last executing test programs: 4.966608563s ago: executing program 0 (id=788): bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000012850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000002a000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x96, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x2c, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x5, 0x1}]}, {0x0, [0x2e, 0x30, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000780)=""/4096, 0x2f, 0x1000, 0x1, 0x800}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001840)={0x6, 0x20, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x72}, @jmp={0x5, 0x0, 0x0, 0x3, 0x8, 0x20, 0xb}, @jmp={0x5, 0x0, 0x1, 0x2, 0x7, 0x2, 0x13}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x1, 0x3, 0x6, 0x7, 0x8, 0xfffffffffffffff0, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xb, 0xf7, &(0x7f0000000540)=""/247, 0x41100, 0x5, '\x00', r1, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000017c0)={0x0, 0x0, 0x2, 0x93cd}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001800)=[{0x3, 0x4, 0xf, 0xb}, {0x5, 0x5, 0xa, 0x8}], 0x10, 0xddda}, 0x94) close(0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x1104, 0x0, 0xfffffffd, 0x3, 0x1000, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000005c0)=""/227, 0xe3}], 0x1}, 0x40000001) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x19, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001900)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r1, r2, 0x5, 0x2}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x4, 0x4, 0x1}, 0x50) r7 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r6, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f00000004c0)=r7}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001980)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x11, 0x17, &(0x7f00000019c0)=@raw=[@map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @alu={0x0, 0x0, 0xa, 0x0, 0x9, 0xc, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x4}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}], &(0x7f0000001a80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x3, 0xc, 0x4, 0xcc}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001b40)=[r5], &(0x7f0000001b80)=[{0x1, 0x3, 0xa, 0xb}, {0x5, 0x5, 0x1, 0x8}, {0x0, 0x5, 0xe, 0xb}, {0x1, 0x1, 0xb, 0x2}, {0x0, 0x1, 0x4, 0x1}], 0x10, 0x7}, 0x94) close(0x3) 3.932154746s ago: executing program 0 (id=803): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000400000002000000000000110300000000050000000000000100000d030000000000000000000000020000000000000c02000000000061"], 0x0, 0x4c}, 0x28) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 3.351493634s ago: executing program 0 (id=812): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[@cred={{0x1c}}], 0x15}, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)}, 0x1f00) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xfffffd26) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x0, &(0x7f0000000300), 0x0, 0x2, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x5a, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000a40), &(0x7f0000000a80), 0x10, 0x2}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x408, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r3}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1b, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) sendmsg$inet(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 2.493685612s ago: executing program 0 (id=815): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @private=0xa010102}, 0x0, 0x4, 0x0, 0x3}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000540)="35d430040c55fee24f174ad48e8d46d1417f37815d10bc88c53e63ae06c87994b9ab1cc868e432db125ebcc228e39eeb4d6e78c8907187d69ddd04da89155a4237173a319f5d7e4e707f7e2fbf506fe45565eefdb606e2b45809c218711ec09eadea73ee3f0167fa23af0d4b", 0x6c}, {&(0x7f00000005c0)="e64d8e7c18def5f640f1c9fbc6c183a98632fc93e07506df6b170f775600e023380ffd29cf4a71153a6434ad7b11413289090d3733d3cac2439490e772e5fbf4fb8d466e982f2ab42dbbe493bfeaa536d35d1d6a035853908458709325b7", 0x5e}, {&(0x7f0000000640)="f87a182d40699bc54f7808ef7ef8907bbca05b90fb436b2a15d3682fa3c01cc891f7f9b92017096e5d950b9a8e7d22a25ba91d5380bed99cad05b9de0f9f54bc2b59b5ee28366656db3c6e6e451ff85007702adbb5c7614a99728e25f55fe1f6c92751a28426a84f2dfb72228da2be6cadd715b5ddc11ab7c8b9b8666b808f22248ade11a55d4971dc16f0bb3b5332015ce9227ec5936b10925ae327f317c896376bcf96f91741c86964b9cf0b3cd81b6b3f589bacebe1c2df9a18934f48a3", 0xbf}, {&(0x7f0000000a80)="ed7866870baab3140f5c20930372ec7290a170e07a40b618be8f04a23bf9918160f83b45c13a02b6c4ed5cabb1215fc5db9d98e9dd642083739a01116b53674d059b7271e64d30ecb74d5d2dab236bef263012b9f59e80aff6f411896be57bfe79935283bc2a57ae5dff4c13565cec5a9bda9490c8463f23142231a16575bb2e03eb4d25f05e4c65916335444f986e39a4b48a86", 0x94}, {&(0x7f00000004c0)="f0b10afdcbe9962dbd36ce4bac2bf2225231ca25f79b1e0f4dc2ba1acda0f2863b219ff9b6e305d3c80f3614fbc7bb78db72", 0x32}, {&(0x7f0000000700)="ecc4f7548feb67a340988926", 0xc}, {&(0x7f0000000b40)="81247380936b808e821c304ef608eaf06dab81415334387b2bf254272627e2b2aa282689e407e90d33c17fa0e375a1a8a98bdb62c3c58dd6e5d67c293143cead8f7858d7db7047a7", 0x48}, {&(0x7f0000000c40)="4a78312fadc541e9e4056fa0faa240e4ea100115ebba92ffafdcdeba938e2ace2d1b49341eaa979e4ffa2d7aa151ddfe5ca742b72d8066bb2095be71a227f359d22e2a0736441374f3b2314c5e15c750ba3e2043fa410fe4a35af3cb0448bd832ad3e3fec76874c39325315b3fdda948cedf8a48ac240448138667e51d254b82713be02f038e47a537894d3111b7d741c58a82d58b42c02d150806e3d1243bfd8892d5af1d1b583eaef11c8ff5ee9874c032b98180e5c9181dac43b721cef91bd4f7942f9f40d22ce3aa6e2047f0cdb5a2dd", 0xd2}, {&(0x7f0000000d40)="d16375a993f6b85e247b20509948b5857116d5fe9e9ae5ab27eb8939584ae02138ccaf6541d46beb1f57b2921aec7f21df90d442fa5935da1263282d2e9f2546", 0x40}, {&(0x7f0000000dc0)="a4df0d52c4d5fe3e08778ba57451096946af997dc2f621323d739402adfc90126c04624b31f2532eb1362f511d68a97290bd2faa723ea5f554ab6d921f50c9077f2c7cefac626eaa7f", 0x49}], 0xa, &(0x7f0000000f00)=[@mark={{0x14, 0x1, 0x24, 0xfffffffa}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffc}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @txtime={{0x18, 0x1, 0x3d, 0x3ec}}], 0xa8}, 0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x4, 0x0, 0x7fff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYRES8=r2, @ANYBLOB="f072c26c849486ff16015b7139416b6876e99e0dd5afe073e36464ab39dbed0efcc304f42c3c0e2bb7e0d97c9a3400f1f79dcc88ed1794aa918692070000000000000045f185c0b7261a7047ab4e0a08468bd86ebf66f4e75842089d58e4f7cb497ad92925c1563ab2f2c38aca2e9ef8de82e7efb221a4bf6af4ec5b22aa64f4a60fd3043bd90895173781ab124a89398b1adfb0dbf951d38c8ea7d10bd73e1362f5aa248881773c5a68db136705f5aa5aa1926d95fa5d6f6636cce26776d5fe7ab67c1e9b6d0f66840fdaba9dca9d79e7f8c542077c7de7e4311e954e0a9a7c6fc54624399e0d0000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) 2.271929269s ago: executing program 0 (id=821): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0xffffff7f}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@generic={&(0x7f0000000780)='./file0\x00'}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x1e, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r2, @ANYRES32=r0, @ANYBLOB="00000000476c0594b70500000800000000b7080000000000007b8af8ff00000000b70800007f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x7, 0x80000000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000800)=[r3, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, r4], 0x0, 0x10, 0x6}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000740)=r5) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/244) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="850000002e000000630a00000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000c6d304f96e3cd3b3cf44"], &(0x7f0000000480)='syzkaller\x00', 0x5, 0x99, &(0x7f0000000180)=""/153, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x8, 0x0, 0x8a}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x4802, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x101) 2.116882904s ago: executing program 2 (id=826): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x7, 0x200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6, 0x9}, 0x14044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x34120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x7ff}, 0x8386}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000030000000500000007000000c1000000", @ANYRES32, @ANYBLOB="af0e000000000000000004000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x3f, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r3}, 0x38) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f00000001c0)=""/257, 0x0, 0x101, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f00000000c0), &(0x7f0000000180)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000200)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000030e8d5000000010000001400000500242c100806d320d98a61a90021", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r6) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r7) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xf, &(0x7f0000000840)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x8ab0, 0x0, 0x0, 0x0, 0xed173f4e7327606, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 1.884468141s ago: executing program 2 (id=828): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1394", 0x2}], 0x1}, 0x4051) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000001280), 0x4) (async) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) (async) sendmsg$inet(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000012c0)="f9", 0x1}], 0x1}, 0x48844) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$ITER_CREATE(0xb, &(0x7f00000002c0), 0x8) 1.785719434s ago: executing program 2 (id=829): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x8f, &(0x7f0000000440)=""/143, 0x41000, 0x20}, 0x94) 1.715372436s ago: executing program 2 (id=830): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYRESDEC=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe, 0x0, &(0x7f0000000600)="3d25ff005b19c4cbe601709b0813", 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.654807418s ago: executing program 2 (id=831): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @private=0xa010102}, 0x0, 0x4, 0x0, 0x3}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000540)="35d430040c55fee24f174ad48e8d46d1417f37815d10bc88c53e63ae06c87994b9ab1cc868e432db125ebcc228e39eeb4d6e78c8907187d69ddd04da89155a4237173a319f5d7e4e707f7e2fbf506fe45565eefdb606e2b45809c218711ec09eadea73ee3f0167fa23af0d4b", 0x6c}, {&(0x7f00000005c0)="e64d8e7c18def5f640f1c9fbc6c183a98632fc93e07506df6b170f775600e023380ffd29cf4a71153a6434ad7b11413289090d3733d3cac2439490e772e5fbf4fb8d466e982f2ab42dbbe493bfeaa536d35d1d6a035853908458709325b7", 0x5e}, {&(0x7f0000000640)="f87a182d40699bc54f7808ef7ef8907bbca05b90fb436b2a15d3682fa3c01cc891f7f9b92017096e5d950b9a8e7d22a25ba91d5380bed99cad05b9de0f9f54bc2b59b5ee28366656db3c6e6e451ff85007702adbb5c7614a99728e25f55fe1f6c92751a28426a84f2dfb72228da2be6cadd715b5ddc11ab7c8b9b8666b808f22248ade11a55d4971dc16f0bb3b5332015ce9227ec5936b10925ae327f317c896376bcf96f91741c86964b9cf0b3cd81b6b3f589bacebe1c2df9a18934f48a3", 0xbf}, {&(0x7f0000000a80)="ed7866870baab3140f5c20930372ec7290a170e07a40b618be8f04a23bf9918160f83b45c13a02b6c4ed5cabb1215fc5db9d98e9dd642083739a01116b53674d059b7271e64d30ecb74d5d2dab236bef263012b9f59e80aff6f411896be57bfe79935283bc2a57ae5dff4c13565cec5a9bda9490c8463f23142231a16575bb2e03eb4d25f05e4c65916335444f986e39a4b48a86", 0x94}, {&(0x7f00000004c0)="f0b10afdcbe9962dbd36ce4bac2bf2225231ca25f79b1e0f4dc2ba1acda0f2863b219ff9b6e305d3c80f3614fbc7bb78db72", 0x32}, {&(0x7f0000000700)="ecc4f7548feb67a340988926", 0xc}, {&(0x7f0000000b40)="81247380936b808e821c304ef608eaf06dab81415334387b2bf254272627e2b2aa282689e407e90d33c17fa0e375a1a8a98bdb62c3c58dd6e5d67c293143cead8f7858d7db7047a7", 0x48}, {&(0x7f0000000c40)="4a78312fadc541e9e4056fa0faa240e4ea100115ebba92ffafdcdeba938e2ace2d1b49341eaa979e4ffa2d7aa151ddfe5ca742b72d8066bb2095be71a227f359d22e2a0736441374f3b2314c5e15c750ba3e2043fa410fe4a35af3cb0448bd832ad3e3fec76874c39325315b3fdda948cedf8a48ac240448138667e51d254b82713be02f038e47a537894d3111b7d741c58a82d58b42c02d150806e3d1243bfd8892d5af1d1b583eaef11c8ff5ee9874c032b98180e5c9181dac43b721cef91bd4f7942f9f40d22ce3aa6e2047f0cdb5a2dd", 0xd2}, {&(0x7f0000000d40)="d16375a993f6b85e247b20509948b5857116d5fe9e9ae5ab27eb8939584ae02138ccaf6541d46beb1f57b2921aec7f21df90d442fa5935da1263282d2e9f2546", 0x40}, {&(0x7f0000000dc0)="a4df0d52c4d5fe3e08778ba57451096946af997dc2f621323d739402adfc90126c04624b31f2532eb1362f511d68a97290bd2faa723ea5f554ab6d921f50c9077f2c7cefac626eaa7f", 0x49}], 0xa, &(0x7f0000000f00)=[@mark={{0x14, 0x1, 0x24, 0xfffffffa}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffc}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @txtime={{0x18, 0x1, 0x3d, 0x3ec}}], 0xa8}, 0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x4, 0x0, 0x7fff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYRES8=r2, @ANYBLOB="f072c26c849486ff16015b7139416b6876e99e0dd5afe073e36464ab39dbed0efcc304f42c3c0e2bb7e0d97c9a3400f1f79dcc88ed1794aa918692070000000000000045f185c0b7261a7047ab4e0a08468bd86ebf66f4e75842089d58e4f7cb497ad92925c1563ab2f2c38aca2e9ef8de82e7efb221a4bf6af4ec5b22aa64f4a60fd3043bd90895173781ab124a89398b1adfb0dbf951d38c8ea7d10bd73e1362f5aa248881773c5a68db136705f5aa5aa1926d95fa5d6f6636cce26776d5fe7ab67c1e9b6d0f66840fdaba9dca9d79e7f8c542077c7de7e4311e954e0a9a7c6fc54624399e0d0000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) 1.654006549s ago: executing program 1 (id=833): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000000000000000000000008500000061000000850000007d00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffff84) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f0000000700)=""/228, 0xe4, 0x0, &(0x7f0000000600)=""/172, 0xac}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0xfe, &(0x7f00000004c0)=""/254, 0x41100, 0x10, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x5, 0x10, 0x1}, 0x10, r3, 0x0, 0x7, 0x0, &(0x7f0000000880)=[{0x1, 0x4, 0x0, 0xa}, {0x4, 0x5, 0xb}, {0x5, 0x5, 0x4, 0xa}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x1, 0xa, 0x5}, {0x4, 0x1, 0xb, 0xc}, {0x0, 0x2, 0x3, 0x2}], 0x10, 0x1}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r1, 0x0, 0x0}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xa, 0x1, 0x6, 0xb}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f00000006c0)="e0274239060000009774992f0800", 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.511868933s ago: executing program 1 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x2, [@enum64={0x8, 0x7, 0x0, 0x13, 0x0, 0x4, [{0x9, 0x7fff, 0x3}, {0xf, 0x10}, {0xb, 0x6, 0xffffffa8}, {0x9, 0x1, 0x8df}, {0xd, 0x1, 0x81}, {0x7, 0x3, 0x8}, {0x6, 0x8, 0x4}]}]}}, &(0x7f0000000900)=""/252, 0x7a, 0xfc, 0x1}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x8, &(0x7f0000000140)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8c}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.495936623s ago: executing program 1 (id=836): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x12, 0x3, 0x4, 0x80000002}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETVNETLE(r2, 0xc0189436, &(0x7f0000001200)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r3, 0x0, 0xe, 0x0, &(0x7f0000000640)="0cffffdf71c8afefeba000dee560", 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ad00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x13, 0x8, 0x8}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000240), 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$ITER_CREATE(0xb, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000540)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r7, @ANYBLOB="0000000000000000db00000000000000180000000000000000000000000000009500000000000000d50a00000000000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x92, &(0x7f00000005c0)=""/146, 0x40f00, 0x4f, '\x00', r5, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700), &(0x7f0000000740)=[{0x3, 0x5, 0xa, 0xb}], 0x10, 0x6}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x20, 0x4, 0x9, 0x5, 0x2, r9, 0x3e, '\x00', r5, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x25, &(0x7f0000000840)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x0, 0x3, 0x3, 0xa, 0xa, 0x10, 0x4}], &(0x7f0000000980)='GPL\x00', 0x10, 0x0, 0x0, 0x41000, 0x2, '\x00', r5, 0x25, r9, 0x8, &(0x7f00000009c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000a80)=[r9, r7, r6, r6, r10], &(0x7f0000000ac0)=[{0x0, 0x2, 0xf, 0xa}, {0x5, 0x5, 0x4, 0x3}, {0x3, 0x2, 0x9, 0x4}, {0x4, 0x5, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x4}, {0x2, 0x3, 0x8, 0x3}, {0x1, 0x4, 0x0, 0x2}], 0x10, 0x2}, 0x94) write$cgroup_subtree(r9, &(0x7f0000000000), 0xe) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x9, 0x8, 0xc, 0x0, 0x1}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r11, &(0x7f0000000080)}, 0x20) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x18}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c80)={{r0}, &(0x7f0000000c00), &(0x7f0000000c40)='%ps \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x16, &(0x7f0000000240)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0xe, 0x1, 0x0, r0}, @map_fd={0x18, 0x6, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', r5, 0x0, r9, 0x8, &(0x7f0000000300)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x6, 0x8, 0x80000001}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000003c0)=[r0, r0, r12, r0, r0, r0, r0], &(0x7f0000000400)=[{0x3, 0x3, 0x1}, {0x1, 0x1, 0x10, 0x4}, {0x3, 0x2, 0xf, 0xc}, {0x5, 0x4, 0x10, 0x9}, {0x0, 0x1, 0xd, 0xc}, {0x4, 0x1, 0x6, 0xb}, {0x5, 0x4, 0x7}, {0x4, 0x2, 0xf, 0x5}, {0x0, 0x2, 0x0, 0xb}], 0x10, 0x3991}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) 1.485602944s ago: executing program 2 (id=837): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x1830200, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)=ANY=[], 0x7) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x8}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xb, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 1.325696818s ago: executing program 0 (id=838): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x7606, 0x3ff, 0x80000000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10068880, &(0x7f0000000100)="d5140599090440a6d23adef57903b3f090e0b5038915faf42f5ee791893f4c0c769dba075bd526d7f9f0538015367c053e0b6323cd9f05a1328871df561958d38500836a73ee2349e0ff", 0x4a, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="9f9cc0c04a04a84fd254eb6a723106f86a195505739509055619b8661809ceddf824db630d480e3b725187acd6f5625da24ded8a22234c31f36d8977925328ab053df3123d2c5cdcb76882815e2b6f9375e6ec88ab9a562f6db89642623ffc1d3edd9fdf04246a953b455a9cda9bb3cc3eb9c67fc8c47857e10da351263bf15cde3852b7f84a3bea7633ccaec1a643c73722bf557827a2f273852123797e7b83b66e1f6b8f64e5c403059c176ddc5369bf93b97b6d8c5f8bac1ffe8bd2068b4b9322b16d4246d04b4d94d22ce83a253b3728012ab9adf8dc69916410d8dbd644ed9ce65a404f28e99aa93bcc988124b0b052888591e93420") getpid() r0 = syz_clone(0x10000000, &(0x7f00000000c0)="e3b567b8e9b013b628a7b9234ad54c36e1513cd5a850aee7ecb7ae4cc8eacd8658e4bd8a0a299266202dd03067496271c062378b87b88872af992f5ab4a8523f77a64a831d798026a5058a790bb13874aa1ff56713c4c4c236351fea15c6c2ea5146fc76040822f7dd143c253a1203fb6319cd5e3fe19fd2134f", 0x7a, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000540)="b736dc26734868b09a047fe76db458f4aa2b40cd3ad1b0fd1c30a0e6f30327d2768744e6860a25eb4f952be7ed4c175415f4b46a9f08764bf613e7f7f95999d3804a0787232d374e230d3e66a21620948e9bac9f4dc7a7d5e7584e24eaeba7973a1cc7e142ecfedbbb4fe3f4049c873e00d6") perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x3, 0x4, 0xf, 0x10, 0x0, 0x8, 0x140a1, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x1, @perf_bp={&(0x7f0000000400), 0x2}, 0x484, 0x2000000081, 0x59, 0x3, 0x0, 0x2, 0xfff9, 0x0, 0xe, 0x0, 0x4}, r0, 0x3, 0xffffffffffffffff, 0xa) syz_open_procfs$namespace(r0, 0xfffffffffffffffc) (async) syz_open_procfs$namespace(r0, 0xfffffffffffffffc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@enum={0x3, 0x2, 0x0, 0xf, 0x9000000, [{0x5}, {0xd}]}, @volatile]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x45}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@enum={0x3, 0x2, 0x0, 0xf, 0x9000000, [{0x5}, {0xd}]}, @volatile]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x45}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) close(0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, 0x0, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r5, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r5, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x13, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x0, 0x3, 0xb, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f0000000300)="e02742e8680d85ff978276fcf294", 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 941.891271ms ago: executing program 3 (id=840): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x8f, &(0x7f0000000440)=""/143, 0x41000, 0x20}, 0x94) 866.679523ms ago: executing program 3 (id=841): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000000df100bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000be000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0x0, 0x1}, 0x10}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000feffffff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2}, 0xc) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000280)="1d5ff8317ca952a2ba4bfee0f003", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) (rerun: 64) 685.693599ms ago: executing program 3 (id=842): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x480, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000200000018230000", @ANYRES32=r1, @ANYRESOCT=r0], &(0x7f0000000440)='syzkaller\x00', 0xfffffff9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 280.059902ms ago: executing program 3 (id=845): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000009b000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x2b, 0x8, &(0x7f0000000080)="81d9f8e4b034397b278c9768bf6c9c99361d9ddb51861568e2afcf2cebdee032a2f3bbbeb46493ec000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x10, 0x4, 0x4, 0x2}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800007b0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000002850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000001000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r3, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x878ba8d6d8070569, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000001c0)={'wg1\x00', @multicast}) 227.194534ms ago: executing program 3 (id=846): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x5, 0x7, 0x4, 0xd, 0x0, 0x1, 0xff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x6, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40049409, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) r6 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r9, 0x24, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0], &(0x7f00000003c0), 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@map=r8, 0xffffffffffffffff, 0x2, 0x2000, r7, @value=r9, @void, @void, @void, r10}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@fallback=r3, r3, 0x1f, 0x22, r4, @void, @void, @void, @value, r10}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f00000001c0), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0c1}, 0x1) close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x4001a141) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r11) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000040)=r3) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r12, &(0x7f0000000000), 0x2a979d) 226.597814ms ago: executing program 1 (id=847): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @private=0xa010102}, 0x0, 0x4, 0x0, 0x3}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000540)="35d430040c55fee24f174ad48e8d46d1417f37815d10bc88c53e63ae06c87994b9ab1cc868e432db125ebcc228e39eeb4d6e78c8907187d69ddd04da89155a4237173a319f5d7e4e707f7e2fbf506fe45565eefdb606e2b45809c218711ec09eadea73ee3f0167fa23af0d4b", 0x6c}, {&(0x7f00000005c0)="e64d8e7c18def5f640f1c9fbc6c183a98632fc93e07506df6b170f775600e023380ffd29cf4a71153a6434ad7b11413289090d3733d3cac2439490e772e5fbf4fb8d466e982f2ab42dbbe493bfeaa536d35d1d6a035853908458709325b7", 0x5e}, {&(0x7f0000000640)="f87a182d40699bc54f7808ef7ef8907bbca05b90fb436b2a15d3682fa3c01cc891f7f9b92017096e5d950b9a8e7d22a25ba91d5380bed99cad05b9de0f9f54bc2b59b5ee28366656db3c6e6e451ff85007702adbb5c7614a99728e25f55fe1f6c92751a28426a84f2dfb72228da2be6cadd715b5ddc11ab7c8b9b8666b808f22248ade11a55d4971dc16f0bb3b5332015ce9227ec5936b10925ae327f317c896376bcf96f91741c86964b9cf0b3cd81b6b3f589bacebe1c2df9a18934f48a3", 0xbf}, {&(0x7f0000000a80)="ed7866870baab3140f5c20930372ec7290a170e07a40b618be8f04a23bf9918160f83b45c13a02b6c4ed5cabb1215fc5db9d98e9dd642083739a01116b53674d059b7271e64d30ecb74d5d2dab236bef263012b9f59e80aff6f411896be57bfe79935283bc2a57ae5dff4c13565cec5a9bda9490c8463f23142231a16575bb2e03eb4d25f05e4c65916335444f986e39a4b48a86", 0x94}, {&(0x7f00000004c0)="f0b10afdcbe9962dbd36ce4bac2bf2225231ca25f79b1e0f4dc2ba1acda0f2863b219ff9b6e305d3c80f3614fbc7bb78db72", 0x32}, {&(0x7f0000000700)="ecc4f7548feb67a340988926", 0xc}, {&(0x7f0000000b40)="81247380936b808e821c304ef608eaf06dab81415334387b2bf254272627e2b2aa282689e407e90d33c17fa0e375a1a8a98bdb62c3c58dd6e5d67c293143cead8f7858d7db7047a7", 0x48}, {&(0x7f0000000c40)="4a78312fadc541e9e4056fa0faa240e4ea100115ebba92ffafdcdeba938e2ace2d1b49341eaa979e4ffa2d7aa151ddfe5ca742b72d8066bb2095be71a227f359d22e2a0736441374f3b2314c5e15c750ba3e2043fa410fe4a35af3cb0448bd832ad3e3fec76874c39325315b3fdda948cedf8a48ac240448138667e51d254b82713be02f038e47a537894d3111b7d741c58a82d58b42c02d150806e3d1243bfd8892d5af1d1b583eaef11c8ff5ee9874c032b98180e5c9181dac43b721cef91bd4f7942f9f40d22ce3aa6e2047f0cdb5a2dd", 0xd2}, {&(0x7f0000000d40)="d16375a993f6b85e247b20509948b5857116d5fe9e9ae5ab27eb8939584ae02138ccaf6541d46beb1f57b2921aec7f21df90d442fa5935da1263282d2e9f2546755b7854b4", 0x45}, {&(0x7f0000000dc0)="a4df0d52c4d5fe3e08778ba57451096946af997dc2f621323d739402adfc90126c04624b31f2532eb1362f511d68a97290bd2faa723ea5f554ab6d921f50c9077f2c7cefac626eaa7f", 0x49}], 0xa, &(0x7f0000000f00)=[@mark={{0x14, 0x1, 0x24, 0xfffffffa}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffc}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @txtime={{0x18, 0x1, 0x3d, 0x3ec}}], 0xa8}, 0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x4, 0x0, 0x7fff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYRES8=r2, @ANYBLOB="f072c26c849486ff16015b7139416b6876e99e0dd5afe073e36464ab39dbed0efcc304f42c3c0e2bb7e0d97c9a3400f1f79dcc88ed1794aa918692070000000000000045f185c0b7261a7047ab4e0a08468bd86ebf66f4e75842089d58e4f7cb497ad92925c1563ab2f2c38aca2e9ef8de82e7efb221a4bf6af4ec5b22aa64f4a60fd3043bd90895173781ab124a89398b1adfb0dbf951d38c8ea7d10bd73e1362f5aa248881773c5a68db136705f5aa5aa1926d95fa5d6f6636cce26776d5fe7ab67c1e9b6d0f66840fdaba9dca9d79e7f8c542077c7de7e4311e954e0a9a7c6fc54624399e0d0000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) 225.904144ms ago: executing program 4 (id=848): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x2, 0x1006, 0xff, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="0034df42779d04d97f1d20b7427614e3cb5fc3af9c1833cbca6b003404000000c6283d43447dfb726a264220bfff87a69ba50aa24de0db6da369cdaa9ea3bd2f0b08e58298da14dce84e7802c0baea016288e8781a1939838fa240942417f83e919e27c46501b2275d28735799cce4eee2c4916424f80f3ed75f42e5afd3fde2cb07f292775068cf451f65bb2be674057d9093dd09979635", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b702000010000000850000008600000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000000), &(0x7f0000000140)=r1}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1b, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) (async) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 205.611994ms ago: executing program 4 (id=849): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0x4, 0xa, 0x40}, 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYBLOB="265dfd09db3c5dca11ac1bdb16870b46f8802acb35372676642be82c0835ad27a32de6307a3f112d8b6fb37eb814a41f39e0ebf6fe7204da2443dddf0f0ea74d1327b1fa56cfb3b334fcd04d34aecc2a22d75c76e59ce2ff687c11ea29a15b4d5badac645c2f4895a80782b0fce14fd6072479e7a0e2630ee8e99b80d54a0e010aa0ea19eca9ef3a61f4311fb5e5d5b893aa7e21146026482f12da66e71ce46b9b3bdbacc5322775b90f632c9de898d59a7e0e390be00a5f2b8f1897d4982ba51f85a4d8022a96a0271329020a6649447f9a663233ed00d313f7233fb13ca1742e2b03dcd6ceaacca2ee54771ea00b2382b9546fbdaa139d8a6bb58868f4c7dafb7598d0070871c0a90bc5379e0118a2561e3508819d5fbcb3a18a2dea5ba948d403b27f38a834ebe7d1553dfe583d21f6cc297896147e83dac293", @ANYRESHEX=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x60000000}, 0xc) 193.173155ms ago: executing program 4 (id=850): r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r2, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@ifindex=r3, 0x5, 0x1, 0xb4d, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0]}, 0x40) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x33, 0x0, 0x7, 0x0, 0x45016, r0, 0x0, '\x00', r3, r5, 0x2, 0x0, 0x2}, 0x50) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0x9, 0x4}, {0x7}, {0xf, 0x3}, {0x0, 0x3}, {0x0, 0x5}]}]}, {0x0, [0x2e]}}, &(0x7f00000000c0)=""/200, 0x57, 0xc8, 0x0, 0xfffffff7, 0x10000}, 0x28) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r7, &(0x7f00000004c0), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000900000000004000000850000005500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x25, r6}, 0x94) 151.700236ms ago: executing program 4 (id=851): socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0/file0\x00', 0x1}, 0x18) 151.247236ms ago: executing program 1 (id=852): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x8f, &(0x7f0000000440)=""/143, 0x41000, 0x20}, 0x94) 125.624097ms ago: executing program 1 (id=853): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\x00') close(r0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'net'}, {0x2d, 'io'}]}, 0x9) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000006c0), 0x20005, r8}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x19, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r10, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 43.139359ms ago: executing program 4 (id=854): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x83001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580)}, 0x80, 0x8, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x128840, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000000400000000000000c37f0000a10000009500000000000000e53b6604a87a1295883f7cd6443a7f9851fb6bffe2ad335a3811620eb136b489099a7de488b303760ca93c979e45841422928b728a1dbabafdb4a332690b425d7fb50af5d35efb61ddac32debd7f8a424317ac"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x17, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) (async, rerun: 64) r2 = syz_clone(0xa0010400, &(0x7f0000000380)="a6ea9c02d28993a1235729d059326a5d000c73bbdef0bac10d9caebade892b035c7697500409c6dad6c07040dfd78cf4f23ed45a520599e493d72d1af0f08292f06e85ddb40f6a2f358d42218a59619ef0e0612e9b9dee6d5411975f99fbb9ac9bb74d78506ca692e54c9241c9f6f372e71185f19d61c739f947d0", 0x7b, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="cd9bb453629a71d21654a524cd5ec5461f4f71f89356c539d266bc8d99696d8bbe8108cdd45e77717320f8") (rerun: 64) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x0, 0x9, 0xff, 0x0, 0x9, 0x1080, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xd114, 0x0, @perf_bp={&(0x7f0000000180), 0xb}, 0xc000, 0x9, 0xccb, 0x2, 0x9, 0x6e, 0x1, 0x0, 0x0, 0x0, 0x6}, r2, 0xe, r3, 0xa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x8000}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1a1480, 0x0) close(r4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, '\x00', 0x0, @fallback=0x2}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="120000000b000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000ece1ce5a9f8e80137bb6945d62b6d33ecefe9c6b5b89ac2486c96e5384aa7a7c2905334632df2a8678009a7252e664c5e202eadedaa3694dac9f7275955a31ec7a7d356ab9c518cf4d7f75266c6fc00c83a7d93c74919382f60000"], 0x50) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)=r5}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r8, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="000000009c15b834495f369c3e4ee864580c911cac9a69961794ea73000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703001200000700b7049474fabd0ea9b800000000000485000000c300000095"], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="e5db029ea53c"}) bpf$MAP_CREATE(0x2000000000000015, &(0x7f0000000840)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESOCT, @ANYRES32, @ANYRES32=r2], 0x48) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="1e03fd00dd5c9801288563a20dad001406"], 0xffdd) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b00)) 0s ago: executing program 4 (id=855): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1}, &(0x7f00000000c0), &(0x7f0000000100)=r2}, 0x20) r3 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0], 0x28) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.70' (ED25519) to the list of known hosts. [ 21.988384][ T28] audit: type=1400 audit(1774874354.835:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.989615][ T275] cgroup: Unknown subsys name 'net' [ 22.011635][ T28] audit: type=1400 audit(1774874354.835:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.039270][ T28] audit: type=1400 audit(1774874354.865:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.039424][ T275] cgroup: Unknown subsys name 'devices' [ 22.183712][ T275] cgroup: Unknown subsys name 'hugetlb' [ 22.189326][ T275] cgroup: Unknown subsys name 'rlimit' [ 22.321110][ T28] audit: type=1400 audit(1774874355.165:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.344662][ T28] audit: type=1400 audit(1774874355.165:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.370773][ T28] audit: type=1400 audit(1774874355.175:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.380420][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.404080][ T28] audit: type=1400 audit(1774874355.255:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.429679][ T28] audit: type=1400 audit(1774874355.255:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.476681][ T28] audit: type=1400 audit(1774874355.325:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.502420][ T28] audit: type=1400 audit(1774874355.325:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.502450][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.130740][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.166016][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.174777][ T283] device bridge_slave_0 entered promiscuous mode [ 23.182238][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.189465][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.197261][ T283] device bridge_slave_1 entered promiscuous mode [ 23.317092][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.324283][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.331955][ T289] device bridge_slave_0 entered promiscuous mode [ 23.340431][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.347505][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.355003][ T289] device bridge_slave_1 entered promiscuous mode [ 23.447203][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.454418][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.461971][ T288] device bridge_slave_0 entered promiscuous mode [ 23.480464][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.487730][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.495139][ T290] device bridge_slave_0 entered promiscuous mode [ 23.501832][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.508877][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.516496][ T288] device bridge_slave_1 entered promiscuous mode [ 23.532322][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.539391][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.546955][ T290] device bridge_slave_1 entered promiscuous mode [ 23.577800][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.585229][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.592643][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.599750][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.618334][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.625913][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.633488][ T287] device bridge_slave_0 entered promiscuous mode [ 23.655479][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.662674][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.670139][ T287] device bridge_slave_1 entered promiscuous mode [ 23.763249][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.770421][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.777846][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.785074][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.829575][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.837109][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.844539][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.851835][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.861160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.868989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.896132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.904560][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.911620][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.943039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.951697][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.958828][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.983943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.992387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.003348][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.011613][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.018815][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.040422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.048063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.056270][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.069119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.077656][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.084865][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.092397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.100630][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.108179][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.134230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.142700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.160464][ T283] device veth0_vlan entered promiscuous mode [ 24.181245][ T289] device veth0_vlan entered promiscuous mode [ 24.191413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.199960][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.207127][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.215182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.224147][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.232004][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.239846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.248182][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.255338][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.262986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.270910][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.279750][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.288119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.296710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.305472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.313748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.321800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.331173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.339404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.347860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.356097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.364911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.373249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.381788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.389987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.398520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.407074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.415093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.423132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.431668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.439908][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.447040][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.469258][ T289] device veth1_macvtap entered promiscuous mode [ 24.482287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.490132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.497718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.505656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.513436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.520849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.528725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.537226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.545593][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.552990][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.560722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.569730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.578303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.586171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.594730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.603372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.611759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.622860][ T283] device veth1_macvtap entered promiscuous mode [ 24.641477][ T290] device veth0_vlan entered promiscuous mode [ 24.648998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.657275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.666465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.674633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.683303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.691675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.699587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.708298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.716736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.724857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.733025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.741646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.749925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.757414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.768940][ T288] device veth0_vlan entered promiscuous mode [ 24.780477][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.796061][ T290] device veth1_macvtap entered promiscuous mode [ 24.805957][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.814870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.822732][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.836225][ T289] request_module fs-gadgetfs succeeded, but still no fs? [ 24.848636][ T288] device veth1_macvtap entered promiscuous mode [ 24.856120][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.865859][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.874823][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.883522][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.892000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.900594][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.909067][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.917690][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.926552][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.935169][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.968124][ T287] device veth0_vlan entered promiscuous mode [ 24.988780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.997415][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.005580][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.013725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.022301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.208944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.221126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.231366][ T309] device veth1_to_hsr entered promiscuous mode [ 25.246093][ T287] device veth1_macvtap entered promiscuous mode [ 25.269338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.283502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.294277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.336829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.353386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.363590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.373642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.571276][ C0] hrtimer: interrupt took 24912 ns [ 25.869189][ T329] Driver unsupported XDP return value 0 on prog (id 7) dev N/A, expect packet loss! [ 26.174266][ T328] syz.1.8 (328) used greatest stack depth: 21184 bytes left [ 27.421363][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 27.421382][ T28] audit: type=1400 audit(1774874360.245:110): avc: denied { create } for pid=370 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 27.451908][ T371] device veth1_macvtap left promiscuous mode [ 27.513819][ T372] device veth1_macvtap entered promiscuous mode [ 27.549992][ T372] device macsec0 entered promiscuous mode [ 27.558043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.634053][ T28] audit: type=1400 audit(1774874360.485:111): avc: denied { create } for pid=381 comm="syz.3.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 27.903531][ T28] audit: type=1400 audit(1774874360.755:112): avc: denied { create } for pid=414 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.931781][ T409] cgroup: fork rejected by pids controller in /syz2 [ 28.538175][ T539] device syzkaller0 entered promiscuous mode [ 28.556072][ T28] audit: type=1400 audit(1774874361.405:113): avc: denied { relabelfrom } for pid=538 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.618708][ T28] audit: type=1400 audit(1774874361.405:114): avc: denied { relabelto } for pid=538 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.259352][ T541] syzkaller0: refused to change device tx_queue_len [ 29.267717][ T540] syzkaller0: refused to change device tx_queue_len [ 29.540236][ T544] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.557382][ T544] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.580436][ T544] device bridge_slave_0 entered promiscuous mode [ 29.595557][ T544] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.612626][ T544] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.650805][ T544] device bridge_slave_1 entered promiscuous mode [ 29.775601][ T28] audit: type=1400 audit(1774874362.625:115): avc: denied { create } for pid=544 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.837847][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.845916][ T28] audit: type=1400 audit(1774874362.625:116): avc: denied { write } for pid=544 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.867377][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.907718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.927628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.936003][ T28] audit: type=1400 audit(1774874362.625:117): avc: denied { read } for pid=544 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.951550][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.963673][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.992016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.011512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.032081][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.039185][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.058604][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.142528][ T544] device veth0_vlan entered promiscuous mode [ 30.168867][ T544] device veth1_macvtap entered promiscuous mode [ 30.467910][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.480020][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.512177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.526724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.543649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.553117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.569395][ T28] audit: type=1400 audit(1774874363.415:118): avc: denied { write } for pid=560 comm="syz.0.42" name="ppp" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.573625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.601435][ T28] audit: type=1400 audit(1774874363.415:119): avc: denied { open } for pid=560 comm="syz.0.42" path="/dev/ppp" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.602952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.633405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.838605][ T572] device syzkaller0 entered promiscuous mode [ 31.013377][ T575] device syzkaller0 entered promiscuous mode [ 31.088717][ T587] device syzkaller0 entered promiscuous mode [ 31.186797][ T308] device bridge_slave_1 left promiscuous mode [ 31.196988][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.209198][ T308] device bridge_slave_0 left promiscuous mode [ 31.215917][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.224720][ T308] device veth1_macvtap left promiscuous mode [ 31.230779][ T308] device veth0_vlan left promiscuous mode [ 31.424269][ T602] device lo entered promiscuous mode [ 31.853970][ T627] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.159231][ T640] dummy0: mtu less than device minimum [ 32.809752][ T662] device syzkaller0 entered promiscuous mode [ 33.140153][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 33.140168][ T28] audit: type=1400 audit(1774874365.985:122): avc: denied { setopt } for pid=670 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.395087][ T28] audit: type=1400 audit(1774874366.245:123): avc: denied { read } for pid=682 comm="syz.0.78" name="ppp" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.685667][ T28] audit: type=1400 audit(1774874367.535:124): avc: denied { create } for pid=803 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 35.861591][ T860] device syzkaller0 entered promiscuous mode [ 36.002094][ T856] tap0: tun_chr_ioctl cmd 1074025680 [ 36.331331][ T28] audit: type=1400 audit(1774874369.175:125): avc: denied { ioctl } for pid=878 comm="syz.2.134" path="socket:[16818]" dev="sockfs" ino=16818 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.460942][ T917] device syzkaller0 entered promiscuous mode [ 38.511319][ T929] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.519716][ T929] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.551681][ T939] device bridge_slave_1 left promiscuous mode [ 38.558218][ T939] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.574924][ T939] device bridge_slave_0 left promiscuous mode [ 38.581453][ T939] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.445663][ T994] device veth1_macvtap left promiscuous mode [ 39.465017][ T995] device veth1_macvtap entered promiscuous mode [ 39.504611][ T995] device macsec0 entered promiscuous mode [ 39.787343][ T1001] device veth0_to_team entered promiscuous mode [ 40.445386][ T1036] device syzkaller0 entered promiscuous mode [ 40.699328][ T28] audit: type=1400 audit(1774874373.545:126): avc: denied { create } for pid=1046 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 41.059962][ T1070] device syzkaller0 entered promiscuous mode [ 42.433863][ T1133] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 42.460655][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.190065][ T1154] : renamed from bond_slave_0 [ 43.437580][ T28] audit: type=1400 audit(1774874376.275:127): avc: denied { create } for pid=1149 comm="syz.2.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.476622][ T1176] device syzkaller0 entered promiscuous mode [ 44.579492][ T1188] Q6\bY4: renamed from lo [ 44.598118][ T1190] gretap0: refused to change device tx_queue_len [ 44.848692][ T1210] syz.1.227[1210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.848771][ T1210] syz.1.227[1210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.999255][ T1239] sched: RT throttling activated [ 47.222579][ T28] audit: type=1400 audit(1774874380.045:128): avc: denied { write } for pid=1265 comm="syz.0.241" name="cgroup.subtree_control" dev="cgroup2" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.246745][ T28] audit: type=1400 audit(1774874380.045:129): avc: denied { open } for pid=1265 comm="syz.0.241" path="" dev="cgroup2" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.474619][ T1280] device sit0 entered promiscuous mode [ 48.470899][ T1327] device vlan1 entered promiscuous mode [ 49.352720][ T28] audit: type=1400 audit(1774874382.205:130): avc: denied { create } for pid=1362 comm="syz.2.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 49.797160][ T1402] device syzkaller0 entered promiscuous mode [ 54.139468][ T1467] -: renamed from syzkaller0 [ 56.665737][ T28] audit: type=1400 audit(1774874389.515:131): avc: denied { create } for pid=1585 comm="syz.1.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 58.183682][ T28] audit: type=1400 audit(1774874391.035:132): avc: denied { associate } for pid=1655 comm="syz.0.351" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 58.589334][ T1667] device syzkaller0 entered promiscuous mode [ 59.386056][ T1735] device syzkaller0 entered promiscuous mode [ 60.649326][ T1814] device syzkaller0 entered promiscuous mode [ 61.022512][ T1821] pim6reg1: tun_chr_ioctl cmd 1074025677 [ 61.041352][ T1821] pim6reg1: linktype set to 805 [ 61.058998][ T1824] pim6reg1: tun_chr_ioctl cmd 1074025684 [ 61.206563][ T1820] device syzkaller0 entered promiscuous mode [ 61.279034][ T1831] device syzkaller0 entered promiscuous mode [ 61.547494][ T1841] device wg2 entered promiscuous mode [ 61.879410][ T1853] device syzkaller0 entered promiscuous mode [ 62.017056][ T1859] device syzkaller0 entered promiscuous mode [ 62.202870][ T28] audit: type=1400 audit(1774874395.055:133): avc: denied { create } for pid=1862 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 67.798054][ T1917] device syzkaller0 entered promiscuous mode [ 68.066170][ T28] audit: type=1400 audit(1774874400.905:134): avc: denied { create } for pid=1928 comm="syz.3.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 68.637525][ T1943] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.644785][ T1943] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.725944][ T1948] device syzkaller0 entered promiscuous mode [ 68.759459][ T28] audit: type=1400 audit(1774874401.605:135): avc: denied { create } for pid=1951 comm="syz.2.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 68.785270][ T1948] device syzkaller0 left promiscuous mode [ 68.792131][ T1943] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.799376][ T1943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.806735][ T1943] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.813807][ T1943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.821680][ T1943] device bridge0 entered promiscuous mode [ 69.657364][ T1991] device syzkaller0 entered promiscuous mode [ 74.351076][ T28] audit: type=1400 audit(1774874407.195:136): avc: denied { create } for pid=2066 comm="syz.4.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 75.791399][ T2115] pimreg1: tun_chr_ioctl cmd 1074025684 [ 75.953120][ T2115] pimreg1: tun_chr_ioctl cmd 1074025680 [ 76.429591][ T28] audit: type=1400 audit(1774874409.275:137): avc: denied { create } for pid=2143 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 76.809552][ T2165] device syzkaller0 entered promiscuous mode [ 77.911045][ T2199] device syzkaller0 entered promiscuous mode [ 78.163404][ T2205] device syzkaller0 entered promiscuous mode [ 79.518250][ T2238] device syzkaller0 entered promiscuous mode [ 80.208456][ T2253] bridge0: port 3(ip6gretap0) entered blocking state [ 80.242164][ T2253] bridge0: port 3(ip6gretap0) entered disabled state [ 80.312279][ T2253] device ip6gretap0 entered promiscuous mode [ 80.337738][ T2253] bridge0: port 3(ip6gretap0) entered blocking state [ 80.344927][ T2253] bridge0: port 3(ip6gretap0) entered forwarding state [ 81.298408][ T2316] device syzkaller0 entered promiscuous mode [ 81.329663][ T2311] device syzkaller0 entered promiscuous mode [ 81.469686][ T2332] device syzkaller0 entered promiscuous mode [ 81.719318][ T2345] device syzkaller0 entered promiscuous mode [ 82.000562][ T28] audit: type=1400 audit(1774874414.845:138): avc: denied { append } for pid=2376 comm="syz.4.543" name="ppp" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 82.178528][ T2402] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.185846][ T2402] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.481812][ T2418] device syzkaller0 entered promiscuous mode [ 83.916495][ T28] audit: type=1400 audit(1774874416.765:139): avc: denied { attach_queue } for pid=2469 comm="syz.0.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 84.382367][ T28] audit: type=1400 audit(1774874417.235:140): avc: denied { create } for pid=2497 comm="syz.4.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 87.141882][ T2634] device wg2 entered promiscuous mode [ 89.237393][ T2772] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 89.248363][ T2772] syzkaller0: linktype set to 780 [ 89.285581][ T2775] tap0: tun_chr_ioctl cmd 1074025677 [ 89.296622][ T2775] tap0: linktype set to 774 [ 89.333890][ T2777] device bridge_slave_1 left promiscuous mode [ 89.355628][ T2777] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.380284][ T2777] device bridge_slave_0 left promiscuous mode [ 89.399722][ T2777] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.872061][ T2828] syz.4.675 (2828) used obsolete PPPIOCDETACH ioctl [ 90.497611][ T2831] device syzkaller0 entered promiscuous mode [ 91.057632][ T2851] device wg2 left promiscuous mode [ 91.106964][ T2856] device wg2 entered promiscuous mode [ 91.231321][ T2857] pimreg1: tun_chr_ioctl cmd 1074025677 [ 91.311391][ T2857] pimreg1: linktype set to 1 [ 91.327140][ T2870] device wg2 entered promiscuous mode [ 91.363032][ T28] audit: type=1400 audit(1774874424.215:141): avc: denied { create } for pid=2867 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.587082][ T2908] device syzkaller0 entered promiscuous mode [ 92.694827][ T2910] GPL: port 1(syz_tun) entered blocking state [ 92.721847][ T2910] GPL: port 1(syz_tun) entered disabled state [ 92.804601][ T2910] device syz_tun entered promiscuous mode [ 93.818024][ T28] audit: type=1400 audit(1774874426.665:142): avc: denied { create } for pid=2951 comm="syz.3.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 95.701748][ T2973] device syzkaller0 entered promiscuous mode [ 95.996198][ T28] audit: type=1400 audit(1774874428.845:143): avc: denied { create } for pid=2983 comm="syz.0.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 97.965354][ T3056] device syzkaller0 entered promiscuous mode [ 97.979900][ T3059] cgroup: fork rejected by pids controller in /syz0 [ 102.065220][ T3172] device syzkaller0 entered promiscuous mode [ 102.453580][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.478924][ T3178] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.492242][ T3178] device bridge_slave_0 entered promiscuous mode [ 102.505517][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.542458][ T3178] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.602052][ T3178] device bridge_slave_1 entered promiscuous mode [ 102.774964][ T3202] device syzkaller0 entered promiscuous mode [ 103.463056][ T308] device bridge_slave_1 left promiscuous mode [ 103.470576][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.485952][ T308] device bridge_slave_0 left promiscuous mode [ 103.498734][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.514771][ T308] device veth1_macvtap left promiscuous mode [ 103.752393][ T3215] device syzkaller0 entered promiscuous mode [ 103.951329][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.985134][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.033306][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.049710][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.067260][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.074557][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.083362][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.093584][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.102495][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.109653][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.138169][ T3253] device syzkaller0 entered promiscuous mode [ 104.145884][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.173455][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.196351][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.215964][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.236696][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.361043][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.377511][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.481210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.489353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.519373][ T3178] device veth0_vlan entered promiscuous mode [ 104.586279][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.621485][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.637674][ T3178] device veth1_macvtap entered promiscuous mode [ 104.667476][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.691677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.704404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.724414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.733440][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.763696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.772671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.925432][ T3278] device syzkaller0 entered promiscuous mode [ 106.947558][ T3388] device syzkaller0 entered promiscuous mode [ 107.429696][ T3419] device sit0 entered promiscuous mode [ 108.454586][ T28] audit: type=1400 audit(1774874441.305:144): avc: denied { create } for pid=3449 comm="syz.2.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 109.287355][ T3500] device syzkaller0 entered promiscuous mode [ 110.107507][ T3524] device lo left promiscuous mode [ 110.172674][ T3524] Q6\bY4: renamed from lo [ 110.613740][ T3546] syz.4.851 uses obsolete (PF_INET,SOCK_PACKET) [ 110.787683][ T3550] ================================================================== [ 110.796750][ T3550] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 110.804718][ T3550] Write of size 48 at addr ffff888132424510 by task syz.1.853/3550 [ 110.812771][ T3550] [ 110.815123][ T3550] CPU: 1 PID: 3550 Comm: syz.1.853 Not tainted syzkaller #0 [ 110.822524][ T3550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.832772][ T3550] Call Trace: [ 110.836051][ T3550] [ 110.838981][ T3550] __dump_stack+0x21/0x24 [ 110.843410][ T3550] dump_stack_lvl+0x110/0x170 [ 110.848093][ T3550] ? __cfi_dump_stack_lvl+0x8/0x8 [ 110.853291][ T3550] ? __bpf_get_stackid+0x6fa/0x960 [ 110.858526][ T3550] print_address_description+0x71/0x200 [ 110.864449][ T3550] print_report+0x4a/0x60 [ 110.868855][ T3550] kasan_report+0x122/0x150 [ 110.873393][ T3550] ? __bpf_get_stackid+0x6fa/0x960 [ 110.878529][ T3550] kasan_check_range+0x249/0x2a0 [ 110.883599][ T3550] ? __bpf_get_stackid+0x6fa/0x960 [ 110.888949][ T3550] memcpy+0x44/0x70 [ 110.892866][ T3550] __bpf_get_stackid+0x6fa/0x960 [ 110.897902][ T3550] bpf_get_stackid_pe+0x2ee/0x400 [ 110.902939][ T3550] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 110.908446][ T3550] bpf_overflow_handler+0x3d0/0x5e0 [ 110.913653][ T3550] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 110.919464][ T3550] ? __this_cpu_preempt_check+0x13/0x20 [ 110.925104][ T3550] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 110.931352][ T3550] __perf_event_overflow+0x437/0x620 [ 110.936646][ T3550] perf_swevent_event+0x2f7/0x530 [ 110.941679][ T3550] ___perf_sw_event+0x3bf/0x4f0 [ 110.946799][ T3550] ? release_firmware_map_entry+0x190/0x190 [ 110.952815][ T3550] ? __cfi____perf_sw_event+0x10/0x10 [ 110.958206][ T3550] ? __cfi_futex_wake+0x10/0x10 [ 110.963060][ T3550] __perf_sw_event+0x134/0x270 [ 110.967833][ T3550] do_user_addr_fault+0xffb/0x1050 [ 110.972949][ T3550] ? __kasan_check_write+0x14/0x20 [ 110.978150][ T3550] ? __cfi__raw_spin_lock+0x10/0x10 [ 110.983456][ T3550] ? lock_vma_under_rcu+0x400/0x4f0 [ 110.988793][ T3550] exc_page_fault+0x51/0xb0 [ 110.993349][ T3550] asm_exc_page_fault+0x27/0x30 [ 110.998220][ T3550] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 111.003967][ T3550] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 111.023957][ T3550] RSP: 0018:ffffc90001e9fe60 EFLAGS: 00050297 [ 111.030047][ T3550] RAX: 000000000000000b RBX: 00007fffffffeffd RCX: 0000000000000000 [ 111.038892][ T3550] RDX: ffff888148182880 RSI: 000000000000000c RDI: 0000000000000000 [ 111.046867][ T3550] RBP: ffffc90001e9fec8 R08: ffff88810b79dfa7 R09: 1ffff110216f3bf4 [ 111.054930][ T3550] R10: dffffc0000000000 R11: ffffed10216f3bf5 R12: 0000000000000001 [ 111.062903][ T3550] R13: 0000000000000000 R14: 000000000000000b R15: 0000000000000000 [ 111.071049][ T3550] ? __sys_socketpair+0xac/0x5b0 [ 111.076030][ T3550] ? fpregs_restore_userregs+0x128/0x260 [ 111.081670][ T3550] __x64_sys_socketpair+0x9b/0xb0 [ 111.086877][ T3550] x64_sys_call+0x6e/0x9a0 [ 111.091297][ T3550] do_syscall_64+0x4c/0xa0 [ 111.095729][ T3550] ? clear_bhb_loop+0x30/0x80 [ 111.100412][ T3550] ? clear_bhb_loop+0x30/0x80 [ 111.105092][ T3550] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 111.110989][ T3550] RIP: 0033:0x7f1e3e39c819 [ 111.115411][ T3550] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 111.135539][ T3550] RSP: 002b:00007f1e3f223028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 111.143957][ T3550] RAX: ffffffffffffffda RBX: 00007f1e3e615fa0 RCX: 00007f1e3e39c819 [ 111.152192][ T3550] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 111.160169][ T3550] RBP: 00007f1e3e432c91 R08: 0000000000000000 R09: 0000000000000000 [ 111.168352][ T3550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 111.176328][ T3550] R13: 00007f1e3e616038 R14: 00007f1e3e615fa0 R15: 00007fff12211248 [ 111.184401][ T3550] [ 111.187418][ T3550] [ 111.189743][ T3550] Allocated by task 3550: [ 111.194063][ T3550] kasan_set_track+0x4b/0x70 [ 111.198657][ T3550] kasan_save_alloc_info+0x25/0x30 [ 111.203948][ T3550] __kasan_kmalloc+0x95/0xb0 [ 111.208719][ T3550] __kmalloc_node+0xb2/0x1e0 [ 111.213667][ T3550] bpf_map_area_alloc+0x4b/0xe0 [ 111.218574][ T3550] prealloc_elems_and_freelist+0x8a/0x1e0 [ 111.224482][ T3550] stack_map_alloc+0x3a7/0x530 [ 111.229332][ T3550] map_create+0x49c/0xd80 [ 111.233921][ T3550] __sys_bpf+0x34e/0x850 [ 111.238186][ T3550] __x64_sys_bpf+0x7c/0x90 [ 111.242780][ T3550] x64_sys_call+0x488/0x9a0 [ 111.247372][ T3550] do_syscall_64+0x4c/0xa0 [ 111.251797][ T3550] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 111.257819][ T3550] [ 111.260143][ T3550] The buggy address belongs to the object at ffff888132424500 [ 111.260143][ T3550] which belongs to the cache kmalloc-64 of size 64 [ 111.274454][ T3550] The buggy address is located 16 bytes inside of [ 111.274454][ T3550] 64-byte region [ffff888132424500, ffff888132424540) [ 111.287552][ T3550] [ 111.289900][ T3550] The buggy address belongs to the physical page: [ 111.296412][ T3550] page:ffffea0004c90900 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x132424 [ 111.307016][ T3550] flags: 0x4000000000000200(slab|zone=1) [ 111.312678][ T3550] raw: 4000000000000200 dead000000000100 dead000000000122 ffff888100042780 [ 111.321265][ T3550] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 111.329930][ T3550] page dumped because: kasan: bad access detected [ 111.336337][ T3550] page_owner tracks the page as allocated [ 111.342048][ T3550] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 283, tgid 283 (syz-executor), ts 27919697094, free_ts 27905512410 [ 111.360203][ T3550] post_alloc_hook+0x1f5/0x210 [ 111.364996][ T3550] prep_new_page+0x1c/0x110 [ 111.369519][ T3550] get_page_from_freelist+0x2d12/0x2d80 [ 111.375097][ T3550] __alloc_pages+0x1fa/0x610 [ 111.379783][ T3550] alloc_slab_page+0x6e/0xf0 [ 111.384469][ T3550] new_slab+0x98/0x3d0 [ 111.388560][ T3550] ___slab_alloc+0x6bd/0xb20 [ 111.393153][ T3550] __slab_alloc+0x5e/0xa0 [ 111.397571][ T3550] __kmem_cache_alloc_node+0x203/0x2c0 [ 111.403040][ T3550] kmalloc_trace+0x29/0xb0 [ 111.407891][ T3550] copy_dmabuf_info+0x35d/0xf50 [ 111.412749][ T3550] copy_process+0x1b32/0x3510 [ 111.417430][ T3550] kernel_clone+0x22f/0x820 [ 111.421945][ T3550] __x64_sys_clone+0x193/0x200 [ 111.426742][ T3550] x64_sys_call+0x990/0x9a0 [ 111.431298][ T3550] do_syscall_64+0x4c/0xa0 [ 111.435904][ T3550] page last free stack trace: [ 111.440576][ T3550] free_unref_page_prepare+0x742/0x750 [ 111.446046][ T3550] free_unref_page_list+0x117/0x8c0 [ 111.451448][ T3550] release_pages+0xaf2/0xb50 [ 111.456037][ T3550] free_pages_and_swap_cache+0x86/0xa0 [ 111.461526][ T3550] tlb_finish_mmu+0x1aa/0x370 [ 111.466203][ T3550] exit_mmap+0x412/0xc10 [ 111.470574][ T3550] __mmput+0x93/0x360 [ 111.474559][ T3550] mmput+0x4b/0x150 [ 111.478367][ T3550] do_exit+0x994/0x2660 [ 111.482524][ T3550] do_group_exit+0x210/0x2d0 [ 111.487151][ T3550] get_signal+0x13b5/0x1520 [ 111.491751][ T3550] arch_do_signal_or_restart+0xd1/0x1140 [ 111.497667][ T3550] exit_to_user_mode_loop+0x7a/0xb0 [ 111.502889][ T3550] exit_to_user_mode_prepare+0x87/0xd0 [ 111.508441][ T3550] syscall_exit_to_user_mode+0x1a/0x30 [ 111.513903][ T3550] do_syscall_64+0x58/0xa0 [ 111.518328][ T3550] [ 111.520657][ T3550] Memory state around the buggy address: [ 111.526652][ T3550] ffff888132424400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 111.534806][ T3550] ffff888132424480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 111.542876][ T3550] >ffff888132424500: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 111.551022][ T3550] ^ [ 111.556384][ T3550] ffff888132424580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 111.564451][ T3550] ffff888132424600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 111.572678][ T3550] ================================================================== [ 111.582271][ T3550] Disabling lock debugging due to kernel taint [ 111.587167][ T28] audit: type=1400 audit(1774874444.435:145): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 111.626463][ T28] audit: type=1400 audit(1774874444.435:146): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.648259][ T28] audit: type=1400 audit(1774874444.435:147): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.670139][ T28] audit: type=1400 audit(1774874444.435:148): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.692016][ T28] audit: type=1400 audit(1774874444.435:149): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.712727][ T28] audit: type=1400 audit(1774874444.435:150): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.735780][ T28] audit: type=1400 audit(1774874444.435:151): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1