: type=1400 audit(1747271515.000:151): avc: denied { create } for pid=2452 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.720466][ T2457] device veth0 entered promiscuous mode [ 104.242491][ T2488] bridge0: port 3(veth0) entered blocking state [ 104.248876][ T2488] bridge0: port 3(veth0) entered disabled state [ 104.273374][ T2488] device veth0 entered promiscuous mode [ 104.283120][ T2488] bridge0: port 3(veth0) entered blocking state [ 104.290775][ T2488] bridge0: port 3(veth0) entered forwarding state [ 104.325911][ T2495] device veth0 left promiscuous mode [ 104.331916][ T2495] bridge0: port 3(veth0) entered disabled state [ 104.896656][ T2531] device veth0 left promiscuous mode [ 104.905429][ T23] audit: type=1400 audit(1747271516.280:152): avc: denied { create } for pid=2528 comm="syz.2.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 104.922526][ T2531] bridge0: port 3(veth0) entered disabled state [ 107.499865][ T2615] bridge0: port 3(veth0) entered blocking state [ 107.546956][ T2615] bridge0: port 3(veth0) entered disabled state [ 107.579595][ T2615] device veth0 entered promiscuous mode [ 107.624698][ T2615] bridge0: port 3(veth0) entered blocking state [ 107.631194][ T2615] bridge0: port 3(veth0) entered forwarding state [ 107.664104][ T2618] device veth0 left promiscuous mode [ 107.691084][ T2618] bridge0: port 3(veth0) entered disabled state [ 110.521491][ T2717] device veth1_to_bond entered promiscuous mode [ 110.680835][ T2726] device veth0 left promiscuous mode [ 110.690151][ T2726] bridge0: port 3(veth0) entered disabled state [ 110.729174][ T2722] bridge0: port 3(veth0) entered blocking state [ 110.781331][ T2722] bridge0: port 3(veth0) entered disabled state [ 110.856296][ T2722] device veth0 entered promiscuous mode [ 110.881945][ T2722] bridge0: port 3(veth0) entered blocking state [ 110.888703][ T2722] bridge0: port 3(veth0) entered forwarding state [ 112.362298][ T23] audit: type=1400 audit(1747271523.740:153): avc: denied { create } for pid=2762 comm="syz.3.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.561705][ T2766] ------------[ cut here ]------------ [ 112.567195][ T2766] General protection fault in user access. Non-canonical address? [ 112.567246][ T2766] WARNING: CPU: 1 PID: 2766 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0xa5/0xc0 [ 112.585245][ T2766] Modules linked in: [ 112.589330][ T2766] CPU: 1 PID: 2766 Comm: syz.3.794 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 112.591951][ T2775] bridge0: port 3(veth0) entered blocking state [ 112.599314][ T2766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 112.599334][ T2766] RIP: 0010:ex_handler_uaccess+0xa5/0xc0 [ 112.599350][ T2766] Code: 51 4c 5f 00 4c 89 23 b0 01 5b 41 5c 41 5e 41 5f 5d c3 e8 6e 51 31 00 c6 05 ca a8 fb 04 01 48 c7 c7 60 bc 86 84 e8 bb da f8 02 <0f> 0b eb 98 44 89 f1 80 e1 07 80 c1 03 38 c1 7c a9 4c 89 f7 e8 52 [ 112.599357][ T2766] RSP: 0018:ffff8881e09cf8c8 EFLAGS: 00010046 [ 112.599367][ T2766] RAX: 8104fd97d410f000 RBX: ffff8881e09cf9f8 RCX: 0000000000080000 [ 112.599374][ T2766] RDX: ffffc9000314d000 RSI: 000000000002555d RDI: 000000000002555e [ 112.599393][ T2766] RBP: ffff8881e09cf8e8 R08: dffffc0000000000 R09: fffffbfff0cacc08 [ 112.660921][ T2775] bridge0: port 3(veth0) entered disabled state [ 112.664165][ T2766] R10: fffffbfff0cacc08 R11: 1ffffffff0cacc00 R12: ffff8881e09cf9f8 [ 112.664173][ T2766] R13: ffffffff846077b4 R14: ffffffff846077b4 R15: 000000000000000d [ 112.664182][ T2766] FS: 00007fcbed73b6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 112.664189][ T2766] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 112.664195][ T2766] CR2: 00007f3b794b4d58 CR3: 00000001dfdf6000 CR4: 00000000003406a0 [ 112.664206][ T2766] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 112.664211][ T2766] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 112.664215][ T2766] Call Trace: [ 112.664235][ T2766] ? __start___ex_table+0x57bc/0x5e68 [ 112.664248][ T2766] fixup_exception+0x92/0xd0 [ 112.664260][ T2766] do_general_protection+0x1b1/0x3c0 [ 112.664270][ T2766] ? do_trap+0x2f0/0x2f0 [ 112.664282][ T2766] ? __kasan_check_write+0x14/0x20 [ 112.664290][ T2766] ? mutex_unlock+0x1c/0x40 [ 112.664300][ T2766] general_protection+0x28/0x30 [ 112.664311][ T2766] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0 [ 112.664329][ T2766] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 01 ca c3 66 66 [ 112.664335][ T2766] RSP: 0018:ffff8881e09cfaa8 EFLAGS: 00050002 [ 112.664345][ T2766] RAX: ffffffff81926814 RBX: ffff8881e0e50a58 RCX: 0000000000000002 [ 112.664351][ T2766] RDX: 0000000000000002 RSI: fc1a000000000000 RDI: ffff8881e09cfb68 [ 112.664357][ T2766] RBP: ffff8881e09cfb00 R08: ffff8881e0e50000 R09: 0000000000000002 [ 112.664363][ T2766] R10: 0000000000000001 R11: 0000000000000002 R12: 0000000000000002 [ 112.664370][ T2766] R13: ffff8881e09cfb68 R14: ffff8881e0e50000 R15: 1ffff1103c1ca14b [ 112.664382][ T2766] ? __check_object_size+0x84/0x3c0 [ 112.664396][ T2766] ? __probe_kernel_read+0xd6/0x190 [ 112.664408][ T2766] bpf_probe_read+0x45/0x90 [ 112.664419][ T2766] bpf_prog_661afe553e78869a+0x755/0x1000 [ 112.664430][ T2766] bpf_trace_run3+0xd0/0x260 [ 112.664440][ T2766] ? bpf_trace_run2+0x230/0x230 [ 112.664449][ T2766] ? pcpu_free_area+0x97a/0xb40 [ 112.664463][ T2766] __bpf_trace_percpu_free_percpu+0x2d/0x40 [ 112.664473][ T2766] ? __bpf_trace_percpu_alloc_percpu+0x60/0x60 [ 112.664482][ T2766] free_percpu+0x523/0x7f0 [ 112.664493][ T2766] array_map_free+0xd3/0x180 [ 112.664505][ T2766] map_create+0x433/0x980 [ 112.664517][ T2766] __se_sys_bpf+0x2dc/0x570 [ 112.664527][ T2766] ? __x64_sys_bpf+0x90/0x90 [ 112.664541][ T2766] ? fpu__clear+0x3b0/0x3b0 [ 112.664552][ T2766] ? __kasan_check_read+0x11/0x20 [ 112.664564][ T2766] __x64_sys_bpf+0x7b/0x90 [ 112.664574][ T2766] do_syscall_64+0xcf/0x170 [ 112.664585][ T2766] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.664592][ T2766] RIP: 0033:0x7fcbef0f3969 [ 112.664602][ T2766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.664607][ T2766] RSP: 002b:00007fcbed73b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.664617][ T2766] RAX: ffffffffffffffda RBX: 00007fcbef31b080 RCX: 00007fcbef0f3969 [ 112.664624][ T2766] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 112.664629][ T2766] RBP: 00007fcbef175ab1 R08: 0000000000000000 R09: 0000000000000000 [ 112.664634][ T2766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.664640][ T2766] R13: 0000000000000000 R14: 00007fcbef31b080 R15: 00007ffdfd470328 [ 112.664650][ T2766] ---[ end trace f88a7515e183ee44 ]--- [ 113.063003][ T2775] device veth0 entered promiscuous mode [ 113.072162][ T2778] device veth0 left promiscuous mode [ 113.113616][ T2778] bridge0: port 3(veth0) entered disabled state [ 113.383668][ T2793] device veth0 left promiscuous mode [ 113.389069][ T2793] bridge0: port 3(veth0) entered disabled state [ 113.933927][ T2797] device sit0 left promiscuous mode [ 114.138176][ T2813] device sit0 entered promiscuous mode [ 114.468034][ T2808] device syzkaller0 entered promiscuous mode [ 114.553296][ T2819] device wg2 entered promiscuous mode [ 114.685196][ T2828] bridge0: port 3(veth0) entered blocking state [ 114.710806][ T2828] bridge0: port 3(veth0) entered disabled state [ 114.799360][ T2828] device veth0 entered promiscuous mode [ 114.822665][ T2831] bridge0: port 3(veth0) entered blocking state [ 114.832849][ T2831] bridge0: port 3(veth0) entered disabled state [ 114.877577][ T2831] device veth0 entered promiscuous mode [ 114.909795][ T2834] device veth0 left promiscuous mode [ 114.917354][ T2834] bridge0: port 3(veth0) entered disabled state [ 114.961656][ T2836] device veth0 left promiscuous mode [ 114.968552][ T2836] bridge0: port 3(veth0) entered disabled state [ 115.047553][ T2845] bridge0: port 3(veth0) entered blocking state [ 115.076133][ T2845] bridge0: port 3(veth0) entered disabled state [ 115.086915][ T2845] device veth0 entered promiscuous mode [ 115.144323][ T2851] device veth0 left promiscuous mode [ 115.149726][ T2851] bridge0: port 3(veth0) entered disabled state [ 115.259982][ T2848] device sit0 left promiscuous mode [ 115.529731][ T2861] device sit0 entered promiscuous mode [ 115.541702][ T2856] device bridge_slave_1 left promiscuous mode [ 115.557232][ T2856] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.566785][ T2856] device bridge_slave_0 left promiscuous mode [ 115.574530][ T2856] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.646991][ T2863] device sit0 entered promiscuous mode [ 115.659616][ T2865] device pim6reg1 entered promiscuous mode [ 115.684349][ T2858] device syzkaller0 entered promiscuous mode [ 116.034321][ T2882] bridge0: port 3(veth0) entered blocking state [ 116.046595][ T2882] bridge0: port 3(veth0) entered disabled state [ 116.060281][ T2882] device veth0 entered promiscuous mode [ 116.070540][ T2882] device veth0 left promiscuous mode [ 116.112008][ T2882] bridge0: port 3(veth0) entered disabled state [ 116.237994][ T2889] bridge0: port 3(veth0) entered blocking state [ 116.286402][ T2889] bridge0: port 3(veth0) entered disabled state [ 116.311434][ T2889] device veth0 entered promiscuous mode [ 116.326095][ T2889] bridge0: port 3(veth0) entered blocking state [ 116.332637][ T2889] bridge0: port 3(veth0) entered forwarding state [ 116.343914][ T2896] bridge0: port 3(veth0) entered blocking state [ 116.354255][ T2896] bridge0: port 3(veth0) entered disabled state [ 116.368395][ T2896] device veth0 entered promiscuous mode [ 116.375675][ T2896] bridge0: port 3(veth0) entered blocking state [ 116.382831][ T2896] bridge0: port 3(veth0) entered forwarding state [ 116.391670][ T2893] device veth0 left promiscuous mode [ 116.397619][ T2893] bridge0: port 3(veth0) entered disabled state [ 116.408133][ T2898] device veth0 left promiscuous mode [ 116.421444][ T2898] bridge0: port 3(veth0) entered disabled state [ 117.343029][ T2925] bridge0: port 3(veth0) entered blocking state [ 117.349435][ T2925] bridge0: port 3(veth0) entered disabled state [ 117.401280][ T2925] device veth0 entered promiscuous mode [ 117.435406][ T2925] bridge0: port 3(veth0) entered blocking state [ 117.442210][ T2925] bridge0: port 3(veth0) entered forwarding state [ 117.456887][ T2933] device veth0 left promiscuous mode [ 117.489343][ T2933] bridge0: port 3(veth0) entered disabled state [ 117.679377][ T2938] bridge0: port 3(veth0) entered blocking state [ 117.702213][ T2938] bridge0: port 3(veth0) entered disabled state [ 117.713705][ T2938] device veth0 entered promiscuous mode [ 117.720186][ T2938] bridge0: port 3(veth0) entered blocking state [ 117.726726][ T2938] bridge0: port 3(veth0) entered forwarding state [ 117.735848][ T2939] device veth0 left promiscuous mode [ 117.746543][ T2939] bridge0: port 3(veth0) entered disabled state [ 117.811979][ T2941] bridge0: port 3(veth0) entered blocking state [ 117.818699][ T2941] bridge0: port 3(veth0) entered disabled state [ 117.839323][ T2941] device veth0 entered promiscuous mode [ 117.847655][ T2941] bridge0: port 3(veth0) entered blocking state [ 117.854197][ T2941] bridge0: port 3(veth0) entered forwarding state [ 117.863901][ T2950] device veth0 left promiscuous mode [ 117.881228][ T2950] bridge0: port 3(veth0) entered disabled state [ 118.744730][ T2974] bridge0: port 3(veth0) entered blocking state [ 118.787451][ T2974] bridge0: port 3(veth0) entered disabled state [ 118.884615][ T2974] device veth0 entered promiscuous mode [ 118.891821][ T2974] bridge0: port 3(veth0) entered blocking state [ 118.898792][ T2974] bridge0: port 3(veth0) entered forwarding state [ 118.952976][ T2973] bridge0: port 3(veth0) entered blocking state [ 118.982884][ T2973] bridge0: port 3(veth0) entered disabled state [ 118.996347][ T2973] device veth0 entered promiscuous mode [ 119.003590][ T2973] bridge0: port 3(veth0) entered blocking state [ 119.010150][ T2973] bridge0: port 3(veth0) entered forwarding state [ 119.018444][ T2977] device veth0 left promiscuous mode [ 119.023958][ T2977] bridge0: port 3(veth0) entered disabled state [ 119.031190][ T2978] device veth0 left promiscuous mode [ 119.036901][ T2978] bridge0: port 3(veth0) entered disabled state [ 120.457360][ T3016] device wg2 entered promiscuous mode [ 120.482975][ T23] audit: type=1400 audit(1747271531.860:154): avc: denied { remove_name } for pid=145 comm="syslogd" name="messages" dev="tmpfs" ino=10024 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 120.572333][ T23] audit: type=1400 audit(1747271531.860:155): avc: denied { rename } for pid=145 comm="syslogd" name="messages" dev="tmpfs" ino=10024 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 120.631628][ T3026] bridge0: port 3(veth0) entered blocking state [ 120.637985][ T3026] bridge0: port 3(veth0) entered disabled state [ 120.674960][ T3026] device veth0 entered promiscuous mode [ 120.683834][ T3026] bridge0: port 3(veth0) entered blocking state [ 120.690216][ T3026] bridge0: port 3(veth0) entered forwarding state [ 120.697907][ T23] audit: type=1400 audit(1747271531.860:156): avc: denied { create } for pid=145 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 120.728652][ T3035] device veth0 left promiscuous mode [ 120.737911][ T3035] bridge0: port 3(veth0) entered disabled state [ 120.798221][ T3021] device veth1_to_bond entered promiscuous mode [ 121.309902][ T3058] device wg2 left promiscuous mode [ 121.357589][ T3061] device wg2 entered promiscuous mode [ 121.373511][ T3058] device wg2 entered promiscuous mode [ 121.406671][ T23] audit: type=1400 audit(1747271532.780:157): avc: denied { relabelfrom } for pid=3053 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 121.510691][ T23] audit: type=1400 audit(1747271532.780:158): avc: denied { relabelto } for pid=3053 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 121.627352][ T3054] device syzkaller0 entered promiscuous mode [ 121.639655][ T3069] bridge0: port 3(veth0) entered blocking state [ 121.646843][ T3069] bridge0: port 3(veth0) entered disabled state [ 121.666014][ T3069] device veth0 entered promiscuous mode [ 121.700257][ T3073] device veth0 left promiscuous mode [ 121.707813][ T3073] bridge0: port 3(veth0) entered disabled state [ 121.716636][ T3072] bridge0: port 3(veth0) entered blocking state [ 121.734395][ T3072] bridge0: port 3(veth0) entered disabled state [ 121.774466][ T3072] device veth0 entered promiscuous mode [ 121.783818][ T3072] bridge0: port 3(veth0) entered blocking state [ 121.790767][ T3072] bridge0: port 3(veth0) entered forwarding state [ 121.801767][ T3074] device veth0 left promiscuous mode [ 121.807408][ T3074] bridge0: port 3(veth0) entered disabled state [ 122.525573][ T3101] bridge0: port 3(veth0) entered blocking state [ 122.574669][ T3101] bridge0: port 3(veth0) entered disabled state [ 122.600326][ T3101] device veth0 entered promiscuous mode [ 122.626275][ T3101] bridge0: port 3(veth0) entered blocking state [ 122.632764][ T3101] bridge0: port 3(veth0) entered forwarding state [ 122.640610][ T3108] device veth0 left promiscuous mode [ 122.662052][ T3108] bridge0: port 3(veth0) entered disabled state [ 122.827618][ T3113] device syzkaller0 entered promiscuous mode [ 123.627076][ T3147] bridge0: port 3(veth0) entered blocking state [ 123.640281][ T3147] bridge0: port 3(veth0) entered disabled state [ 123.652570][ T3147] device veth0 entered promiscuous mode [ 123.770942][ T3147] device veth0 left promiscuous mode [ 123.776773][ T3147] bridge0: port 3(veth0) entered disabled state [ 123.841477][ T23] audit: type=1400 audit(1747271535.220:159): avc: denied { ioctl } for pid=3148 comm="syz.2.918" path="socket:[32079]" dev="sockfs" ino=32079 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 124.120444][ T3158] bridge0: port 3(veth0) entered blocking state [ 124.127109][ T3158] bridge0: port 3(veth0) entered disabled state [ 124.139310][ T3158] device veth0 entered promiscuous mode [ 124.149478][ T3158] device veth0 left promiscuous mode [ 124.155666][ T3158] bridge0: port 3(veth0) entered disabled state [ 124.410086][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.350115][ T23] audit: type=1400 audit(1747271536.720:160): avc: denied { create } for pid=3199 comm="syz.1.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 126.166291][ T3219] GPL: port 1(erspan0) entered blocking state [ 126.261699][ T3219] GPL: port 1(erspan0) entered disabled state [ 126.320368][ T3219] device erspan0 entered promiscuous mode [ 126.472520][ T3221] GPL: port 1(erspan0) entered blocking state [ 126.478752][ T3221] GPL: port 1(erspan0) entered forwarding state [ 127.047993][ T23] audit: type=1400 audit(1747271538.420:161): avc: denied { create } for pid=3229 comm="syz.3.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 128.030226][ T3267] device syzkaller0 entered promiscuous mode [ 128.077168][ T3268] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.084548][ T3268] device bridge0 left promiscuous mode [ 128.832800][ T3284] device wg2 left promiscuous mode [ 128.892054][ T3286] device wg2 entered promiscuous mode [ 128.982498][ T3289] bridge0: port 3(veth0) entered blocking state [ 128.989169][ T3289] bridge0: port 3(veth0) entered disabled state [ 129.057066][ T3289] device veth0 entered promiscuous mode [ 129.089998][ T3293] device veth0 left promiscuous mode [ 129.111932][ T3293] bridge0: port 3(veth0) entered disabled state [ 129.196952][ T3301] bridge0: port 3(veth0) entered blocking state [ 129.210873][ T3301] bridge0: port 3(veth0) entered disabled state [ 129.238732][ T3301] device veth0 entered promiscuous mode [ 129.247982][ T3301] device veth0 left promiscuous mode [ 129.254461][ T3301] bridge0: port 3(veth0) entered disabled state [ 129.625408][ T3311] device sit0 left promiscuous mode [ 132.659498][ T3375] device sit0 left promiscuous mode [ 133.402810][ T3384] device syzkaller0 entered promiscuous mode [ 133.907403][ T3382] syz.0.991[3382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.919786][ T3382] syz.0.991[3382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.093762][ T3265] syz.4.949 (3265) used greatest stack depth: 22528 bytes left [ 138.512808][ T3441] bridge0: port 3(veth0) entered blocking state [ 138.634310][ T3441] bridge0: port 3(veth0) entered disabled state [ 138.766653][ T3441] device veth0 entered promiscuous mode [ 138.933332][ T3446] device veth0 left promiscuous mode [ 138.957066][ T3446] bridge0: port 3(veth0) entered disabled state [ 139.494829][ T3454] device wg2 left promiscuous mode [ 139.846893][ T3456] device wg2 entered promiscuous mode [ 142.141011][ T3507] device wg2 entered promiscuous mode [ 142.677493][ T3531] device bridge_slave_1 left promiscuous mode [ 142.688934][ T3531] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.782382][ T3531] device bridge_slave_0 left promiscuous mode [ 142.791294][ T3531] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.611466][ T3567] device syzkaller0 entered promiscuous mode [ 144.370628][ T23] audit: type=1400 audit(1747271555.740:162): avc: denied { create } for pid=3571 comm="syz.3.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 144.925050][ T3586] bridge0: port 3(veth0) entered blocking state [ 145.064471][ T3586] bridge0: port 3(veth0) entered disabled state [ 145.185553][ T3586] device veth0 entered promiscuous mode [ 145.388631][ T3587] device veth0 left promiscuous mode [ 145.396465][ T3587] bridge0: port 3(veth0) entered disabled state [ 146.114296][ T23] audit: type=1400 audit(1747271557.490:163): avc: denied { create } for pid=3593 comm="syz.3.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 148.864549][ T3623] device syzkaller0 entered promiscuous mode [ 149.632191][ T3633] bridge0: port 3(veth0) entered blocking state [ 149.642215][ T3633] bridge0: port 3(veth0) entered disabled state [ 149.834759][ T3633] device veth0 entered promiscuous mode [ 149.865543][ T3636] device veth0 left promiscuous mode [ 149.920876][ T3636] bridge0: port 3(veth0) entered disabled state [ 150.518275][ T3639] bridge0: port 3(veth0) entered blocking state [ 150.596245][ T3639] bridge0: port 3(veth0) entered disabled state [ 150.723099][ T3639] device veth0 entered promiscuous mode [ 150.797559][ T3639] bridge0: port 3(veth0) entered blocking state [ 150.804273][ T3639] bridge0: port 3(veth0) entered forwarding state [ 151.159015][ T3645] device veth0 left promiscuous mode [ 151.351239][ T3645] bridge0: port 3(veth0) entered disabled state [ 154.038099][ T3696] bridge0: port 3(veth0) entered blocking state [ 154.195328][ T3696] bridge0: port 3(veth0) entered disabled state [ 154.358192][ T3696] device veth0 entered promiscuous mode [ 154.381372][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.451614][ T3698] device veth0 left promiscuous mode [ 154.457094][ T3698] bridge0: port 3(veth0) entered disabled state [ 154.660394][ T3707] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.789852][ T3707] device bridge0 left promiscuous mode [ 155.158625][ T3707] device bridge_slave_1 left promiscuous mode [ 155.202303][ T3707] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.228495][ T3707] device bridge_slave_0 left promiscuous mode [ 155.278867][ T3707] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.463283][ T3727] bridge0: port 3(veth0) entered blocking state [ 155.469764][ T3727] bridge0: port 3(veth0) entered disabled state [ 155.489958][ T3727] device veth0 entered promiscuous mode [ 155.689388][ T3732] device veth0 left promiscuous mode [ 155.700931][ T3732] bridge0: port 3(veth0) entered disabled state [ 159.303518][ T3819] bridge0: port 3(veth0) entered blocking state [ 159.310228][ T3819] bridge0: port 3(veth0) entered disabled state [ 159.403852][ T3819] device veth0 entered promiscuous mode [ 159.449583][ T3824] device veth0 left promiscuous mode [ 159.492018][ T3824] bridge0: port 3(veth0) entered disabled state [ 159.608789][ T3831] bridge0: port 3(veth0) entered blocking state [ 159.663645][ T3831] bridge0: port 3(veth0) entered disabled state [ 159.798023][ T3831] device veth0 entered promiscuous mode [ 159.851432][ T3836] device veth0 left promiscuous mode [ 159.909679][ T3836] bridge0: port 3(veth0) entered disabled state [ 163.905335][ T3930] bridge0: port 3(veth0) entered blocking state [ 163.950843][ T3930] bridge0: port 3(veth0) entered disabled state [ 163.984121][ T3930] device veth0 entered promiscuous mode [ 164.017706][ T3932] device veth0 left promiscuous mode [ 164.064432][ T3932] bridge0: port 3(veth0) entered disabled state [ 165.039322][ T3962] bridge0: port 3(veth0) entered blocking state [ 165.085475][ T3962] bridge0: port 3(veth0) entered disabled state [ 165.150218][ T3962] device veth0 entered promiscuous mode [ 165.241573][ T3966] device veth0 left promiscuous mode [ 165.344659][ T3966] bridge0: port 3(veth0) entered disabled state [ 165.819307][ T3976] GPL: port 1(erspan0) entered blocking state [ 165.873280][ T3976] GPL: port 1(erspan0) entered disabled state [ 165.938163][ T3976] device erspan0 entered promiscuous mode [ 166.191097][ T3977] GPL: port 1(erspan0) entered blocking state [ 166.197315][ T3977] GPL: port 1(erspan0) entered forwarding state [ 172.835996][ T4185] device veth1_to_bond entered promiscuous mode [ 176.142135][ T4298] €Â0: renamed from bond_slave_1 [ 177.048355][ T4300] device syzkaller0 entered promiscuous mode [ 177.690004][ T4335] device pim6reg1 entered promiscuous mode [ 178.017997][ T4351] device sit0 left promiscuous mode [ 178.230077][ T4358] device sit0 entered promiscuous mode [ 179.512792][ T4388] device sit0 left promiscuous mode [ 179.686838][ T4397] device sit0 entered promiscuous mode [ 181.060525][ T4446] €Â0: renamed from bond_slave_1 [ 184.126847][ T4524] device lo entered promiscuous mode [ 184.181037][ T4524] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 188.551192][ T4578] device lo entered promiscuous mode [ 191.033485][ T4640] device syzkaller0 entered promiscuous mode [ 191.444855][ T4639] @ÿ: renamed from bond_slave_0 [ 193.868241][ T4700] device syzkaller0 entered promiscuous mode [ 193.876476][ T4695] device syzkaller0 entered promiscuous mode [ 193.899303][ T4702] syz.1.1409[4702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.899349][ T4702] syz.1.1409[4702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.047119][ T4785] device wg2 left promiscuous mode [ 197.510658][ T4789] device wg2 entered promiscuous mode [ 198.804327][ T4833] device wg2 left promiscuous mode [ 198.978861][ T4833] device wg2 entered promiscuous mode [ 199.115170][ T4830] device sit0 left promiscuous mode [ 199.309568][ T4848] device sit0 entered promiscuous mode [ 199.902603][ T4871] device sit0 left promiscuous mode [ 200.111446][ T4890] device sit0 entered promiscuous mode [ 200.562512][ T4905] device wg2 left promiscuous mode [ 200.598739][ T4905] device wg2 entered promiscuous mode [ 201.308342][ T4910] device sit0 left promiscuous mode [ 201.573566][ T4930] device sit0 entered promiscuous mode [ 201.595019][ T4931] device veth1_to_bond entered promiscuous mode [ 206.869974][ T5114] device wg2 left promiscuous mode [ 206.941187][ T5114] device wg2 entered promiscuous mode [ 208.085438][ T5158] device sit0 entered promiscuous mode [ 210.587230][ T5217] device wg2 left promiscuous mode [ 210.637792][ T5230] device wg2 entered promiscuous mode [ 211.475766][ T5241] device veth1_to_bond entered promiscuous mode [ 211.720437][ T5247] device pim6reg1 entered promiscuous mode [ 214.288149][ T5309] device syzkaller0 entered promiscuous mode [ 215.778811][ T5358] device syzkaller0 entered promiscuous mode [ 217.004316][ T5403] device sit0 left promiscuous mode [ 217.242632][ T5410] device sit0 entered promiscuous mode [ 217.481142][ T5413] device sit0 entered promiscuous mode [ 217.907686][ T5436] device wg2 left promiscuous mode [ 217.937560][ T5436] device wg2 entered promiscuous mode [ 218.523919][ T5454] device lo left promiscuous mode [ 219.061596][ T5470] device sit0 left promiscuous mode [ 219.307926][ T5482] device sit0 entered promiscuous mode [ 219.847938][ T5489] device sit0 left promiscuous mode [ 220.232615][ T5501] device sit0 entered promiscuous mode [ 220.304612][ T5509] device wg2 left promiscuous mode [ 220.353512][ T5513] device wg2 entered promiscuous mode [ 220.376271][ T5510] device wg2 left promiscuous mode [ 220.540261][ T5514] device wg2 entered promiscuous mode [ 222.463284][ T5560] device wg2 left promiscuous mode [ 222.521016][ T5563] device wg2 entered promiscuous mode [ 222.824557][ T5578] device syzkaller0 entered promiscuous mode [ 225.882968][ T5670] device lo entered promiscuous mode [ 227.057297][ T5699] device wg2 left promiscuous mode [ 227.087310][ T5704] device wg2 entered promiscuous mode [ 228.676683][ T5744] device wg2 left promiscuous mode [ 228.738155][ T5744] device wg2 entered promiscuous mode [ 229.286994][ T5776] device syzkaller0 entered promiscuous mode [ 230.062874][ T5804] device wg2 left promiscuous mode [ 230.160148][ T5809] device wg2 entered promiscuous mode [ 232.104330][ T5912] device lo left promiscuous mode [ 232.119393][ T5912] device lo entered promiscuous mode [ 232.138471][ T5912] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 236.678108][ T6071] device lo left promiscuous mode [ 236.738715][ T6073] device lo entered promiscuous mode [ 236.752239][ T6073] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 238.110683][ C0] ================================================================== [ 238.119315][ C0] BUG: KASAN: use-after-free in __run_timers+0x759/0xb60 [ 238.126552][ C0] Write of size 8 at addr ffff8881e0e7b1c8 by task syz.1.1860/6095 [ 238.134605][ C0] [ 238.137116][ C0] CPU: 0 PID: 6095 Comm: syz.1.1860 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 238.148562][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 238.159176][ C0] Call Trace: [ 238.162457][ C0] [ 238.165359][ C0] __dump_stack+0x1e/0x20 [ 238.169777][ C0] dump_stack+0x15b/0x1b8 [ 238.174197][ C0] ? vprintk_default+0x28/0x30 [ 238.179153][ C0] ? show_regs_print_info+0x18/0x18 [ 238.184378][ C0] ? printk+0xcc/0x110 [ 238.188457][ C0] ? __run_timers+0x759/0xb60 [ 238.193149][ C0] print_address_description+0x8d/0x4c0 [ 238.198697][ C0] ? check_preemption_disabled+0x9b/0x300 [ 238.204419][ C0] ? __run_timers+0x759/0xb60 [ 238.209088][ C0] __kasan_report+0xef/0x120 [ 238.213768][ C0] ? __run_timers+0x759/0xb60 [ 238.218658][ C0] kasan_report+0x30/0x60 [ 238.223024][ C0] __asan_report_store8_noabort+0x17/0x20 [ 238.229005][ C0] __run_timers+0x759/0xb60 [ 238.233517][ C0] ? enqueue_timer+0x2c0/0x2c0 [ 238.238548][ C0] ? check_preemption_disabled+0x9b/0x300 [ 238.244557][ C0] ? debug_smp_processor_id+0x20/0x20 [ 238.250041][ C0] run_timer_softirq+0x6a/0xf0 [ 238.254983][ C0] __do_softirq+0x236/0x660 [ 238.259620][ C0] irq_exit+0x197/0x1c0 [ 238.264059][ C0] smp_apic_timer_interrupt+0x11d/0x490 [ 238.270013][ C0] apic_timer_interrupt+0xf/0x20 [ 238.274943][ C0] [ 238.277898][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x17/0x50 [ 238.284134][ C0] Code: 96 d1 85 e8 6b f2 2d 00 5d c3 00 00 90 90 00 00 90 90 00 55 48 89 e5 48 8b 45 08 65 48 8b 0d 90 0e a3 7e 65 8b 15 95 0e a3 7e c2 00 01 1f 00 74 02 5d c3 8b 91 00 0a 00 00 83 fa 02 75 f3 48 [ 238.304921][ C0] RSP: 0018:ffff8881e830f5d0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 238.313839][ C0] RAX: ffffffff81846e59 RBX: 00007f2882b6e000 RCX: ffff8881cb4daf40 [ 238.321829][ C0] RDX: 0000000080000001 RSI: 000000000023ffff RDI: 00000000001d6650 [ 238.330037][ C0] RBP: ffff8881e830f5d0 R08: dffffc0000000000 R09: ffffed103969b5e9 [ 238.338341][ C0] R10: ffffed103969b5e9 R11: 1ffff1103969b5e8 R12: 00000000001d6650 [ 238.347412][ C0] R13: 000000000023ffff R14: 80000001d6650007 R15: ffff8881df76e378 [ 238.355629][ C0] ? vm_normal_page+0x99/0x1f0 [ 238.360475][ C0] vm_normal_page+0x99/0x1f0 [ 238.365064][ C0] unmap_page_range+0xaf6/0x1b20 [ 238.370003][ C0] ? lru_add_page_tail+0x6e0/0x6e0 [ 238.375190][ C0] unmap_vmas+0x245/0x340 [ 238.379544][ C0] ? unmap_page_range+0x1b20/0x1b20 [ 238.384834][ C0] ? tlb_gather_mmu+0x270/0x330 [ 238.389675][ C0] exit_mmap+0x2bb/0x520 [ 238.394170][ C0] ? vm_brk+0x30/0x30 [ 238.398160][ C0] ? __kasan_check_write+0x14/0x20 [ 238.403268][ C0] ? mutex_unlock+0x1c/0x40 [ 238.407764][ C0] ? uprobe_clear_state+0x2c7/0x320 [ 238.412960][ C0] ? __kasan_check_read+0x11/0x20 [ 238.418044][ C0] __mmput+0x92/0x2e0 [ 238.422028][ C0] mmput+0x47/0x60 [ 238.425928][ C0] do_exit+0x99f/0x2660 [ 238.430162][ C0] ? futex_wait+0x45b/0x700 [ 238.434741][ C0] ? put_task_struct+0x90/0x90 [ 238.439568][ C0] ? do_futex+0x1290/0x1290 [ 238.444097][ C0] ? cgroup_freezing+0x86/0xb0 [ 238.449147][ C0] do_group_exit+0x13e/0x300 [ 238.453754][ C0] ? __kasan_check_write+0x14/0x20 [ 238.459292][ C0] get_signal+0xdee/0x13d0 [ 238.463793][ C0] do_signal+0xad/0xda0 [ 238.468041][ C0] ? putname+0xfe/0x150 [ 238.472295][ C0] ? futex_exit_release+0x1d0/0x1d0 [ 238.477486][ C0] ? check_preemption_disabled+0x118/0x300 [ 238.483288][ C0] ? signal_fault+0x1d0/0x1d0 [ 238.487962][ C0] ? __x64_sys_futex+0x100/0x100 [ 238.492894][ C0] ? debug_smp_processor_id+0x20/0x20 [ 238.498254][ C0] ? switch_fpu_return+0x197/0x3b0 [ 238.503439][ C0] exit_to_usermode_loop+0xc4/0x1b0 [ 238.508719][ C0] prepare_exit_to_usermode+0x18e/0x1f0 [ 238.514253][ C0] do_syscall_64+0x13e/0x170 [ 238.518837][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 238.524809][ C0] RIP: 0033:0x7f288416e969 [ 238.529216][ C0] Code: Bad RIP value. [ 238.533270][ C0] RSP: 002b:00007f28827d70e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 238.541777][ C0] RAX: fffffffffffffe00 RBX: 00007f2884395fa8 RCX: 00007f288416e969 [ 238.549823][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f2884395fa8 [ 238.557906][ C0] RBP: 00007f2884395fa0 R08: 0000000000000000 R09: 0000000000000000 [ 238.566070][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2884395fac [ 238.574480][ C0] R13: 0000000000000000 R14: 00007ffecae98620 R15: 00007ffecae98708 [ 238.582709][ C0] [ 238.585172][ C0] The buggy address belongs to the page: [ 238.591055][ C0] page:ffffea0007839ec0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 238.600246][ C0] flags: 0x8000000000000000() [ 238.605005][ C0] raw: 8000000000000000 ffffea0007839e88 ffffea00071c2e08 0000000000000000 [ 238.613875][ C0] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 238.622778][ C0] page dumped because: kasan: bad access detected [ 238.629181][ C0] page_owner tracks the page as freed [ 238.634658][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO) [ 238.647105][ C0] prep_new_page+0x35e/0x370 [ 238.651791][ C0] get_page_from_freelist+0x1296/0x1310 [ 238.657430][ C0] __alloc_pages_nodemask+0x202/0x4b0 [ 238.662968][ C0] __vmalloc_node_range+0x36a/0x6e0 [ 238.668425][ C0] vmalloc_user+0x73/0x80 [ 238.672774][ C0] kcov_mmap+0x2b/0x120 [ 238.677007][ C0] mmap_region+0x101b/0x15a0 [ 238.681848][ C0] do_mmap+0x826/0xd90 [ 238.685922][ C0] vm_mmap_pgoff+0x195/0x230 [ 238.690511][ C0] ksys_mmap_pgoff+0x16f/0x1e0 [ 238.695282][ C0] __x64_sys_mmap+0xfa/0x110 [ 238.699868][ C0] do_syscall_64+0xcf/0x170 [ 238.704362][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 238.710247][ C0] page last free stack trace: [ 238.715359][ C0] free_unref_page_prepare+0x2a9/0x3a0 [ 238.720915][ C0] __free_pages+0xaa/0x110 [ 238.725414][ C0] __vunmap+0x76a/0x8a0 [ 238.729556][ C0] vfree+0x61/0x90 [ 238.733260][ C0] kcov_mmap+0x8c/0x120 [ 238.737415][ C0] mmap_region+0x101b/0x15a0 [ 238.742014][ C0] do_mmap+0x826/0xd90 [ 238.746108][ C0] vm_mmap_pgoff+0x195/0x230 [ 238.750790][ C0] ksys_mmap_pgoff+0x16f/0x1e0 [ 238.755750][ C0] __x64_sys_mmap+0xfa/0x110 [ 238.760420][ C0] do_syscall_64+0xcf/0x170 [ 238.764920][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 238.770881][ C0] [ 238.773215][ C0] Memory state around the buggy address: [ 238.778944][ C0] ffff8881e0e7b080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 238.787437][ C0] ffff8881e0e7b100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 238.795889][ C0] >ffff8881e0e7b180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 238.804113][ C0] ^ [ 238.810522][ C0] ffff8881e0e7b200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 238.818578][ C0] ffff8881e0e7b280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 238.826944][ C0] ================================================================== [ 238.835869][ C0] Disabling lock debugging due to kernel taint [ 238.842186][ C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 238.850023][ C0] #PF: supervisor instruction fetch in kernel mode [ 238.856687][ C0] #PF: error_code(0x0010) - not-present page [ 238.862931][ C0] PGD 0 P4D 0 [ 238.866308][ C0] Oops: 0010 [#1] PREEMPT SMP KASAN [ 238.872046][ C0] CPU: 0 PID: 6095 Comm: syz.1.1860 Tainted: G B W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 238.883578][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 238.893827][ C0] RIP: 0010:0x0 [ 238.897331][ C0] Code: Bad RIP value. [ 238.901397][ C0] RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010202 [ 238.908939][ C0] RAX: ffffffff8150a590 RBX: 0000000000000101 RCX: ffff8881cb4daf40 [ 238.917086][ C0] RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881e0e7b1c0 [ 238.925091][ C0] RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003 [ 238.933216][ C0] R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffe770 [ 238.941448][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e0e7b1c0 [ 238.949903][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 238.959018][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 238.965776][ C0] CR2: ffffffffffffffd6 CR3: 0000000005c0e000 CR4: 00000000003406b0 [ 238.974076][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 238.982433][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 238.990531][ C0] Call Trace: [ 238.993814][ C0] [ 238.996753][ C0] call_timer_fn+0x3c/0x380 [ 239.001263][ C0] __run_timers+0x81d/0xb60 [ 239.005772][ C0] ? enqueue_timer+0x2c0/0x2c0 [ 239.010537][ C0] ? check_preemption_disabled+0x9b/0x300 [ 239.016275][ C0] ? debug_smp_processor_id+0x20/0x20 [ 239.021700][ C0] run_timer_softirq+0x6a/0xf0 [ 239.026512][ C0] __do_softirq+0x236/0x660 [ 239.031068][ C0] irq_exit+0x197/0x1c0 [ 239.035277][ C0] smp_apic_timer_interrupt+0x11d/0x490 [ 239.040839][ C0] apic_timer_interrupt+0xf/0x20 [ 239.045765][ C0] [ 239.048890][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x17/0x50 [ 239.055154][ C0] Code: 96 d1 85 e8 6b f2 2d 00 5d c3 00 00 90 90 00 00 90 90 00 55 48 89 e5 48 8b 45 08 65 48 8b 0d 90 0e a3 7e 65 8b 15 95 0e a3 7e c2 00 01 1f 00 74 02 5d c3 8b 91 00 0a 00 00 83 fa 02 75 f3 48 [ 239.075028][ C0] RSP: 0018:ffff8881e830f5d0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 239.083719][ C0] RAX: ffffffff81846e59 RBX: 00007f2882b6e000 RCX: ffff8881cb4daf40 [ 239.091791][ C0] RDX: 0000000080000001 RSI: 000000000023ffff RDI: 00000000001d6650 [ 239.100131][ C0] RBP: ffff8881e830f5d0 R08: dffffc0000000000 R09: ffffed103969b5e9 [ 239.108363][ C0] R10: ffffed103969b5e9 R11: 1ffff1103969b5e8 R12: 00000000001d6650 [ 239.116509][ C0] R13: 000000000023ffff R14: 80000001d6650007 R15: ffff8881df76e378 [ 239.124590][ C0] ? vm_normal_page+0x99/0x1f0 [ 239.129602][ C0] vm_normal_page+0x99/0x1f0 [ 239.134935][ C0] unmap_page_range+0xaf6/0x1b20 [ 239.139964][ C0] ? lru_add_page_tail+0x6e0/0x6e0 [ 239.145066][ C0] unmap_vmas+0x245/0x340 [ 239.149853][ C0] ? unmap_page_range+0x1b20/0x1b20 [ 239.155142][ C0] ? tlb_gather_mmu+0x270/0x330 [ 239.160338][ C0] exit_mmap+0x2bb/0x520 [ 239.165325][ C0] ? vm_brk+0x30/0x30 [ 239.169600][ C0] ? __kasan_check_write+0x14/0x20 [ 239.174736][ C0] ? mutex_unlock+0x1c/0x40 [ 239.179755][ C0] ? uprobe_clear_state+0x2c7/0x320 [ 239.185196][ C0] ? __kasan_check_read+0x11/0x20 [ 239.190660][ C0] __mmput+0x92/0x2e0 [ 239.194940][ C0] mmput+0x47/0x60 [ 239.198665][ C0] do_exit+0x99f/0x2660 [ 239.203020][ C0] ? futex_wait+0x45b/0x700 [ 239.207513][ C0] ? put_task_struct+0x90/0x90 [ 239.212355][ C0] ? do_futex+0x1290/0x1290 [ 239.216941][ C0] ? cgroup_freezing+0x86/0xb0 [ 239.221887][ C0] do_group_exit+0x13e/0x300 [ 239.226652][ C0] ? __kasan_check_write+0x14/0x20 [ 239.231856][ C0] get_signal+0xdee/0x13d0 [ 239.236284][ C0] do_signal+0xad/0xda0 [ 239.240528][ C0] ? putname+0xfe/0x150 [ 239.244675][ C0] ? futex_exit_release+0x1d0/0x1d0 [ 239.249964][ C0] ? check_preemption_disabled+0x118/0x300 [ 239.255947][ C0] ? signal_fault+0x1d0/0x1d0 [ 239.260715][ C0] ? __x64_sys_futex+0x100/0x100 [ 239.265646][ C0] ? debug_smp_processor_id+0x20/0x20 [ 239.271353][ C0] ? switch_fpu_return+0x197/0x3b0 [ 239.276735][ C0] exit_to_usermode_loop+0xc4/0x1b0 [ 239.282018][ C0] prepare_exit_to_usermode+0x18e/0x1f0 [ 239.287749][ C0] do_syscall_64+0x13e/0x170 [ 239.292337][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 239.298418][ C0] RIP: 0033:0x7f288416e969 [ 239.303083][ C0] Code: Bad RIP value. [ 239.307412][ C0] RSP: 002b:00007f28827d70e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 239.316776][ C0] RAX: fffffffffffffe00 RBX: 00007f2884395fa8 RCX: 00007f288416e969 [ 239.324964][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f2884395fa8 [ 239.333056][ C0] RBP: 00007f2884395fa0 R08: 0000000000000000 R09: 0000000000000000 [ 239.341073][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2884395fac [ 239.349406][ C0] R13: 0000000000000000 R14: 00007ffecae98620 R15: 00007ffecae98708 [ 239.357373][ C0] Modules linked in: [ 239.361349][ C0] CR2: 0000000000000000 [ 239.365492][ C0] ---[ end trace f88a7515e183ee45 ]--- [ 239.371055][ C0] RIP: 0010:0x0 [ 239.374631][ C0] Code: Bad RIP value. [ 239.378813][ C0] RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010202 [ 239.385155][ C0] RAX: ffffffff8150a590 RBX: 0000000000000101 RCX: ffff8881cb4daf40 [ 239.393304][ C0] RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881e0e7b1c0 [ 239.401268][ C0] RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003 [ 239.409242][ C0] R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffe770 [ 239.417219][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e0e7b1c0 [ 239.425211][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 239.434143][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 239.440818][ C0] CR2: ffffffffffffffd6 CR3: 0000000005c0e000 CR4: 00000000003406b0 [ 239.449055][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 239.457299][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 239.465576][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 239.473427][ C0] Kernel Offset: disabled [ 239.478338][ C0] Rebooting in 86400 seconds..