last executing test programs: 6.818699853s ago: executing program 4 (id=3850): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071109000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) recvmsg$unix(r0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f00000007c0), 0x47) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@o_path={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0900000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) 6.043697942s ago: executing program 3 (id=3858): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 5.814969953s ago: executing program 4 (id=3859): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x40880) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) 5.808144353s ago: executing program 2 (id=3860): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 5.195360654s ago: executing program 1 (id=3864): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f00000003c0)=r2}, 0x20) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="090000000000000000000000050000008500"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r7}, 0x0, &(0x7f0000000480)=r8}, 0x20) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x14) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x5, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="140000000000000001000000010000001174690752f1bce9a821c459f3aa153f775eac2bab213a7473754c768e752721ab843052b9bd2f1789ccc5366c733db6830202102413dfb751af06fc8dd1", @ANYBLOB], 0x18, 0x20}, 0x4080) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0), 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) 5.180142064s ago: executing program 4 (id=3865): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 5.177099915s ago: executing program 3 (id=3866): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}], 0xa8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 5.080181529s ago: executing program 3 (id=3867): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 4.86020811s ago: executing program 1 (id=3868): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 4.837422031s ago: executing program 2 (id=3869): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 4.738523096s ago: executing program 1 (id=3870): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 4.697658709s ago: executing program 2 (id=3871): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x40880) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) 3.886863958s ago: executing program 2 (id=3874): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 3.770024844s ago: executing program 1 (id=3875): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x9, 0x5}, 0x8a1, 0x404, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"/3432], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="5aee41dea43e63a3f7fb7f110000", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000900), 0x8) write$cgroup_freezer_state(r3, &(0x7f0000000940)='FREEZING\x00', 0x9) r4 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, 0x0, &(0x7f0000000480)='syzkaller\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, r4, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc110a000, &(0x7f0000001040)="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", 0x84c, &(0x7f0000000280), 0x0, &(0x7f0000000180)="ef28f6503f66485759f7e7c35665669ae89ac7787c217ee70da8ee99f25aed2c5a68148d07e70f8c3007af710300000000000000ad97dd2a21e1f4c9671a7a027e97992700bfff6a13bdff5aba64661b6ad6f8") r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.204660822s ago: executing program 0 (id=3876): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) 2.83421297s ago: executing program 0 (id=3877): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}], 0xa8}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 2.64248985s ago: executing program 0 (id=3878): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f00000003c0)=r2}, 0x20) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="090000000000000000000000050000008500"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r7}, 0x0, &(0x7f0000000480)=r8}, 0x20) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x14) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x5, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x4080) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0), 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) 2.372088512s ago: executing program 0 (id=3879): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r3 = openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="560a00000000000071113600000000001800"/27], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) write$cgroup_type(r3, &(0x7f0000000080), 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syz_tun\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) 1.885828337s ago: executing program 3 (id=3880): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x99}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, 0x0, &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x7, 0x0, &(0x7f0000000900)="c1dfb080cd21d3", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.814129531s ago: executing program 4 (id=3881): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r3 = openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="560a00000000000071113600000000001800"/31], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) write$cgroup_type(r3, &(0x7f0000000080), 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syz_tun\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) 1.539904973s ago: executing program 3 (id=3882): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071109000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) recvmsg$unix(r0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f00000007c0), 0x47) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@o_path={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0900000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) 1.170657042s ago: executing program 1 (id=3883): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[], &(0x7f0000000280)='GPL\x00'}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f00000003c0)=r2}, 0x20) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000000000000000000005000000850000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r7}, 0x0, &(0x7f0000000480)=r8}, 0x20) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x14) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x5, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="140000000000000001000000010000001174690752f1bce9a821c459f3aa153f775eac2bab213a7473754c768e752721ab843052b9bd2f1789ccc5366c733db6830202102413dfb751af06fc8dd1", @ANYBLOB], 0x18, 0x20}, 0x4080) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0), 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) 1.100119185s ago: executing program 0 (id=3884): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 856.959717ms ago: executing program 1 (id=3885): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r3 = openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="560a00000000000071113600000000001800"/27], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) write$cgroup_type(r3, &(0x7f0000000080), 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syz_tun\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) 801.00578ms ago: executing program 2 (id=3886): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x99}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x7, 0x0, &(0x7f0000000900)="c1dfb080cd21d3", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 650.280278ms ago: executing program 4 (id=3887): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f0000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 579.285281ms ago: executing program 3 (id=3888): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x40880) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) 575.295801ms ago: executing program 2 (id=3889): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 431.799289ms ago: executing program 4 (id=3890): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) 0s ago: executing program 0 (id=3891): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x99}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, 0x0, &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x7, 0x0, &(0x7f0000000900)="c1dfb080cd21d3", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.106' (ED25519) to the list of known hosts. [ 19.038080][ T30] audit: type=1400 audit(1773735928.821:64): avc: denied { mounton } for pid=260 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.039314][ T260] cgroup: Unknown subsys name 'net' [ 19.045832][ T30] audit: type=1400 audit(1773735928.821:65): avc: denied { mount } for pid=260 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.053938][ T30] audit: type=1400 audit(1773735928.841:66): avc: denied { unmount } for pid=260 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.054103][ T260] cgroup: Unknown subsys name 'devices' [ 19.193631][ T260] cgroup: Unknown subsys name 'hugetlb' [ 19.199316][ T260] cgroup: Unknown subsys name 'rlimit' [ 19.337965][ T30] audit: type=1400 audit(1773735929.131:67): avc: denied { setattr } for pid=260 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.361453][ T30] audit: type=1400 audit(1773735929.131:68): avc: denied { mounton } for pid=260 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.386719][ T30] audit: type=1400 audit(1773735929.131:69): avc: denied { mount } for pid=260 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.393116][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.419632][ T30] audit: type=1400 audit(1773735929.201:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.445229][ T30] audit: type=1400 audit(1773735929.201:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.501235][ T30] audit: type=1400 audit(1773735929.281:72): avc: denied { read } for pid=260 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.526917][ T30] audit: type=1400 audit(1773735929.281:73): avc: denied { open } for pid=260 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.526949][ T260] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.026403][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.033556][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.041074][ T282] device bridge_slave_0 entered promiscuous mode [ 20.047976][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.055211][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.062669][ T284] device bridge_slave_0 entered promiscuous mode [ 20.070990][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.078093][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.085819][ T284] device bridge_slave_1 entered promiscuous mode [ 20.105509][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.112730][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.120295][ T282] device bridge_slave_1 entered promiscuous mode [ 20.185413][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.192797][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.200505][ T283] device bridge_slave_0 entered promiscuous mode [ 20.207592][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.214815][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.222513][ T283] device bridge_slave_1 entered promiscuous mode [ 20.293176][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.300419][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.308145][ T286] device bridge_slave_0 entered promiscuous mode [ 20.332765][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.339855][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.347394][ T286] device bridge_slave_1 entered promiscuous mode [ 20.378456][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.385610][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.393197][ T285] device bridge_slave_0 entered promiscuous mode [ 20.400014][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.407352][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.415051][ T285] device bridge_slave_1 entered promiscuous mode [ 20.462644][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.469711][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.477034][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.484084][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.517039][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.524125][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.531497][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.538558][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.553766][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.560825][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.568131][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.575244][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.627274][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.635070][ T199] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.642564][ T199] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.650024][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.658900][ T199] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.666582][ T199] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.674219][ T199] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.713648][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.722178][ T199] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.729331][ T199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.736879][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.745064][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.752601][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.759962][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.768261][ T199] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.775531][ T199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.783112][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.791245][ T199] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.798286][ T199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.805709][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.813656][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.822971][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.832134][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.852116][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.871014][ T284] device veth0_vlan entered promiscuous mode [ 20.878871][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.887715][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.896454][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.904380][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.912009][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.920269][ T199] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.927317][ T199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.934859][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.964671][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.973025][ T199] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.980163][ T199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.988195][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.997222][ T199] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.004355][ T199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.011779][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.019924][ T199] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.026961][ T199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.034564][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.042734][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.066799][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.074989][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.083252][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.091407][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.099909][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.108517][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.117017][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.125359][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.133652][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.140986][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.148695][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.157095][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.165330][ T199] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.172373][ T199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.179902][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.188401][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.196778][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.212427][ T283] device veth0_vlan entered promiscuous mode [ 21.219282][ T282] device veth0_vlan entered promiscuous mode [ 21.226012][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.234619][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.242935][ T199] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.250156][ T199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.257679][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.265572][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.273587][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.281609][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.289791][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.298043][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.306480][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.314348][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.321929][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.329321][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.337437][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.345772][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.355450][ T284] device veth1_macvtap entered promiscuous mode [ 21.365739][ T285] device veth0_vlan entered promiscuous mode [ 21.371985][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.379686][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.387548][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.404723][ T283] device veth1_macvtap entered promiscuous mode [ 21.411388][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.419737][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.428297][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.437163][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.445389][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.453030][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.461015][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.469715][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.478117][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.486743][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.494871][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.518748][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.527096][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.537174][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.546209][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.554847][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.563725][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.572657][ T282] device veth1_macvtap entered promiscuous mode [ 21.592211][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 21.594733][ T285] device veth1_macvtap entered promiscuous mode [ 21.616254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.631056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.640533][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.649351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.658005][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.666837][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.671526][ C1] hrtimer: interrupt took 24448 ns [ 21.675051][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.688759][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.698195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.707156][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.718662][ T286] device veth0_vlan entered promiscuous mode [ 21.733320][ T286] device veth1_macvtap entered promiscuous mode [ 21.758775][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.767256][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.776528][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.785700][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.794728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.802874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.810903][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.869464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.885322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.894820][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.905745][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.915279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.923982][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.933244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.952526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.064016][ T319] tap0: tun_chr_ioctl cmd 1074025677 [ 22.070564][ T319] tap0: linktype set to 805 [ 22.079668][ T319] tap0: tun_chr_ioctl cmd 1074025680 [ 22.760061][ T329] device syzkaller0 entered promiscuous mode [ 22.869826][ T332] device syzkaller0 entered promiscuous mode [ 23.693902][ T350] device syzkaller0 entered promiscuous mode [ 25.051511][ C1] sched: RT throttling activated [ 25.092688][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 25.092706][ T30] audit: type=1400 audit(1773735934.881:112): avc: denied { create } for pid=351 comm="syz.3.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 25.180419][ T30] audit: type=1400 audit(1773735934.941:113): avc: denied { read } for pid=351 comm="syz.3.15" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.225707][ T30] audit: type=1400 audit(1773735934.951:114): avc: denied { open } for pid=351 comm="syz.3.15" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.265440][ T357] device syzkaller0 entered promiscuous mode [ 25.540491][ T374] device syzkaller0 entered promiscuous mode [ 25.557322][ T30] audit: type=1400 audit(1773735935.341:115): avc: denied { create } for pid=370 comm="syz.3.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 25.599463][ T369] device syzkaller0 entered promiscuous mode [ 25.692233][ T371] device sit0 entered promiscuous mode [ 25.925424][ T381] device syzkaller0 entered promiscuous mode [ 26.000697][ T30] audit: type=1400 audit(1773735935.781:116): avc: denied { create } for pid=386 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 26.067238][ T390] device syzkaller0 entered promiscuous mode [ 26.260957][ T390] syzkaller0: create flow: hash 2756367185 index 2 [ 26.543010][ T389] syzkaller0: delete flow: hash 2756367185 index 2 [ 26.561798][ T30] audit: type=1400 audit(1773735936.341:117): avc: denied { read } for pid=399 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.635654][ T30] audit: type=1400 audit(1773735936.421:118): avc: denied { write } for pid=399 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.678884][ T405] device syzkaller0 entered promiscuous mode [ 26.809872][ T30] audit: type=1400 audit(1773735936.591:119): avc: denied { create } for pid=410 comm="syz.4.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 26.899383][ T30] audit: type=1400 audit(1773735936.641:120): avc: denied { ioctl } for pid=402 comm="syz.2.34" path="socket:[16660]" dev="sockfs" ino=16660 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.981269][ T415] device syzkaller0 entered promiscuous mode [ 27.069596][ T417] device syzkaller0 entered promiscuous mode [ 27.602122][ T435] device syzkaller0 entered promiscuous mode [ 27.662321][ T437] device syzkaller0 entered promiscuous mode [ 27.736526][ T435] syzkaller0: create flow: hash 2756367185 index 2 [ 27.815718][ T434] syzkaller0: delete flow: hash 2756367185 index 2 [ 28.660325][ T467] device syzkaller0 entered promiscuous mode [ 28.689689][ T30] audit: type=1400 audit(1773735938.471:121): avc: denied { create } for pid=465 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.693498][ T497] tap0: tun_chr_ioctl cmd 1074025677 [ 29.700376][ T497] tap0: linktype set to 805 [ 29.818366][ T500] tap0: tun_chr_ioctl cmd 1074025680 [ 29.996294][ T507] device syzkaller0 entered promiscuous mode [ 31.039065][ T551] device syzkaller0 entered promiscuous mode [ 31.073208][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 31.073224][ T30] audit: type=1400 audit(1773735940.861:123): avc: denied { create } for pid=548 comm="syz.2.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 31.101981][ T549] device veth1_macvtap left promiscuous mode [ 33.106599][ T582] ------------[ cut here ]------------ [ 33.112505][ T582] trace type BPF program uses run-time allocation [ 33.119563][ T582] WARNING: CPU: 1 PID: 582 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 33.131113][ T582] Modules linked in: [ 33.139911][ T582] CPU: 1 PID: 582 Comm: syz.1.93 Not tainted syzkaller #0 [ 33.147543][ T582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 33.158511][ T582] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 33.174778][ T582] Code: ee ff 48 c7 c6 20 46 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 96 1c ee ff c6 05 b4 7d 6a 05 01 48 c7 c7 80 42 48 85 e8 a3 33 2f 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 33.201211][ T582] RSP: 0018:ffffc90000c17428 EFLAGS: 00010246 [ 33.227445][ T582] RAX: bb1af2606cde1b00 RBX: 0000000000000001 RCX: 0000000000080000 [ 33.244678][ T582] RDX: ffffc90001b6d000 RSI: 0000000000002cba RDI: 0000000000002cbb [ 33.270652][ T582] RBP: ffffc90000c17470 R08: ffff8881f7127493 R09: 1ffff1103ee24e92 [ 33.303298][ T582] R10: dffffc0000000000 R11: ffffed103ee24e93 R12: ffff888128dc0000 [ 33.465031][ T582] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810c77e800 [ 33.477816][ T582] FS: 00007f29ef72e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.502309][ T582] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.509471][ T582] CR2: 00007ff811b6dff8 CR3: 000000011aa9f000 CR4: 00000000003506b0 [ 33.520294][ T582] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.532550][ T582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.541088][ T582] Call Trace: [ 33.546495][ T582] [ 33.549757][ T582] resolve_pseudo_ldimm64+0x656/0x1180 [ 33.597460][ T582] ? check_attach_btf_id+0xd70/0xd70 [ 33.635017][ T582] ? bpf_check+0x28f1/0xf370 [ 33.639845][ T582] bpf_check+0x32c7/0xf370 [ 33.675422][ T582] ? 0xffffffffa002c000 [ 33.679893][ T582] ? is_bpf_text_address+0x177/0x190 [ 33.708662][ T582] ? bpf_get_btf_vmlinux+0x60/0x60 [ 33.856944][ T582] ? unwind_get_return_address+0x4d/0x90 [ 33.863906][ T582] ? stack_trace_save+0xf0/0xf0 [ 33.872006][ T582] ? arch_stack_walk+0xee/0x140 [ 33.878257][ T582] ? stack_trace_save+0xa6/0xf0 [ 33.893813][ T582] ? __stack_depot_save+0x34/0x480 [ 33.909938][ T582] ? __kasan_slab_alloc+0x69/0xf0 [ 33.920473][ T582] ? __kasan_kmalloc+0xec/0x110 [ 33.944698][ T582] ? __kasan_kmalloc+0xda/0x110 [ 33.972062][ T582] ? kmem_cache_alloc_trace+0x119/0x270 [ 33.978164][ T582] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.995937][ T582] ? security_bpf_prog_alloc+0x62/0x90 [ 34.013239][ T582] ? bpf_prog_load+0x9f4/0x1640 [ 34.023496][ T605] device syzkaller0 entered promiscuous mode [ 34.025088][ T582] ? __sys_bpf+0x51d/0x7d0 [ 34.050058][ T582] ? __x64_sys_bpf+0x7c/0x90 [ 34.081032][ T582] ? x64_sys_call+0x4b9/0x9a0 [ 34.096029][ T582] ? do_syscall_64+0x4c/0xa0 [ 34.108949][ T582] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.118984][ T582] ? irqentry_exit+0x37/0x40 [ 34.131604][ T582] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 34.137654][ T582] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 34.147959][ T582] ? memset+0x35/0x40 [ 34.154450][ T582] ? bpf_obj_name_cpy+0x193/0x1e0 [ 34.160479][ T582] bpf_prog_load+0x10c4/0x1640 [ 34.165354][ T614] GPL: port 1(erspan0) entered blocking state [ 34.172030][ T582] ? map_freeze+0x360/0x360 [ 34.176655][ T614] GPL: port 1(erspan0) entered disabled state [ 34.183885][ T582] ? selinux_bpf+0xc7/0xf0 [ 34.189071][ T582] ? security_bpf+0x82/0xa0 [ 34.195339][ T614] device erspan0 entered promiscuous mode [ 34.201324][ T582] __sys_bpf+0x51d/0x7d0 [ 34.206172][ T582] ? bpf_link_show_fdinfo+0x330/0x330 [ 34.231919][ T582] ? __x64_sys_bpf+0x1d/0x90 [ 34.246774][ T582] __x64_sys_bpf+0x7c/0x90 [ 34.251255][ T582] x64_sys_call+0x4b9/0x9a0 [ 34.320303][ T582] do_syscall_64+0x4c/0xa0 [ 34.348809][ T582] ? clear_bhb_loop+0x50/0xa0 [ 34.380093][ T582] ? clear_bhb_loop+0x50/0xa0 [ 34.405345][ T582] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.419166][ T582] RIP: 0033:0x7f29f0cf4799 [ 34.458149][ T582] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 34.571886][ T582] RSP: 002b:00007f29ef72e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.588662][ T618] device sit0 entered promiscuous mode [ 34.589665][ T582] RAX: ffffffffffffffda RBX: 00007f29f0f6e090 RCX: 00007f29f0cf4799 [ 34.722997][ T582] RDX: 0000000000000080 RSI: 0000200000000580 RDI: 0000000000000005 [ 34.771234][ T582] RBP: 00007f29f0d8ac99 R08: 0000000000000000 R09: 0000000000000000 [ 34.872360][ T582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.880386][ T582] R13: 00007f29f0f6e128 R14: 00007f29f0f6e090 R15: 00007ffe0be13048 [ 35.006885][ T582] [ 35.069373][ T582] ---[ end trace a8d2e08a4fca57a6 ]--- [ 36.451537][ T642] device syzkaller0 entered promiscuous mode [ 36.636782][ T651] device syzkaller0 entered promiscuous mode [ 36.735048][ T660] device syzkaller0 entered promiscuous mode [ 36.867376][ T428] syzkaller0: tun_net_xmit 48 [ 36.908036][ T30] audit: type=1400 audit(1773735946.691:124): avc: denied { create } for pid=657 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 37.167428][ T673] device syzkaller0 entered promiscuous mode [ 38.456033][ T30] audit: type=1400 audit(1773735948.231:125): avc: denied { create } for pid=694 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.526684][ T695] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.535417][ T695] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.604307][ T699] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.611396][ T699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.618741][ T699] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.625897][ T699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.696379][ T699] device bridge0 entered promiscuous mode [ 40.222701][ T726] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.231848][ T726] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.261079][ T726] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.268651][ T726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.277183][ T726] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.284892][ T726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.312350][ T726] device bridge0 entered promiscuous mode [ 41.629341][ T30] audit: type=1400 audit(1773735951.411:126): avc: denied { write } for pid=768 comm="syz.2.151" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.781220][ T30] audit: type=1400 audit(1773735951.561:127): avc: denied { create } for pid=771 comm="syz.4.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 43.477163][ T821] device dummy0 entered promiscuous mode [ 43.497543][ T819] device dummy0 entered promiscuous mode [ 43.532470][ T30] audit: type=1400 audit(1773735953.311:128): avc: denied { create } for pid=824 comm="syz.3.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 43.612092][ T825] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.621565][ T825] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.638743][ T825] device bridge0 left promiscuous mode [ 43.921696][ T833] device bridge_slave_1 left promiscuous mode [ 43.927919][ T833] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.942262][ T833] device bridge_slave_0 left promiscuous mode [ 43.952174][ T833] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.168518][ T851] device syzkaller0 entered promiscuous mode [ 44.178345][ T835] GPL: port 1(erspan0) entered blocking state [ 44.184884][ T835] GPL: port 1(erspan0) entered disabled state [ 44.191840][ T835] device erspan0 entered promiscuous mode [ 44.198009][ T835] GPL: port 1(erspan0) entered blocking state [ 44.204258][ T835] GPL: port 1(erspan0) entered forwarding state [ 45.758574][ T889] GPL: port 1(erspan0) entered blocking state [ 45.773098][ T889] GPL: port 1(erspan0) entered disabled state [ 45.796301][ T889] device erspan0 entered promiscuous mode [ 46.108111][ T893] device syzkaller0 entered promiscuous mode [ 46.746236][ T920] device syzkaller0 entered promiscuous mode [ 47.290583][ T937] device syzkaller0 entered promiscuous mode [ 48.283087][ T972] device veth1_macvtap left promiscuous mode [ 48.685989][ T993] device syzkaller0 entered promiscuous mode [ 50.015013][ T1008] syz.2.228 (1008) used greatest stack depth: 21808 bytes left [ 50.861791][ T1036] device syzkaller0 entered promiscuous mode [ 50.928503][ T1038] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.937939][ T1038] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.974723][ T1038] device bridge0 left promiscuous mode [ 51.031101][ T1039] device bridge_slave_1 left promiscuous mode [ 51.037700][ T1039] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.049298][ T1039] device bridge_slave_0 left promiscuous mode [ 51.055657][ T1039] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.398469][ T1052] device syzkaller0 entered promiscuous mode [ 51.826642][ T1069] @µl: renamed from bond_slave_0 [ 52.916863][ T1079] syz.1.251 (1079) used greatest stack depth: 21680 bytes left [ 53.027666][ T1094] device syzkaller0 entered promiscuous mode [ 53.630686][ T1114] tap0: tun_chr_ioctl cmd 1074025692 [ 54.327882][ T1122] device syzkaller0 entered promiscuous mode [ 54.544252][ T1132] device syzkaller0 entered promiscuous mode [ 55.320042][ T1158] device syzkaller0 entered promiscuous mode [ 55.712040][ T1170] device syzkaller0 entered promiscuous mode [ 58.177624][ T1248] device sit0 entered promiscuous mode [ 62.051637][ T1257] device veth1_macvtap left promiscuous mode [ 66.689146][ T1433] device syzkaller0 entered promiscuous mode [ 67.464926][ T1459] device veth1_macvtap left promiscuous mode [ 67.805365][ T1471] device syzkaller0 entered promiscuous mode [ 68.361358][ T1498] device syzkaller0 entered promiscuous mode [ 68.420833][ T60] syzkaller0: tun_net_xmit 48 [ 68.428313][ T1492] syzkaller0: create flow: hash 2756367185 index 2 [ 68.438670][ T1490] syzkaller0: delete flow: hash 2756367185 index 2 [ 69.147530][ T1521] device syzkaller0 entered promiscuous mode [ 69.888296][ T1546] device syzkaller0 entered promiscuous mode [ 70.088152][ T1546] syzkaller0: create flow: hash 2756367185 index 2 [ 70.154270][ T1543] syzkaller0: delete flow: hash 2756367185 index 2 [ 70.320628][ T1557] device syzkaller0 entered promiscuous mode [ 70.740433][ T1566] device syzkaller0 entered promiscuous mode [ 71.577611][ T1600] device syzkaller0 entered promiscuous mode [ 72.097044][ T1621] device syzkaller0 entered promiscuous mode [ 73.349604][ T1643] device syzkaller0 entered promiscuous mode [ 73.475277][ T1668] device syzkaller0 entered promiscuous mode [ 73.878379][ T1679] device syzkaller0 entered promiscuous mode [ 74.639791][ T1711] device syzkaller0 entered promiscuous mode [ 74.725057][ T1723] device syzkaller0 entered promiscuous mode [ 75.509331][ T1741] device syzkaller0 entered promiscuous mode [ 75.600967][ T1748] device syzkaller0 entered promiscuous mode [ 75.957479][ T1763] device syzkaller0 entered promiscuous mode [ 76.118922][ T802] syzkaller0: tun_net_xmit 76 [ 76.124078][ T802] syzkaller0: tun_net_xmit 48 [ 76.129664][ T1772] syzkaller0: create flow: hash 2417902864 index 1 [ 76.141595][ T802] syzkaller0: tun_net_xmit 76 [ 76.190362][ T1771] syzkaller0: delete flow: hash 2417902864 index 1 [ 76.418071][ T1784] device syzkaller0 entered promiscuous mode [ 76.792265][ T1806] device syzkaller0 entered promiscuous mode [ 77.519354][ T1841] device syzkaller0 entered promiscuous mode [ 81.251142][ T1858] device syzkaller0 entered promiscuous mode [ 81.367928][ T1867] device syzkaller0 entered promiscuous mode [ 83.092205][ T1928] device syzkaller0 entered promiscuous mode [ 83.981400][ T1941] device syzkaller0 entered promiscuous mode [ 84.007486][ T1943] device syzkaller0 entered promiscuous mode [ 84.163935][ T428] syzkaller0: tun_net_xmit 76 [ 84.169009][ T428] syzkaller0: tun_net_xmit 48 [ 84.201822][ T60] syzkaller0: tun_net_xmit 76 [ 84.254621][ T1948] syzkaller0: create flow: hash 2417902864 index 1 [ 84.336025][ T1947] syzkaller0: delete flow: hash 2417902864 index 1 [ 85.227262][ T1985] device syzkaller0 entered promiscuous mode [ 86.233280][ T2008] device syzkaller0 entered promiscuous mode [ 86.382718][ T30] audit: type=1400 audit(1773735996.171:129): avc: denied { create } for pid=2020 comm="syz.4.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 86.710471][ T2027] device syzkaller0 entered promiscuous mode [ 86.770287][ T2026] device syzkaller0 entered promiscuous mode [ 86.855192][ T2039] device syzkaller0 entered promiscuous mode [ 86.974480][ T2045] device syzkaller0 entered promiscuous mode [ 87.297582][ T2053] device syzkaller0 entered promiscuous mode [ 87.786420][ T2068] device syzkaller0 entered promiscuous mode [ 88.706566][ T2088] device syzkaller0 entered promiscuous mode [ 88.788738][ T2085] device syzkaller0 entered promiscuous mode [ 89.887679][ T2120] device syzkaller0 entered promiscuous mode [ 89.931455][ T2123] device syzkaller0 entered promiscuous mode [ 89.947893][ T2124] device syzkaller0 entered promiscuous mode [ 90.656570][ T2154] device syzkaller0 entered promiscuous mode [ 91.523916][ T2170] device syzkaller0 entered promiscuous mode [ 94.705559][ T2315] device syzkaller0 entered promiscuous mode [ 96.156009][ T2360] device syzkaller0 entered promiscuous mode [ 96.515280][ T2377] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.523600][ T2377] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.933493][ T2401] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.942114][ T2401] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.968843][ T2404] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.975956][ T2404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.983378][ T2404] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.990678][ T2404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.998944][ T2404] device bridge0 entered promiscuous mode [ 97.447408][ T2416] device syzkaller0 entered promiscuous mode [ 97.610777][ T2431] device veth1_macvtap entered promiscuous mode [ 97.619191][ T2431] device macsec0 entered promiscuous mode [ 97.667168][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.005741][ T2438] device syzkaller0 entered promiscuous mode [ 99.057640][ T2497] device syzkaller0 entered promiscuous mode [ 99.233094][ T2505] device veth1_macvtap left promiscuous mode [ 99.520854][ T30] audit: type=1400 audit(1773736009.301:130): avc: denied { create } for pid=2513 comm="syz.2.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.516575][ T2560] device syzkaller0 entered promiscuous mode [ 106.138013][ T2640] device veth1_macvtap left promiscuous mode [ 106.172103][ T2640] device macsec0 left promiscuous mode [ 106.594415][ T2655] device syzkaller0 entered promiscuous mode [ 106.795445][ T2664] device syzkaller0 entered promiscuous mode [ 107.661204][ T2687] device syzkaller0 entered promiscuous mode [ 108.797463][ T2705] device syzkaller0 entered promiscuous mode [ 109.798333][ T2751] device syzkaller0 entered promiscuous mode [ 109.890802][ T2758] device syzkaller0 entered promiscuous mode [ 110.669853][ T2760] device syzkaller0 entered promiscuous mode [ 111.208723][ T2803] tap0: tun_chr_ioctl cmd 1074025692 [ 111.356520][ T2812] device syzkaller0 entered promiscuous mode [ 111.814782][ T2814] device syzkaller0 entered promiscuous mode [ 112.089637][ T2823] device syzkaller0 entered promiscuous mode [ 112.297136][ T2827] device syzkaller0 entered promiscuous mode [ 112.813927][ T2843] device syzkaller0 entered promiscuous mode [ 113.076820][ T2850] device syzkaller0 entered promiscuous mode [ 113.628303][ T2868] device syzkaller0 entered promiscuous mode [ 114.431784][ T2892] device syzkaller0 entered promiscuous mode [ 114.900095][ T2907] device syzkaller0 entered promiscuous mode [ 114.959998][ T2917] device syzkaller0 entered promiscuous mode [ 115.328723][ T2942] device syzkaller0 entered promiscuous mode [ 115.914923][ T2965] device syzkaller0 entered promiscuous mode [ 115.954904][ T2969] device syzkaller0 entered promiscuous mode [ 116.418477][ T2996] device syzkaller0 entered promiscuous mode [ 116.883013][ T3016] device syzkaller0 entered promiscuous mode [ 116.917265][ T3012] device syzkaller0 entered promiscuous mode [ 116.934985][ T3018] device syzkaller0 entered promiscuous mode [ 118.599572][ T3063] device syzkaller0 entered promiscuous mode [ 118.616702][ T3064] device syzkaller0 entered promiscuous mode [ 119.550086][ T3104] device syzkaller0 entered promiscuous mode [ 119.861141][ T3118] device syzkaller0 entered promiscuous mode [ 119.938278][ T3127] device syzkaller0 entered promiscuous mode [ 120.123571][ T3130] device syzkaller0 entered promiscuous mode [ 120.534301][ T3146] device veth0_vlan left promiscuous mode [ 120.594726][ T3146] device veth0_vlan entered promiscuous mode [ 120.622128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.649822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.664923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.875576][ T3164] device syzkaller0 entered promiscuous mode [ 120.897262][ T3165] device syzkaller0 entered promiscuous mode [ 121.205136][ T3176] device syzkaller0 entered promiscuous mode [ 121.487527][ T3194] device syzkaller0 entered promiscuous mode [ 121.688212][ T3200] device syzkaller0 entered promiscuous mode [ 121.748989][ T3213] device syzkaller0 entered promiscuous mode [ 121.835968][ T3218] device syzkaller0 entered promiscuous mode [ 122.513656][ T3256] device syzkaller0 entered promiscuous mode [ 122.799329][ T3273] device veth0_vlan left promiscuous mode [ 122.837139][ T3273] device veth0_vlan entered promiscuous mode [ 122.886292][ T3273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.930235][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.945235][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.986772][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.810317][ T3294] device syzkaller0 entered promiscuous mode [ 124.210772][ T3314] device syzkaller0 entered promiscuous mode [ 124.657916][ T3329] device wg2 entered promiscuous mode [ 124.914396][ T3342] device syzkaller0 entered promiscuous mode [ 125.236629][ T3355] device syzkaller0 entered promiscuous mode [ 125.403387][ T3358] device syzkaller0 entered promiscuous mode [ 126.252706][ T3384] device syzkaller0 entered promiscuous mode [ 126.777709][ T3397] device syzkaller0 entered promiscuous mode [ 127.604773][ T3429] device syzkaller0 entered promiscuous mode [ 127.823119][ T3441] device syzkaller0 entered promiscuous mode [ 128.146174][ T3450] device syzkaller0 entered promiscuous mode [ 128.410095][ T3448] device syzkaller0 entered promiscuous mode [ 128.434583][ T3463] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.442022][ T3463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.449474][ T3463] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.456596][ T3463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.464493][ T3463] device bridge0 entered promiscuous mode [ 129.091095][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.109600][ T3478] device syzkaller0 entered promiscuous mode [ 129.829334][ T3506] device syzkaller0 entered promiscuous mode [ 132.073203][ T3577] device syzkaller0 entered promiscuous mode [ 133.612919][ T3645] device syzkaller0 entered promiscuous mode [ 133.630028][ T3646] device syzkaller0 entered promiscuous mode [ 135.270717][ T3694] device syzkaller0 entered promiscuous mode [ 135.285472][ T3697] device syzkaller0 entered promiscuous mode [ 136.192500][ T3739] device syzkaller0 entered promiscuous mode [ 136.751555][ T3741] device syzkaller0 entered promiscuous mode [ 137.750703][ T3789] device syzkaller0 entered promiscuous mode [ 137.956566][ T3792] device syzkaller0 entered promiscuous mode [ 139.210678][ T3845] device syzkaller0 entered promiscuous mode [ 140.912649][ T3906] device syzkaller0 entered promiscuous mode [ 143.272814][ T3997] device syzkaller0 entered promiscuous mode [ 144.182748][ T4015] device syzkaller0 entered promiscuous mode [ 144.573294][ T4036] device syzkaller0 entered promiscuous mode [ 144.948202][ T4045] device syzkaller0 entered promiscuous mode [ 145.872426][ T4071] device syzkaller0 entered promiscuous mode [ 146.505994][ T4093] device syzkaller0 entered promiscuous mode [ 146.994363][ T4120] device syzkaller0 entered promiscuous mode [ 147.935325][ T4166] device syzkaller0 entered promiscuous mode [ 149.212733][ T4214] device syzkaller0 entered promiscuous mode [ 149.506659][ T4218] device syzkaller0 entered promiscuous mode [ 150.415811][ T4253] device syzkaller0 entered promiscuous mode [ 150.857812][ T4265] device syzkaller0 entered promiscuous mode [ 151.890797][ T4301] device syzkaller0 entered promiscuous mode [ 151.959030][ T4308] device syzkaller0 entered promiscuous mode [ 152.750717][ T4342] device syzkaller0 entered promiscuous mode [ 152.850382][ T4358] device syzkaller0 entered promiscuous mode [ 156.808610][ T4494] device syzkaller0 entered promiscuous mode [ 156.855216][ T4493] device syzkaller0 entered promiscuous mode [ 157.781774][ T4544] device syzkaller0 entered promiscuous mode [ 157.836557][ T4549] device syzkaller0 entered promiscuous mode [ 158.160660][ T4556] device syzkaller0 entered promiscuous mode [ 158.893796][ T4586] device syzkaller0 entered promiscuous mode [ 158.912640][ T4587] device syzkaller0 entered promiscuous mode [ 159.528946][ T4603] device syzkaller0 entered promiscuous mode [ 159.874211][ T4611] device syzkaller0 entered promiscuous mode [ 161.101834][ T4644] device syzkaller0 entered promiscuous mode [ 161.461970][ T4660] device syzkaller0 entered promiscuous mode [ 162.719271][ T4704] device syzkaller0 entered promiscuous mode [ 164.142666][ T4742] device syzkaller0 entered promiscuous mode [ 164.257733][ T4755] device syzkaller0 entered promiscuous mode [ 165.518370][ T4797] device syzkaller0 entered promiscuous mode [ 165.971327][ T4802] device syzkaller0 entered promiscuous mode [ 168.081132][ T4868] device syzkaller0 entered promiscuous mode [ 168.967411][ T4905] device syzkaller0 entered promiscuous mode [ 169.226955][ T4912] device syzkaller0 entered promiscuous mode [ 169.641351][ T4921] device syzkaller0 entered promiscuous mode [ 169.714506][ T4920] device syzkaller0 entered promiscuous mode [ 170.574158][ T4944] device syzkaller0 entered promiscuous mode [ 170.796242][ T4960] device syzkaller0 entered promiscuous mode [ 170.825927][ T4961] device syzkaller0 entered promiscuous mode [ 170.867167][ T4964] device syzkaller0 entered promiscuous mode [ 170.952218][ T4964] syzkaller0: create flow: hash 2756367185 index 2 [ 171.055759][ T4963] syzkaller0: delete flow: hash 2756367185 index 2 [ 171.501776][ T4956] syz.3.1568 (4956) used greatest stack depth: 21360 bytes left [ 171.600653][ T4987] device syzkaller0 entered promiscuous mode [ 172.109468][ T4996] device syzkaller0 entered promiscuous mode [ 172.193054][ T4999] device syzkaller0 entered promiscuous mode [ 172.742193][ T5021] device syzkaller0 entered promiscuous mode [ 172.845728][ T5025] device syzkaller0 entered promiscuous mode [ 173.438738][ T5042] device syzkaller0 entered promiscuous mode [ 173.510947][ T5045] device syzkaller0 entered promiscuous mode [ 174.475592][ T5068] device syzkaller0 entered promiscuous mode [ 175.018262][ T5091] device syzkaller0 entered promiscuous mode [ 175.953120][ T5118] device syzkaller0 entered promiscuous mode [ 177.390619][ T5143] device syzkaller0 entered promiscuous mode [ 177.431773][ T5146] device syzkaller0 entered promiscuous mode [ 179.702704][ T5199] device syzkaller0 entered promiscuous mode [ 179.829810][ T5209] device syzkaller0 entered promiscuous mode [ 181.334915][ T5258] device syzkaller0 entered promiscuous mode [ 183.186393][ T5297] device syzkaller0 entered promiscuous mode [ 185.010173][ T5353] device syzkaller0 entered promiscuous mode [ 186.469862][ T5396] device syzkaller0 entered promiscuous mode [ 187.500207][ T5433] device syzkaller0 entered promiscuous mode [ 188.288323][ T5442] device syzkaller0 entered promiscuous mode [ 189.234600][ T5495] device syzkaller0 entered promiscuous mode [ 189.746489][ T5517] device syzkaller0 entered promiscuous mode [ 189.770340][ T5518] device syzkaller0 entered promiscuous mode [ 190.173605][ T5527] device syzkaller0 entered promiscuous mode [ 190.283737][ T5527] syzkaller0: create flow: hash 2756367185 index 2 [ 190.388907][ T5525] syzkaller0: delete flow: hash 2756367185 index 2 [ 191.997946][ T5568] device syzkaller0 entered promiscuous mode [ 192.107437][ T5568] syzkaller0: create flow: hash 2756367185 index 2 [ 192.117091][ T5567] syzkaller0: delete flow: hash 2756367185 index 2 [ 193.125961][ T5594] device syzkaller0 entered promiscuous mode [ 193.207797][ T5602] device syzkaller0 entered promiscuous mode [ 193.411689][ T5616] device syzkaller0 entered promiscuous mode [ 193.500511][ T5616] syzkaller0: create flow: hash 2756367185 index 2 [ 193.570019][ T5614] syzkaller0: delete flow: hash 2756367185 index 2 [ 194.230470][ T5641] device syzkaller0 entered promiscuous mode [ 194.864464][ T5662] device syzkaller0 entered promiscuous mode [ 195.334359][ T5676] device syzkaller0 entered promiscuous mode [ 195.811874][ T5690] device syzkaller0 entered promiscuous mode [ 196.290481][ T5714] device syzkaller0 entered promiscuous mode [ 196.320329][ T5716] device syzkaller0 entered promiscuous mode [ 196.366886][ T5718] device syzkaller0 entered promiscuous mode [ 196.465171][ T5718] syzkaller0: create flow: hash 2756367185 index 2 [ 196.512261][ T5717] syzkaller0: delete flow: hash 2756367185 index 2 [ 196.600039][ T5726] device syzkaller0 entered promiscuous mode [ 197.630003][ T5754] device syzkaller0 entered promiscuous mode [ 198.339776][ T5768] device syzkaller0 entered promiscuous mode [ 199.261783][ T5791] device syzkaller0 entered promiscuous mode [ 199.622168][ T5805] device syzkaller0 entered promiscuous mode [ 201.184463][ T5844] device syzkaller0 entered promiscuous mode [ 202.706291][ T5904] device syzkaller0 entered promiscuous mode [ 203.914963][ T5934] device syzkaller0 entered promiscuous mode [ 204.655123][ T5949] device syzkaller0 entered promiscuous mode [ 205.516180][ T5983] device syzkaller0 entered promiscuous mode [ 206.108683][ T5994] device syzkaller0 entered promiscuous mode [ 206.621411][ T6002] device syzkaller0 entered promiscuous mode [ 207.474309][ T6025] device syzkaller0 entered promiscuous mode [ 207.953927][ T6035] device syzkaller0 entered promiscuous mode [ 209.373359][ T6055] device syzkaller0 entered promiscuous mode [ 210.576539][ T6106] device syzkaller0 entered promiscuous mode [ 211.131468][ T6125] device syzkaller0 entered promiscuous mode [ 211.538511][ T6147] device syzkaller0 entered promiscuous mode [ 211.696377][ T6147] syzkaller0: create flow: hash 2756367185 index 2 [ 211.735799][ T6143] syzkaller0: delete flow: hash 2756367185 index 2 [ 211.782010][ T6153] device syzkaller0 entered promiscuous mode [ 212.768022][ T6169] device syzkaller0 entered promiscuous mode [ 213.207097][ T6185] device syzkaller0 entered promiscuous mode [ 213.294470][ T6185] syzkaller0: create flow: hash 2756367185 index 2 [ 213.340678][ T6190] device syzkaller0 entered promiscuous mode [ 213.367164][ T6184] syzkaller0: delete flow: hash 2756367185 index 2 [ 214.055670][ T6218] device syzkaller0 entered promiscuous mode [ 214.406889][ T6231] device syzkaller0 entered promiscuous mode [ 214.451692][ T6231] syzkaller0: create flow: hash 2756367185 index 2 [ 214.522823][ T6230] syzkaller0: delete flow: hash 2756367185 index 2 [ 218.661232][ T6361] device syzkaller0 entered promiscuous mode [ 219.042671][ T6376] device syzkaller0 entered promiscuous mode [ 220.089900][ T6406] device syzkaller0 entered promiscuous mode [ 220.233778][ T6409] device syzkaller0 entered promiscuous mode [ 220.735246][ T6438] device syzkaller0 entered promiscuous mode [ 221.950853][ T6459] device syzkaller0 entered promiscuous mode [ 222.147659][ T6468] device syzkaller0 entered promiscuous mode [ 222.251030][ T6474] device syzkaller0 entered promiscuous mode [ 222.611835][ T6491] device syzkaller0 entered promiscuous mode [ 223.943468][ T6513] device syzkaller0 entered promiscuous mode [ 224.241272][ T6547] device syzkaller0 entered promiscuous mode [ 224.651496][ T6570] device syzkaller0 entered promiscuous mode [ 224.865050][ T6575] device syzkaller0 entered promiscuous mode [ 225.258529][ T6587] device syzkaller0 entered promiscuous mode [ 225.829444][ T6604] device syzkaller0 entered promiscuous mode [ 226.970491][ T6649] device syzkaller0 entered promiscuous mode [ 226.989721][ T6655] device syzkaller0 entered promiscuous mode [ 230.081855][ T6750] device syzkaller0 entered promiscuous mode [ 231.414836][ T6778] device syzkaller0 entered promiscuous mode [ 231.596477][ T6806] device syzkaller0 entered promiscuous mode [ 232.233118][ T6812] device syzkaller0 entered promiscuous mode [ 233.515261][ T6856] device syzkaller0 entered promiscuous mode [ 233.627643][ T6859] syzkaller0: create flow: hash 2417902864 index 2 [ 233.681220][ T6855] syzkaller0: delete flow: hash 2417902864 index 2 [ 234.099116][ T6861] device syzkaller0 entered promiscuous mode [ 234.160024][ T6873] device syzkaller0 entered promiscuous mode [ 234.263302][ T6884] device syzkaller0 entered promiscuous mode [ 234.679256][ T6901] device syzkaller0 entered promiscuous mode [ 234.799832][ T6904] syzkaller0: create flow: hash 2417902864 index 2 [ 234.888502][ T6900] syzkaller0: delete flow: hash 2417902864 index 2 [ 235.335154][ T6915] device syzkaller0 entered promiscuous mode [ 236.062205][ T6930] device syzkaller0 entered promiscuous mode [ 236.358368][ T6942] device syzkaller0 entered promiscuous mode [ 236.593458][ T6946] device syzkaller0 entered promiscuous mode [ 236.789817][ T6960] device syzkaller0 entered promiscuous mode [ 237.226539][ T6971] device syzkaller0 entered promiscuous mode [ 237.720101][ T6985] device syzkaller0 entered promiscuous mode [ 238.001691][ T6995] device syzkaller0 entered promiscuous mode [ 238.388134][ T7008] device syzkaller0 entered promiscuous mode [ 238.998335][ T7021] device syzkaller0 entered promiscuous mode [ 239.049947][ T7034] device syzkaller0 entered promiscuous mode [ 239.111340][ T7036] device syzkaller0 entered promiscuous mode [ 239.334486][ T7046] device syzkaller0 entered promiscuous mode [ 239.700941][ T7067] device syzkaller0 entered promiscuous mode [ 240.177712][ T7087] device syzkaller0 entered promiscuous mode [ 240.199170][ T7088] device syzkaller0 entered promiscuous mode [ 240.753076][ T7113] device syzkaller0 entered promiscuous mode [ 241.268018][ T7129] device syzkaller0 entered promiscuous mode [ 241.678145][ T7157] device syzkaller0 entered promiscuous mode [ 242.614818][ T7187] device syzkaller0 entered promiscuous mode [ 242.854242][ T7199] device syzkaller0 entered promiscuous mode [ 247.147500][ T7279] device syzkaller0 entered promiscuous mode [ 247.162522][ T7280] device syzkaller0 entered promiscuous mode [ 248.119778][ T7302] device syzkaller0 entered promiscuous mode [ 248.707005][ T7313] device syzkaller0 entered promiscuous mode [ 248.929058][ T7322] device syzkaller0 entered promiscuous mode [ 252.734893][ T7447] device syzkaller0 entered promiscuous mode [ 252.978386][ T7450] device syzkaller0 entered promiscuous mode [ 252.993799][ T60] syzkaller0: tun_net_xmit 48 [ 254.452830][ T7514] device syzkaller0 entered promiscuous mode [ 255.401045][ T7538] device syzkaller0 entered promiscuous mode [ 255.808305][ T7552] device syzkaller0 entered promiscuous mode [ 255.960663][ T7560] device syzkaller0 entered promiscuous mode [ 257.170502][ T7597] device syzkaller0 entered promiscuous mode [ 257.602324][ T7610] device syzkaller0 entered promiscuous mode [ 258.256778][ T7639] device syzkaller0 entered promiscuous mode [ 258.532822][ T7652] device syzkaller0 entered promiscuous mode [ 258.805085][ T7661] device syzkaller0 entered promiscuous mode [ 259.446785][ T7689] device syzkaller0 entered promiscuous mode [ 259.533271][ T7691] device syzkaller0 entered promiscuous mode [ 261.124139][ T7754] device syzkaller0 entered promiscuous mode [ 263.122256][ T7790] device syzkaller0 entered promiscuous mode [ 264.723829][ T7841] device syzkaller0 entered promiscuous mode [ 266.031640][ T7899] device syzkaller0 entered promiscuous mode [ 266.337865][ T7907] device syzkaller0 entered promiscuous mode [ 267.358237][ T7947] device syzkaller0 entered promiscuous mode [ 267.379702][ T7946] device syzkaller0 entered promiscuous mode [ 267.991965][ T7962] device syzkaller0 entered promiscuous mode [ 268.101771][ T7968] device syzkaller0 entered promiscuous mode [ 268.850601][ T7986] device syzkaller0 entered promiscuous mode [ 269.846252][ T8024] device syzkaller0 entered promiscuous mode [ 269.960283][ T8027] device syzkaller0 entered promiscuous mode [ 272.292571][ T8063] device syzkaller0 entered promiscuous mode [ 273.115490][ T8089] device syzkaller0 entered promiscuous mode [ 273.676383][ T8102] device syzkaller0 entered promiscuous mode [ 274.587436][ T8123] device syzkaller0 entered promiscuous mode [ 276.079967][ T8145] device syzkaller0 entered promiscuous mode [ 276.843754][ T8156] device syzkaller0 entered promiscuous mode [ 277.664869][ T8175] device syzkaller0 entered promiscuous mode [ 278.074001][ T8178] device syzkaller0 entered promiscuous mode [ 278.607883][ T8188] device syzkaller0 entered promiscuous mode [ 278.918496][ T8208] device syzkaller0 entered promiscuous mode [ 280.616271][ T8250] device syzkaller0 entered promiscuous mode [ 280.883848][ T8256] device syzkaller0 entered promiscuous mode [ 281.199051][ T8261] device syzkaller0 entered promiscuous mode [ 282.508022][ T8299] device syzkaller0 entered promiscuous mode [ 283.460152][ T8332] device syzkaller0 entered promiscuous mode [ 285.035556][ T8397] device syzkaller0 entered promiscuous mode [ 285.058066][ T8400] device syzkaller0 entered promiscuous mode [ 285.501241][ T8411] device syzkaller0 entered promiscuous mode [ 287.018735][ T8443] device syzkaller0 entered promiscuous mode [ 287.093794][ T8448] device syzkaller0 entered promiscuous mode [ 287.239508][ T8453] device syzkaller0 entered promiscuous mode [ 287.895968][ T8467] device syzkaller0 entered promiscuous mode [ 288.114461][ T8491] device syzkaller0 entered promiscuous mode [ 288.314956][ T8495] device syzkaller0 entered promiscuous mode [ 289.407180][ T8533] device syzkaller0 entered promiscuous mode [ 289.728602][ T8543] device syzkaller0 entered promiscuous mode [ 291.117046][ T8586] device syzkaller0 entered promiscuous mode [ 292.920277][ T8644] device syzkaller0 entered promiscuous mode [ 293.580047][ T8651] device syzkaller0 entered promiscuous mode [ 295.442828][ T8714] device syzkaller0 entered promiscuous mode [ 295.659952][ T8725] device syzkaller0 entered promiscuous mode [ 296.878193][ T8758] device syzkaller0 entered promiscuous mode [ 297.211018][ T8771] device syzkaller0 entered promiscuous mode [ 297.368659][ T8772] device syzkaller0 entered promiscuous mode [ 299.201046][ T8811] device syzkaller0 entered promiscuous mode [ 299.725652][ T8817] device syzkaller0 entered promiscuous mode [ 300.209562][ T8814] device syzkaller0 entered promiscuous mode [ 303.339556][ T8909] device syzkaller0 entered promiscuous mode [ 308.060748][ T9005] device syzkaller0 entered promiscuous mode [ 309.470033][ T9057] device syzkaller0 entered promiscuous mode [ 311.967888][ T9131] device syzkaller0 entered promiscuous mode [ 314.201626][ T9194] device syzkaller0 entered promiscuous mode [ 316.353745][ T9246] device syzkaller0 entered promiscuous mode [ 317.401239][ T9280] device syzkaller0 entered promiscuous mode [ 319.160122][ T9333] device syzkaller0 entered promiscuous mode [ 319.912453][ T9360] device syzkaller0 entered promiscuous mode [ 320.291078][ T9376] device syzkaller0 entered promiscuous mode [ 320.659186][ T9389] device syzkaller0 entered promiscuous mode [ 321.932467][ T9403] device syzkaller0 entered promiscuous mode [ 322.516905][ T9421] device syzkaller0 entered promiscuous mode [ 324.448244][ T9487] device syzkaller0 entered promiscuous mode [ 326.298211][ T9525] device syzkaller0 entered promiscuous mode [ 327.556359][ T9566] device syzkaller0 entered promiscuous mode [ 328.249668][ T9575] device syzkaller0 entered promiscuous mode [ 328.628005][ T9584] device syzkaller0 entered promiscuous mode [ 328.916614][ T9594] device syzkaller0 entered promiscuous mode [ 330.299482][ T9631] device syzkaller0 entered promiscuous mode [ 330.601733][ T9641] device syzkaller0 entered promiscuous mode [ 331.277140][ T9663] device syzkaller0 entered promiscuous mode [ 331.946601][ T9686] device syzkaller0 entered promiscuous mode [ 332.968134][ T9713] device syzkaller0 entered promiscuous mode [ 333.784944][ T9732] device syzkaller0 entered promiscuous mode [ 334.789827][ T9752] device syzkaller0 entered promiscuous mode [ 335.209045][ T9759] device syzkaller0 entered promiscuous mode [ 335.950763][ T9771] device syzkaller0 entered promiscuous mode [ 336.463396][ T9785] device syzkaller0 entered promiscuous mode [ 340.415379][ T9905] device syzkaller0 entered promiscuous mode [ 341.479264][ T9922] device syzkaller0 entered promiscuous mode [ 343.632211][ T9976] device syzkaller0 entered promiscuous mode [ 344.955277][T10008] device syzkaller0 entered promiscuous mode [ 345.211353][T10019] device syzkaller0 entered promiscuous mode [ 345.332336][T10025] device syzkaller0 entered promiscuous mode [ 345.749994][T10031] device syzkaller0 entered promiscuous mode [ 346.013801][T10041] device syzkaller0 entered promiscuous mode [ 346.702519][T10059] device syzkaller0 entered promiscuous mode [ 347.482216][T10076] device syzkaller0 entered promiscuous mode [ 348.487428][T10107] device syzkaller0 entered promiscuous mode [ 348.982052][T10121] device syzkaller0 entered promiscuous mode [ 351.698972][T10193] device syzkaller0 entered promiscuous mode [ 352.854528][T10221] device syzkaller0 entered promiscuous mode [ 353.218862][T10232] device syzkaller0 entered promiscuous mode [ 353.678202][T10235] device syzkaller0 entered promiscuous mode [ 355.197594][T10284] device syzkaller0 entered promiscuous mode [ 355.589473][T10301] device syzkaller0 entered promiscuous mode [ 356.045114][T10315] device syzkaller0 entered promiscuous mode [ 356.408554][T10325] device syzkaller0 entered promiscuous mode [ 356.904376][T10331] device syzkaller0 entered promiscuous mode [ 357.224856][T10337] device syzkaller0 entered promiscuous mode [ 357.794216][T10359] device syzkaller0 entered promiscuous mode [ 357.933964][T10355] device syzkaller0 entered promiscuous mode [ 360.015712][T10410] device syzkaller0 entered promiscuous mode [ 360.053179][T10418] device syzkaller0 entered promiscuous mode [ 360.539644][T10446] device syzkaller0 entered promiscuous mode [ 362.584445][T10513] device syzkaller0 entered promiscuous mode [ 363.601685][T10526] device syzkaller0 entered promiscuous mode [ 364.232332][T10553] device syzkaller0 entered promiscuous mode [ 364.273010][T10554] device syzkaller0 entered promiscuous mode [ 364.589665][T10571] device syzkaller0 entered promiscuous mode [ 365.567503][T10603] device syzkaller0 entered promiscuous mode [ 365.634574][T10605] device syzkaller0 entered promiscuous mode [ 366.685991][T10644] device syzkaller0 entered promiscuous mode [ 369.051450][T10708] device syzkaller0 entered promiscuous mode [ 369.387012][T10718] device syzkaller0 entered promiscuous mode [ 371.198172][T10766] device syzkaller0 entered promiscuous mode [ 374.116329][T10832] device syzkaller0 entered promiscuous mode [ 378.222747][T10932] device syzkaller0 entered promiscuous mode [ 380.389946][T10975] device syzkaller0 entered promiscuous mode [ 381.940824][T11005] device syzkaller0 entered promiscuous mode [ 382.370755][T11014] device syzkaller0 entered promiscuous mode [ 384.082076][T11054] device syzkaller0 entered promiscuous mode [ 388.420062][T11195] device syzkaller0 entered promiscuous mode [ 389.587825][T11234] device syzkaller0 entered promiscuous mode [ 389.883057][T11242] device syzkaller0 entered promiscuous mode [ 390.127856][T11246] device syzkaller0 entered promiscuous mode [ 390.169289][T11249] device syzkaller0 entered promiscuous mode [ 391.208415][T11286] device syzkaller0 entered promiscuous mode [ 391.475693][T11303] device syzkaller0 entered promiscuous mode [ 396.179002][T11425] device syzkaller0 entered promiscuous mode [ 398.337208][T11482] device syzkaller0 entered promiscuous mode [ 399.242187][T11498] device syzkaller0 entered promiscuous mode [ 403.268254][T11573] device syzkaller0 entered promiscuous mode [ 406.726482][T11655] device syzkaller0 entered promiscuous mode [ 406.791076][T11659] device syzkaller0 entered promiscuous mode [ 414.869647][T11857] device syzkaller0 entered promiscuous mode [ 418.237931][T11954] device syzkaller0 entered promiscuous mode [ 425.243670][T12203] device syzkaller0 entered promiscuous mode [ 425.564291][T12224] device syzkaller0 entered promiscuous mode [ 426.370704][T12254] device syzkaller0 entered promiscuous mode [ 427.743237][T12299] device syzkaller0 entered promiscuous mode [ 433.324625][ T30] audit: type=1400 audit(1773736343.111:131): avc: denied { read } for pid=12455 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 434.206583][ T30] audit: type=1400 audit(1773736343.991:132): avc: denied { search } for pid=12494 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 434.882458][ T30] audit: type=1400 audit(1773736344.671:133): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 434.986850][ T30] audit: type=1400 audit(1773736344.671:134): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.051246][ T30] audit: type=1400 audit(1773736344.671:135): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptables: [ 435.117765][ T30] audit: type=1400 audit(1773736344.731:136): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping system message bus: [ 435.249451][ T30] audit: type=1400 audit(1773736344.981:137): avc: denied { search } for pid=12519 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.311438][ T30] audit: type=1400 audit(1773736344.981:138): avc: denied { write } for pid=12519 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.353977][ T30] audit: type=1400 audit(1773736344.981:139): avc: denied { add_name } for pid=12519 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.457097][ T30] audit: type=1400 audit(1773736344.981:140): avc: denied { create } for pid=12519 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done killall: can't kill pid 1860: No such process killall: can't kill pid 2769: No such process Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: can't remount debugfs read-only Connection to 10.128.0.106 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read[ 438.632462][ T284] syz-executor (284) used greatest stack depth: 21344 bytes left Sent SIGKILL to all processes Requesting system poweroff [ 440.193027][ T313] GPL: port 1(erspan0) entered disabled state [ 440.201443][ T313] device erspan0 left promiscuous mode [ 440.207002][ T313] GPL: port 1(erspan0) entered disabled state [ 440.214493][ T313] device erspan0 left promiscuous mode [ 440.220049][ T313] GPL: port 1(erspan0) entered disabled state [ 440.227773][ T313] device erspan0 left promiscuous mode [ 440.233482][ T313] GPL: port 1(erspan0) entered disabled state [ 440.420956][T12591] kvm: exiting hardware virtualization [ 440.427564][T12591] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 440.434876][T12591] ACPI: PM: Preparing to enter system sleep state S5 [ 440.441904][T12591] reboot: Power down serialport: VM disconnected.