last executing test programs: 16.157075586s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 13.560496712s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 10.645215992s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 7.337728765s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 3.550204124s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 2.635890003s ago: executing program 3 (id=1039): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="b400000000000000710400000000000016000000000000009500740000000000e793afa3a142419fd87e7df3cf24c7884aff2bedb3a656158c261879"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x22) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xb4180, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7ff}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x8b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8001}, 0x9, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x220e9080, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='blkio.bfq.idle_time\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x37, 0x7, 0x1, 0x25, 0x0, 0x8, 0x22002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5ee, 0x2, @perf_bp={&(0x7f0000000280), 0x4}, 0x100000, 0x5, 0x6, 0x8, 0x8, 0x2, 0x0, 0x0, 0x2, 0x0, 0x2}, r5, 0x10, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87210, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78c, 0x0, @perf_config_ext={0x3, 0xb93a}, 0x100200, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 1.658077713s ago: executing program 0 (id=1063): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40200000000000061114c0000000000850000005300000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000400000004000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 1.641938063s ago: executing program 0 (id=1064): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0xc1}, 0x48) 1.586648434s ago: executing program 0 (id=1065): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x53}, @printk={@u, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x53}, @printk={@u, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xffff6f33, 0x3f800000, 0x7, 0x10000, r0, 0x8, '\x00', r2, r3, 0x3, 0x3, 0x1, 0x9, @void, @value, @value=r5}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x2000000, 0xe, 0x0, &(0x7f00000001c0)="5cdd3086ddffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400060000000011000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000100007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x1002, &(0x7f0000002500)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000100007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x1002, &(0x7f0000002500)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) 1.586393584s ago: executing program 3 (id=1066): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000000000000000000000000180100000400000000000000002020207b1af8ff00000000bfa100000000000007010000f8fff8ffb702000008000000b70300000000000085000000ca00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x46}, 0xbb) 1.515667555s ago: executing program 3 (id=1069): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x381a03, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_clone(0xe9aff10e6a852f03, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x94820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0xf}, 0x0, 0xffffffffffffffff, r2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040), 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETCARRIER(r7, 0x400454e2, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f00000001c0)=[{0x3fd, 0x0, 0xfe, 0xffffffff}, {0x3, 0x3, 0x80, 0x5}, {0xfffe, 0x2d, 0x0, 0x4}, {0x6, 0x2, 0x0, 0xffffffff}]}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r9 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r9) write$cgroup_subtree(r9, &(0x7f0000000680)=ANY=[@ANYBLOB="80f5d6a2741c32f9144148b4a415cf8b56b0e671b305563189193f5b60d70e01cca9ec5a180024e0a038d4641fe523803c7afee88bed00859f771424578a21d770655e32067413a54a7283c11be0f3cdf16d2bd397be1178d42c1e1593827e2a54b1d9ce3dd87552c0a5597e53bbba5c59ad0ef5cfb81550f1d0e9dfe9eec4b55745645154dedd94b8e90dae3f7773c557d053e5e240ebce481561f298430c0261b6140455dc8aef", @ANYRESDEC], 0x4b) 1.512389104s ago: executing program 1 (id=1071): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x100c, 0x7f, 0x0, 0x0, 0x200000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xa7}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x86) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x4, &(0x7f0000002000)=ANY=[@ANYBLOB="18000000000000000000000000000000730123000000000095"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200, 0x1, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x100c, 0x7f, 0x0, 0x0, 0x200000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xa7}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x86) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x4, &(0x7f0000002000)=ANY=[@ANYBLOB="18000000000000000000000000000000730123000000000095"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200, 0x1, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) (async) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) (async) 1.495737125s ago: executing program 2 (id=794): bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0xff, 0x4, 0x0, 0x5d31, 0xa0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x108e41, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xffffffff00000000}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000280)={'wg2\x00'}) 489.580605ms ago: executing program 0 (id=1072): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r0, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000200)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x10, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000030000000000000003000000b7080000000000007b8af8ff00000000b7080000010000807b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r2}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000700000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0xfffffef3, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x5562, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 488.961155ms ago: executing program 1 (id=1073): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0, 0x9}, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 488.321245ms ago: executing program 3 (id=1074): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40200000000000061114c0000000000850000005300000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000400000004000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 477.397615ms ago: executing program 3 (id=1076): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0xd, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000002}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0xa6}}]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2}, 0xc) 411.817026ms ago: executing program 1 (id=1077): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0xae}, @printk={@llu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000a50000007b00000095000000000000"], 0x0}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x5, 0x8000, 0x1}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x4000000) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x20000800) (async) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2102) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, 0x0) (async) r6 = syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8922, &(0x7f0000000a80)={'macsec0\x00'}) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r8) (async, rerun: 64) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x8, 0x1, 0x0, 0x7ff, 0x0, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x831, 0x2, @perf_config_ext={0x4, 0xf0}, 0x108008, 0x1, 0x3, 0x7, 0x8001, 0x9, 0x981, 0x0, 0x9, 0x0, 0x6}, r6, 0xa, r8, 0x1) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 411.262246ms ago: executing program 0 (id=1078): r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x7f, 0x5, 0x0, 0x7, 0x0, 0x8, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x120, 0x1000, 0xfffffff0, 0xc317acedc90d850f, 0x4, 0x2, 0xff, 0x0, 0xfffffe01, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xb) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x2b, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf8000000, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @tail_call, @ldst={0x1, 0x2, 0x2, 0xb, 0x5, 0x4, 0x8}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x9}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x3ff, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000340)=[{0x4, 0x3, 0xa, 0x9}, {0x5, 0x2, 0x8, 0x2}, {0x5, 0x5, 0xd, 0xc}, {0x4, 0x1, 0xe, 0x3}, {0x4, 0x2, 0x5, 0x5}], 0x10, 0xa83}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open$cgroup(&(0x7f0000000480)={0x2, 0x80, 0x6, 0x7, 0x4, 0x8, 0x0, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x7}, 0x0, 0x4, 0x1, 0x7, 0x8, 0x4, 0x4, 0x0, 0x862b}, 0xffffffffffffffff, 0xa, r0, 0x8) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000500)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f00000007c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xa8, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xf1c}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x672}]}, &(0x7f0000000680)='syzkaller\x00', 0xfffffffd, 0xe, &(0x7f00000006c0)=""/14, 0x40f00, 0x10, '\x00', r4, 0x18, r5, 0x8, &(0x7f0000000a40)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x7, 0x8, 0xfffffffe}, 0x10, 0xfd78, 0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000ac0)=[{0x2, 0x1, 0x2, 0x9}, {0x1, 0x2, 0xa, 0x6}, {0x4, 0x2, 0x7, 0x2}, {0x0, 0x4, 0x1, 0x8}, {0x4, 0x1, 0xa, 0x5}, {0x0, 0x2, 0x7, 0x8}, {0x0, 0x5, 0x10, 0xb}, {0x0, 0x1, 0x3, 0x3}, {0x5, 0x5, 0x3, 0x2}], 0x10, 0x6}, 0x94) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000000c40)={'veth0_macvtap', 0x32, 0x38}, 0x10) r6 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={r6, r2, 0x0, 0x1, &(0x7f0000000c80)='\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x11, &(0x7f0000000d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa000000}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r5}, @alu={0x0, 0x0, 0xe, 0x9, 0x1, 0xaf}]}, &(0x7f0000000dc0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000e00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000e40)={0x3, 0xa, 0xff, 0x7}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000e80)=[{0x0, 0x4, 0xa, 0xb}, {0x3, 0x4, 0x9, 0x5}, {0x1, 0x5, 0x2, 0x7}, {0x4, 0x3, 0x3, 0x5}, {0x3, 0x2, 0x7, 0x6}, {0x2, 0x4, 0xc, 0xb}, {0x0, 0x5, 0x8, 0x5}], 0x10, 0xd3b0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001280)={r5, 0xe0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000fc0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001040)=[0x0], 0x0, 0x7c, &(0x7f0000001080)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000010c0), &(0x7f0000001100), 0x8, 0x8f, 0x8, 0x8, &(0x7f0000001140)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@bloom_filter={0x1e, 0xe, 0x0, 0x0, 0x40081, r3, 0x3, '\x00', r7, r5, 0x1, 0x5, 0x5, 0xa}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001580)={r9, 0xffffffffffffffff}, 0x4) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000015c0)={0x0, 0x7fff, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x1e, &(0x7f0000001340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xa}, @generic={0xda, 0x8, 0x3, 0x80, 0x2c00000}, @generic={0x8, 0x6, 0x2, 0x1, 0x9}, @printk={@lu}, @jmp={0x5, 0x0, 0xa, 0x9, 0x8, 0x50, 0xfffffffffffffff8}, @generic={0x2, 0x8, 0xe, 0xf, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001440)='syzkaller\x00', 0x2, 0x68, &(0x7f0000001480)=""/104, 0x41100, 0x4, '\x00', r7, 0x25, r5, 0x8, &(0x7f0000001500)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001540)={0x2, 0x10, 0x63c6523b, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001600)=[r9, r9, r5, r10, r9, r9, r9, r11, r3, r5], &(0x7f0000001640)=[{0x4, 0x2, 0x3, 0x1}, {0x2, 0x1, 0xc, 0x7}, {0x0, 0x1, 0x3, 0x3}, {0x0, 0x5, 0x5, 0x7}, {0x4, 0x1, 0xb, 0xc}, {0x2, 0x2, 0x5, 0x7}], 0x10, 0x5}, 0x94) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x1a, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @alu={0x4, 0x0, 0xc, 0x8, 0x9, 0x4, 0x1}, @map_val={0x18, 0x6, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a40)='syzkaller\x00', 0x3, 0xa8, &(0x7f0000001a80)=""/168, 0x41000, 0x4c420ed502f1edc4, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000001b40)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x4, 0xc, 0xfffffff7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001bc0)=[r9, r9, r3], &(0x7f0000001c00)=[{0x4, 0x1, 0x1, 0x7}, {0x3, 0x1, 0x9, 0x2}, {0x3, 0x2, 0xe, 0xa}, {0x3, 0x4, 0x7, 0xc}], 0x10, 0x0, @value=r5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x7, 0x13, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e18, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x0, 0x3, 0x8, 0x8, 0x100, 0xfffffffffffffffc}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}]}, &(0x7f0000001840)='syzkaller\x00', 0xd, 0x3d, &(0x7f0000001880)=""/61, 0x41000, 0x4, '\x00', r7, @fallback=0x6, r5, 0x8, &(0x7f00000018c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000001900)={0x5, 0x3, 0x1ff, 0x1}, 0x10, r8, r12, 0x6, 0x0, &(0x7f0000001d00)=[{0x3, 0x5, 0xf, 0xb}, {0x5, 0x1, 0x8, 0x3}, {0x1, 0x2, 0xf}, {0x1, 0x2, 0x2, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x2, 0x3, 0xa}], 0x10, 0xfffffff4}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001f00)={r10, &(0x7f0000001e40)="d47a74f11a03eb031c5655642edbc0a0f8ea11353c153c071dddba9847fd942fffa29335e35269a9401cb81e818497d9ef189769e2e91881e3e70a04fdaaf134770cb9190a78325c1834da0c2b8a36bf3a108c3f61cefd0b207ce2fae40b32d319fef99e1d390dcfe1a04e49f20b88e84dc23ec0ff4bd3782a4812f1dbae1731d08d8cebb423e233f6d0f01b971a1b8713cc961128a22ff04a6fdeee6cdc3d02e87503aad8d1429af6be4a07226af440"}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000020c0)={0x10, 0x6, &(0x7f0000001f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x0, 0xe, 0xb, 0x5, 0x1c, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}]}, &(0x7f0000001f80)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0xdfcf8bcd1fb82a20, '\x00', r7, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001fc0)=[r5, r3, r5], &(0x7f0000002000)=[{0x3, 0x5, 0x5, 0x6}, {0x1, 0x4, 0xf}, {0x5, 0x4, 0x2, 0x2}, {0x2, 0x4, 0x7, 0xa}, {0x1, 0x4, 0x3, 0x7}, {0x3, 0x1, 0x0, 0x1}, {0x3, 0x1, 0x1, 0xb}, {0x0, 0x1, 0xc, 0x8}, {0x2, 0x2, 0x7, 0x9}, {0x2, 0x4, 0x2, 0x5}], 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000002180)={0x4, 0x80, 0x3, 0x2, 0x6, 0x9, 0x0, 0xffffffffffffffc0, 0x5000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0x1e97}, 0x8822, 0xba, 0x1, 0x5, 0x8, 0x16, 0x10, 0x0, 0x2, 0x0, 0x33d8}) r13 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000023c0)=@bpf_lsm={0x1d, 0xa, &(0x7f0000002200)=@raw=[@exit, @jmp={0x5, 0x1, 0x1, 0x2, 0x3, 0x80, 0x4}, @ringbuf_query, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @exit, @cb_func={0x18, 0xa, 0x4, 0x0, 0x2}], &(0x7f0000002280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f00000022c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000002300)={0x2, 0x9, 0xf, 0x8001}, 0x10, 0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000002340)=[{0x4, 0x1, 0xe, 0xb}, {0x3, 0x3, 0x9, 0xc}, {0x2, 0x1, 0x4}, {0x5, 0x1, 0xd, 0x3}, {0x2, 0x5, 0x5, 0xb}, {0x4, 0x1, 0xd, 0x6}, {0x1, 0x5, 0xc, 0x4}, {0x5, 0x4, 0x3, 0x1}], 0x10, 0x4}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000002480)={'gretap0\x00', @random="0603ba85ed0c"}) perf_event_open(&(0x7f0000002500)={0x3, 0x80, 0x7, 0x40, 0x6, 0xa, 0x0, 0x100, 0x2802, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000024c0), 0xc}, 0x1306, 0xc, 0xfffffffc, 0x3, 0x5, 0x5, 0xc3d, 0x0, 0xb6, 0x0, 0x9}, r6, 0x1, 0xffffffffffffffff, 0xb) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000002580)=r13, 0x4) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002840)=@generic={&(0x7f0000002800)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0xc, 0x1a, &(0x7f00000025c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1b04a8c7, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000026c0)='GPL\x00', 0x3, 0x7b, &(0x7f0000002700)=""/123, 0xc1100, 0x2, '\x00', r7, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000002780)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000027c0)={0x0, 0x8, 0x3, 0xfffffffb}, 0x10, r8, r1, 0x6, &(0x7f00000028c0)=[r14, r9, 0xffffffffffffffff, r3, r10], &(0x7f0000002900)=[{0x5, 0x2, 0xa, 0x7}, {0x5, 0x2, 0xe, 0xb}, {0x3, 0x7, 0x4}, {0x0, 0x1, 0x6, 0x6}, {0x5, 0x2, 0x5, 0xc}, {0x2, 0x5, 0x24, 0xa}], 0x10, 0x800}, 0x94) 410.711256ms ago: executing program 3 (id=1079): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0xed}, 0x92f5e}, 0x6d) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f00000003c0), &(0x7f0000000600)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 402.653186ms ago: executing program 0 (id=1080): close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x825, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40049409, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'erspan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000480)=ANY=[], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x1060, 0x0, 0x7, 0x0, 0x576, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x1060, 0x0, 0x7, 0x0, 0x576, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@rights={{0x10}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x80}, 0x100) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000400), &(0x7f0000000480)=r3}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 345.002996ms ago: executing program 4 (id=1082): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@float={0x1, 0x300, 0x0, 0x10, 0x10}]}}, &(0x7f0000000900)=""/252, 0x26, 0xfc, 0x1}, 0x28) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000008000400000001b000010000000000000000055804b8cc9"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000940)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(r0, 0x0, 0xfffffeff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@float={0x1, 0x300, 0x0, 0x10, 0x10}]}}, &(0x7f0000000900)=""/252, 0x26, 0xfc, 0x1}, 0x28) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) (async) close(r0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) (async) close(r1) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000008000400000001b000010000000000000000055804b8cc9"], 0x50) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000940)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) (async) write$cgroup_devices(r0, 0x0, 0xfffffeff) (async) 273.865467ms ago: executing program 1 (id=1083): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pimreg\x00', 0x2}) (async) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000001c0)={'ip6erspan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}}) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)='/proc/0\x01\x00\x00\x19\xd9_,\xae\xf4t\x00AE\xf44'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009c00000095", @ANYRESHEX=r0, @ANYRESHEX=r0], &(0x7f0000000180)='GPL\x00', 0x3, 0xf0, &(0x7f0000000340)=""/240, 0x0, 0x4c, '\x00', r1}, 0x94) 231.845017ms ago: executing program 4 (id=1084): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c30000000000000095"], &(0x7f0000000100)='GPL\x00', 0x5, 0xaf, &(0x7f0000000140)=""/235}, 0x94) (async, rerun: 64) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x3, 0x0, 0x0) (async) r0 = gettid() perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000340)='%d\x1e\x00\x00\x00j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x0f\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 E\xaaC\xc388\x13\xc6H\x0f \x03\x86\xb5\xbfq\'\xab!\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdf\xde\x91\xfd\xf1B*j\n\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00", @ANYRESDEC=r1, @ANYRES64=r1, @ANYRES64=r2, @ANYRES64=0x0, @ANYRES16=r2, @ANYRES64=r2, @ANYRES16, @ANYRESOCT=r1], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) (async, rerun: 32) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x7, 0x2}, 0x0, 0x400000, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r4) (async) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0xf6, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x140, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) 218.594558ms ago: executing program 4 (id=1085): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="010000004200000006000000080000bf00000000cca9ef3e57bcfd699b7b6a4d88cbaddc8648146b287feceb60bedb2f763545751188b22d55e4b440c134eed7a33c9f2c", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c000000e57f0000000000", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r3, &(0x7f00000007c0)="74ff155eab"}, 0x20) close(r1) (async, rerun: 32) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'\x00', 0x20}) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00005f2e12", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r4, &(0x7f0000000280)="325c0e43f6d6421fad057322e53ac5ac7791fc577a761c0d720f91da6cfea7c8e321c4829b4137f8f97be1b15510a62a50f2b90194c329745b46d2d395f799a585f16e8a6acf2e3a5130ac45ce9278ff0be9064dab8b3c3df82985ff99ed610047020f94cd35d1e7024076606ee7c9f7c14725d122a783c39a4141bd6d5b2f32ff993157775ee7b41d86fa5ec09cbaa512697962484e9ea56c24947136cc422d65ea13c9de9f2aa651617391c4e23a91381582f74ae1bc17ed440e2a6c88bcaac144da96b0c12642940507cb9eccb189c83d61763eabb16b6fc338983b2de1c5383d3de3285d52c93d57b27a1b602b", &(0x7f0000000380)=""/165}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000181100"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="180005009101a9ad5f000000000000000700000000000001217fff7f0100e600feff0000000a950098b7beacbab7e6c964819782912cd9a29517dc1020c6636c0eba825414f176"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x94) 175.669028ms ago: executing program 4 (id=1086): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40200000000000061114c0000000000850000005300000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000400000004000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 173.001128ms ago: executing program 4 (id=1087): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0, 0x9}, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 69.798119ms ago: executing program 4 (id=1088): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xa, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000005000000000000000000000085000000270000001801000020646c2500000000402020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff850000007300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000001440)=ANY=[@ANYBLOB="9feb0100180000000000000020000000200000000500000000000000010000130800000002000000f96100000100000000000010100000000000717f00"], &(0x7f0000000900)=""/252, 0x3d, 0xfc, 0x1}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r12, 0x0, 0xe, 0x0, &(0x7f00000001c0)="7a7fa22c2aff88d753ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 69.388579ms ago: executing program 1 (id=1089): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x140, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x140, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x80) (async) recvmsg$unix(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x22, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb0c4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @ldst={0x1, 0x3, 0x6, 0x1, 0xa, 0x4, 0xfffffffffffffffc}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x47}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x0, 0x7, 0xb, 0x0, 0x10}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x60, &(0x7f0000000300)=""/96, 0x41100, 0x8, '\x00', 0x0, 0x1b, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0xe, 0x5, 0xc30a}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0xd, 0x4}, {0x2, 0x5, 0xc, 0x9}, {0x3, 0x1, 0xb, 0xa}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x4240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x8, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013b00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) (async) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./cgroup/../file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000010000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000010000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 1 (id=1090): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000030000000000000000400000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000100008500000004000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3d, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.172' (ED25519) to the list of known hosts. [ 23.296868][ T28] audit: type=1400 audit(1778027416.408:64): avc: denied { mounton } for pid=279 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.298024][ T279] cgroup: Unknown subsys name 'net' [ 23.319515][ T28] audit: type=1400 audit(1778027416.408:65): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.347713][ T28] audit: type=1400 audit(1778027416.438:66): avc: denied { unmount } for pid=279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.347918][ T279] cgroup: Unknown subsys name 'devices' [ 23.492306][ T279] cgroup: Unknown subsys name 'hugetlb' [ 23.498009][ T279] cgroup: Unknown subsys name 'rlimit' [ 23.599704][ T28] audit: type=1400 audit(1778027416.708:67): avc: denied { setattr } for pid=279 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.623014][ T28] audit: type=1400 audit(1778027416.708:68): avc: denied { mounton } for pid=279 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.648147][ T28] audit: type=1400 audit(1778027416.708:69): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.657221][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.680515][ T28] audit: type=1400 audit(1778027416.788:70): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.706701][ T28] audit: type=1400 audit(1778027416.788:71): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.745453][ T28] audit: type=1400 audit(1778027416.858:72): avc: denied { read } for pid=279 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.771641][ T28] audit: type=1400 audit(1778027416.858:73): avc: denied { open } for pid=279 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.771931][ T279] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.438560][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.445762][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.453236][ T287] device bridge_slave_0 entered promiscuous mode [ 24.460271][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.467350][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.474752][ T287] device bridge_slave_1 entered promiscuous mode [ 24.537419][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.544565][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.551965][ T288] device bridge_slave_0 entered promiscuous mode [ 24.559970][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.567159][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.574725][ T288] device bridge_slave_1 entered promiscuous mode [ 24.671493][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.678588][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.686160][ T290] device bridge_slave_0 entered promiscuous mode [ 24.694662][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.701738][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.709164][ T290] device bridge_slave_1 entered promiscuous mode [ 24.749782][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.756891][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.764387][ T289] device bridge_slave_0 entered promiscuous mode [ 24.774384][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.781739][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.789158][ T289] device bridge_slave_1 entered promiscuous mode [ 24.809108][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.816293][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.824792][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.832013][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.861205][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.868261][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.875686][ T292] device bridge_slave_0 entered promiscuous mode [ 24.882993][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.890108][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.897528][ T292] device bridge_slave_1 entered promiscuous mode [ 24.975671][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.983000][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.990269][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.997332][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.023931][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.031445][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.039470][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.046997][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.054968][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.062625][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.097859][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.107160][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.114230][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.121626][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.129896][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.137037][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.165697][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.184756][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.207366][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.215337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.224047][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.233067][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.240457][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.248365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.256703][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.263745][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.271251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.298809][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.307390][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.314567][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.322337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.331427][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.338548][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.346593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.354676][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.367524][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.378728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.395104][ T287] device veth0_vlan entered promiscuous mode [ 25.407877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.416406][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.424660][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.432371][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.441133][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.449458][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.457563][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.470279][ T290] device veth0_vlan entered promiscuous mode [ 25.482729][ T287] device veth1_macvtap entered promiscuous mode [ 25.490664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.498843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.506928][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.515532][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.524136][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.531193][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.538905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.547262][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.555409][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.562474][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.569899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.578301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.586877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.594621][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.602144][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.609539][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.619970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.628409][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.636643][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.643693][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.652243][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.660818][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.669053][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.676101][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.692197][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.700439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.708697][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.717300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.725900][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.734465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.744908][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.753340][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.765219][ T290] device veth1_macvtap entered promiscuous mode [ 25.780737][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.789102][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.797329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.806252][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.814433][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.823029][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.831554][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.840378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.856610][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 25.870344][ T288] device veth0_vlan entered promiscuous mode [ 25.888475][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.897618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.906558][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.916295][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.925226][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.933373][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.941770][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.950382][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.959493][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.967206][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.984213][ T288] device veth1_macvtap entered promiscuous mode [ 25.996728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.005797][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.014682][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.024984][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.033571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.054670][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.063218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.085422][ T289] device veth0_vlan entered promiscuous mode [ 26.092530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.100269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.108166][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.117117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.126499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.135003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.147994][ T292] device veth0_vlan entered promiscuous mode [ 26.156921][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.165632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.174350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.182858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.221381][ T292] device veth1_macvtap entered promiscuous mode [ 26.239706][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.253170][ T320] Driver unsupported XDP return value 0 on prog (id 3) dev N/A, expect packet loss! [ 26.284253][ T318] device syzkaller0 entered promiscuous mode [ 26.294239][ T289] device veth1_macvtap entered promiscuous mode [ 26.302159][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.310443][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.318872][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.327718][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.336569][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.366260][ T323] device sit0 entered promiscuous mode [ 26.402974][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.421143][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.448555][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.459627][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.500089][ C0] hrtimer: interrupt took 11473 ns [ 27.047770][ T345] device syzkaller0 entered promiscuous mode [ 27.138448][ T349] device wg2 entered promiscuous mode [ 27.665617][ T366] device wg2 left promiscuous mode [ 27.890580][ T372] device wg2 entered promiscuous mode [ 28.166718][ T382] bridge0: port 3(team_slave_1) entered blocking state [ 28.197511][ T382] bridge0: port 3(team_slave_1) entered disabled state [ 28.279197][ T382] device team_slave_1 entered promiscuous mode [ 28.586575][ T386] -: renamed from syzkaller0 [ 28.690266][ T399] IPv6: pim6reg1: Disabled Multicast RS [ 29.001972][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 29.002021][ T28] audit: type=1400 audit(1778027422.118:119): avc: denied { tracepoint } for pid=405 comm="syz.4.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.106107][ T28] audit: type=1400 audit(1778027422.168:120): avc: denied { create } for pid=405 comm="syz.4.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.109918][ T412] device syzkaller0 entered promiscuous mode [ 29.281682][ T417] device wg2 entered promiscuous mode [ 29.616149][ T419] device veth0_vlan left promiscuous mode [ 29.631236][ T419] device veth0_vlan entered promiscuous mode [ 29.658679][ T420] device sit0 entered promiscuous mode [ 29.779440][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.804418][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.928030][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.207930][ T475] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.216104][ T475] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.471378][ T479] device bridge_slave_1 left promiscuous mode [ 32.477646][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.529824][ T479] device bridge_slave_0 left promiscuous mode [ 32.630746][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.768196][ T610] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.776321][ T610] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.096524][ T615] device bridge_slave_1 left promiscuous mode [ 36.270682][ T615] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.446554][ T615] device bridge_slave_0 left promiscuous mode [ 36.545758][ T615] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.584734][ T28] audit: type=1400 audit(1778027429.698:121): avc: denied { create } for pid=618 comm="syz.4.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.675909][ T28] audit: type=1400 audit(1778027429.768:122): avc: denied { create } for pid=631 comm="syz.3.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 36.847926][ T28] audit: type=1400 audit(1778027429.958:123): avc: denied { append } for pid=631 comm="syz.3.83" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.980138][ T629] device veth0_vlan left promiscuous mode [ 37.000294][ T629] device veth0_vlan entered promiscuous mode [ 37.116039][ T634] device veth1_macvtap left promiscuous mode [ 37.167592][ T635] device veth1_macvtap entered promiscuous mode [ 37.209186][ T635] device macsec0 entered promiscuous mode [ 37.430922][ T642] IPv6: pim6reg1: Disabled Multicast RS [ 39.921132][ T28] audit: type=1400 audit(1778027433.038:124): avc: denied { create } for pid=724 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 40.084863][ T721] device syzkaller0 entered promiscuous mode [ 40.181681][ T723] device syzkaller0 left promiscuous mode [ 40.238083][ T721] device syzkaller0 entered promiscuous mode [ 40.339844][ T733] device syzkaller0 entered promiscuous mode [ 41.323763][ T780] bridge0: port 4(ip6gretap0) entered blocking state [ 41.380248][ T780] bridge0: port 4(ip6gretap0) entered disabled state [ 41.476084][ T780] device ip6gretap0 entered promiscuous mode [ 41.508953][ T780] bridge0: port 4(ip6gretap0) entered blocking state [ 41.515854][ T780] bridge0: port 4(ip6gretap0) entered forwarding state [ 41.655172][ T786] device ip6gretap0 left promiscuous mode [ 41.686404][ T786] bridge0: port 4(ip6gretap0) entered disabled state [ 41.964801][ T796] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.972120][ T796] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.944060][ T28] audit: type=1400 audit(1778027436.058:125): avc: denied { create } for pid=810 comm="syz.3.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.135234][ T814] device syzkaller0 entered promiscuous mode [ 43.614812][ T822] syz.3.137 (822) used obsolete PPPIOCDETACH ioctl [ 43.841831][ T826] device veth1_macvtap left promiscuous mode [ 43.872298][ T826] device macsec0 entered promiscuous mode [ 44.113063][ T829] device veth1_macvtap entered promiscuous mode [ 44.245432][ T841] device syzkaller0 entered promiscuous mode [ 46.211580][ T903] device syzkaller0 entered promiscuous mode [ 46.823027][ T28] audit: type=1400 audit(1778027439.938:126): avc: denied { create } for pid=930 comm="syz.4.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 46.897217][ T28] audit: type=1400 audit(1778027439.998:127): avc: denied { create } for pid=941 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.328487][ T28] audit: type=1400 audit(1778027440.438:128): avc: denied { create } for pid=959 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.503774][ T956] device syzkaller0 entered promiscuous mode [ 47.862283][ T975] GPL: port 1(dummy0) entered blocking state [ 47.912771][ T975] GPL: port 1(dummy0) entered disabled state [ 47.942508][ T975] device dummy0 entered promiscuous mode [ 49.838166][ T1070] FAULT_INJECTION: forcing a failure. [ 49.838166][ T1070] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 49.862600][ T1070] CPU: 1 PID: 1070 Comm: syz.0.208 Not tainted syzkaller #0 [ 49.870007][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 49.880168][ T1070] Call Trace: [ 49.883449][ T1070] [ 49.886396][ T1070] __dump_stack+0x21/0x24 [ 49.890762][ T1070] dump_stack_lvl+0x110/0x170 [ 49.895439][ T1070] ? __cfi_dump_stack_lvl+0x8/0x8 [ 49.900475][ T1070] ? memcpy+0x56/0x70 [ 49.904458][ T1070] dump_stack+0x15/0x24 [ 49.908623][ T1070] should_fail_ex+0x3d4/0x520 [ 49.913340][ T1070] should_fail+0xb/0x10 [ 49.917512][ T1070] should_fail_usercopy+0x1a/0x20 [ 49.922629][ T1070] strncpy_from_user+0x24/0x2d0 [ 49.927488][ T1070] bpf_prog_load+0x1fe/0x16a0 [ 49.932209][ T1070] ? map_freeze+0x390/0x390 [ 49.936731][ T1070] ? selinux_bpf+0xc7/0xf0 [ 49.941194][ T1070] ? security_bpf+0x93/0xb0 [ 49.945750][ T1070] __sys_bpf+0x57b/0x850 [ 49.950018][ T1070] ? bpf_link_show_fdinfo+0x330/0x330 [ 49.955402][ T1070] ? __cfi_ksys_write+0x10/0x10 [ 49.960261][ T1070] ? do_user_addr_fault+0x9ac/0x1050 [ 49.965651][ T1070] ? debug_smp_processor_id+0x17/0x20 [ 49.971043][ T1070] __x64_sys_bpf+0x7c/0x90 [ 49.975475][ T1070] x64_sys_call+0x488/0x9a0 [ 49.979990][ T1070] do_syscall_64+0x4c/0xa0 [ 49.984423][ T1070] ? clear_bhb_loop+0x30/0x80 [ 49.989110][ T1070] ? clear_bhb_loop+0x30/0x80 [ 49.993806][ T1070] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.999719][ T1070] RIP: 0033:0x7f5f6bb9cdd9 [ 50.004161][ T1070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.024644][ T1070] RSP: 002b:00007f5f6c9cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.033067][ T1070] RAX: ffffffffffffffda RBX: 00007f5f6be15fa0 RCX: 00007f5f6bb9cdd9 [ 50.041136][ T1070] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 50.049122][ T1070] RBP: 00007f5f6c9cf090 R08: 0000000000000000 R09: 0000000000000000 [ 50.057100][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.065092][ T1070] R13: 00007f5f6be16038 R14: 00007f5f6be15fa0 R15: 00007fffe735b4d8 [ 50.073080][ T1070] [ 50.079330][ T28] audit: type=1400 audit(1778027443.188:129): avc: denied { create } for pid=1073 comm="syz.3.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 50.384106][ T1114] FAULT_INJECTION: forcing a failure. [ 50.384106][ T1114] name failslab, interval 1, probability 0, space 0, times 1 [ 50.437333][ T1114] CPU: 0 PID: 1114 Comm: syz.2.224 Not tainted syzkaller #0 [ 50.444721][ T1114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 50.454786][ T1114] Call Trace: [ 50.458081][ T1114] [ 50.461023][ T1114] __dump_stack+0x21/0x24 [ 50.465541][ T1114] dump_stack_lvl+0x110/0x170 [ 50.470318][ T1114] ? __cfi_dump_stack_lvl+0x8/0x8 [ 50.475438][ T1114] ? avc_has_perm+0x163/0x250 [ 50.480308][ T1114] dump_stack+0x15/0x24 [ 50.484508][ T1114] should_fail_ex+0x3d4/0x520 [ 50.489378][ T1114] __should_failslab+0xac/0xf0 [ 50.494154][ T1114] ? __get_vm_area_node+0x12c/0x360 [ 50.499367][ T1114] should_failslab+0x9/0x20 [ 50.503878][ T1114] __kmem_cache_alloc_node+0x3d/0x2c0 [ 50.509264][ T1114] ? __get_vm_area_node+0x12c/0x360 [ 50.514468][ T1114] kmalloc_node_trace+0x26/0xb0 [ 50.519325][ T1114] __get_vm_area_node+0x12c/0x360 [ 50.524359][ T1114] __vmalloc_node_range+0x326/0x1430 [ 50.529665][ T1114] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 50.535223][ T1114] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 50.541047][ T1114] ? __stack_depot_save+0x36/0x480 [ 50.546181][ T1114] ? __cfi___vmalloc_node_range+0x10/0x10 [ 50.551923][ T1114] ? __cfi_selinux_capable+0x10/0x10 [ 50.557221][ T1114] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 50.562782][ T1114] __vmalloc+0x79/0x90 [ 50.566956][ T1114] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 50.572534][ T1114] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 50.577920][ T1114] bpf_prog_alloc+0x22/0x1c0 [ 50.582523][ T1114] bpf_prog_load+0x825/0x16a0 [ 50.587255][ T1114] ? map_freeze+0x390/0x390 [ 50.591787][ T1114] ? selinux_bpf+0xc7/0xf0 [ 50.596427][ T1114] ? security_bpf+0x93/0xb0 [ 50.601210][ T1114] __sys_bpf+0x57b/0x850 [ 50.605461][ T1114] ? bpf_link_show_fdinfo+0x330/0x330 [ 50.610833][ T1114] ? __cfi_ksys_write+0x10/0x10 [ 50.615671][ T1114] ? do_user_addr_fault+0x9ac/0x1050 [ 50.620966][ T1114] ? debug_smp_processor_id+0x17/0x20 [ 50.626340][ T1114] __x64_sys_bpf+0x7c/0x90 [ 50.630829][ T1114] x64_sys_call+0x488/0x9a0 [ 50.635715][ T1114] do_syscall_64+0x4c/0xa0 [ 50.640226][ T1114] ? clear_bhb_loop+0x30/0x80 [ 50.644969][ T1114] ? clear_bhb_loop+0x30/0x80 [ 50.649640][ T1114] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 50.655531][ T1114] RIP: 0033:0x7fd05059cdd9 [ 50.659930][ T1114] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.679536][ T1114] RSP: 002b:00007fd051509028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.687946][ T1114] RAX: ffffffffffffffda RBX: 00007fd050815fa0 RCX: 00007fd05059cdd9 [ 50.696015][ T1114] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 50.704182][ T1114] RBP: 00007fd051509090 R08: 0000000000000000 R09: 0000000000000000 [ 50.712336][ T1114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.720381][ T1114] R13: 00007fd050816038 R14: 00007fd050815fa0 R15: 00007ffea3e7c878 [ 50.728346][ T1114] [ 50.740598][ T1114] syz.2.224: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 50.830074][ T1134] device vlan1 entered promiscuous mode [ 51.006771][ T1114] CPU: 1 PID: 1114 Comm: syz.2.224 Not tainted syzkaller #0 [ 51.014344][ T1114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 51.024931][ T1114] Call Trace: [ 51.028390][ T1114] [ 51.031320][ T1114] __dump_stack+0x21/0x24 [ 51.035662][ T1114] dump_stack_lvl+0x110/0x170 [ 51.040629][ T1114] ? __cfi_dump_stack_lvl+0x8/0x8 [ 51.046121][ T1114] ? pr_cont_kernfs_name+0x133/0x160 [ 51.051534][ T1114] dump_stack+0x15/0x24 [ 51.056017][ T1114] warn_alloc+0x1dc/0x200 [ 51.060567][ T1114] ? should_failslab+0x9/0x20 [ 51.065519][ T1114] ? __cfi_warn_alloc+0x10/0x10 [ 51.070406][ T1114] ? kmalloc_node_trace+0x3d/0xb0 [ 51.075458][ T1114] ? __get_vm_area_node+0x353/0x360 [ 51.080668][ T1114] __vmalloc_node_range+0x34b/0x1430 [ 51.085986][ T1114] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 51.092423][ T1114] ? __stack_depot_save+0x36/0x480 [ 51.097565][ T1114] ? __cfi___vmalloc_node_range+0x10/0x10 [ 51.104260][ T1114] ? __cfi_selinux_capable+0x10/0x10 [ 51.109663][ T1114] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 51.115314][ T1114] __vmalloc+0x79/0x90 [ 51.119503][ T1114] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 51.125288][ T1114] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 51.130774][ T1114] bpf_prog_alloc+0x22/0x1c0 [ 51.136353][ T1114] bpf_prog_load+0x825/0x16a0 [ 51.141623][ T1114] ? map_freeze+0x390/0x390 [ 51.146783][ T1114] ? selinux_bpf+0xc7/0xf0 [ 51.151502][ T1114] ? security_bpf+0x93/0xb0 [ 51.156225][ T1114] __sys_bpf+0x57b/0x850 [ 51.160766][ T1114] ? bpf_link_show_fdinfo+0x330/0x330 [ 51.166381][ T1114] ? __cfi_ksys_write+0x10/0x10 [ 51.171525][ T1114] ? do_user_addr_fault+0x9ac/0x1050 [ 51.177365][ T1114] ? debug_smp_processor_id+0x17/0x20 [ 51.182768][ T1114] __x64_sys_bpf+0x7c/0x90 [ 51.187383][ T1114] x64_sys_call+0x488/0x9a0 [ 51.191904][ T1114] do_syscall_64+0x4c/0xa0 [ 51.196342][ T1114] ? clear_bhb_loop+0x30/0x80 [ 51.201042][ T1114] ? clear_bhb_loop+0x30/0x80 [ 51.205822][ T1114] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 51.211808][ T1114] RIP: 0033:0x7fd05059cdd9 [ 51.216375][ T1114] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 51.236527][ T1114] RSP: 002b:00007fd051509028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.244961][ T1114] RAX: ffffffffffffffda RBX: 00007fd050815fa0 RCX: 00007fd05059cdd9 [ 51.252958][ T1114] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 51.260978][ T1114] RBP: 00007fd051509090 R08: 0000000000000000 R09: 0000000000000000 [ 51.268969][ T1114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.276957][ T1114] R13: 00007fd050816038 R14: 00007fd050815fa0 R15: 00007ffea3e7c878 [ 51.284948][ T1114] [ 51.313468][ T1114] Mem-Info: [ 51.316667][ T1114] active_anon:42577 inactive_anon:0 isolated_anon:0 [ 51.316667][ T1114] active_file:25707 inactive_file:2291 isolated_file:0 [ 51.316667][ T1114] unevictable:0 dirty:381 writeback:0 [ 51.316667][ T1114] slab_reclaimable:7997 slab_unreclaimable:77527 [ 51.316667][ T1114] mapped:42389 shmem:37111 pagetables:797 [ 51.316667][ T1114] sec_pagetables:0 bounce:0 [ 51.316667][ T1114] kernel_misc_reclaimable:0 [ 51.316667][ T1114] free:1476626 free_pcp:6885 free_cma:0 [ 54.162281][ T1114] Node 0 active_anon:178220kB inactive_anon:0kB active_file:102828kB inactive_file:9164kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:169548kB dirty:1524kB writeback:0kB shmem:156308kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4520kB pagetables:3232kB sec_pagetables:0kB all_unreclaimable? no [ 54.243725][ T1114] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971884kB mlocked:0kB bounce:0kB free_pcp:5400kB local_pcp:5344kB free_cma:0kB [ 54.274449][ T1114] lowmem_reserve[]: 0 3932 3932 3932 [ 54.280600][ T1114] Normal free:2915936kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:184340kB inactive_anon:0kB active_file:102828kB inactive_file:9164kB unevictable:0kB writepending:1524kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:22960kB local_pcp:5484kB free_cma:0kB [ 54.287951][ T1154] device syzkaller0 entered promiscuous mode [ 54.310829][ T1114] lowmem_reserve[]: 0 0 0 0 [ 54.343972][ T1114] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 54.363532][ T1114] Normal: 25*4kB (ME) 86*8kB (UE) 253*16kB (UE) 1*32kB (U) 724*64kB (ME) 391*128kB (ME) 158*256kB (M) 62*512kB (ME) 6*1024kB (ME) 3*2048kB (UME) 665*4096kB (M) = 2909572kB [ 54.382515][ T1114] 70219 total pagecache pages [ 54.388037][ T1114] 0 pages in swap cache [ 54.392965][ T1114] Free swap = 124996kB [ 54.397433][ T1114] Total swap = 124996kB [ 54.401671][ T1114] 2097051 pages RAM [ 54.405639][ T1114] 0 pages HighMem/MovableOnly [ 54.410375][ T1114] 347480 pages reserved [ 54.511885][ T1114] 0 pages cma reserved [ 54.667913][ T1171] device syzkaller0 entered promiscuous mode [ 54.834406][ T1171] pimreg: tun_chr_ioctl cmd 35092 [ 54.869564][ T1172] device syzkaller0 entered promiscuous mode [ 54.977951][ T1182] IPv6: : Disabled Multicast RS [ 55.399520][ T1203] FAULT_INJECTION: forcing a failure. [ 55.399520][ T1203] name failslab, interval 1, probability 0, space 0, times 0 [ 55.430618][ T1203] CPU: 1 PID: 1203 Comm: syz.0.253 Not tainted syzkaller #0 [ 55.437951][ T1203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 55.448116][ T1203] Call Trace: [ 55.451429][ T1203] [ 55.454467][ T1203] __dump_stack+0x21/0x24 [ 55.458990][ T1203] dump_stack_lvl+0x110/0x170 [ 55.463868][ T1203] ? __cfi_dump_stack_lvl+0x8/0x8 [ 55.468934][ T1203] ? kasan_save_alloc_info+0x25/0x30 [ 55.474238][ T1203] ? __kasan_kmalloc+0x95/0xb0 [ 55.479026][ T1203] dump_stack+0x15/0x24 [ 55.483218][ T1203] should_fail_ex+0x3d4/0x520 [ 55.488091][ T1203] ? build_skb+0x2a/0x220 [ 55.492868][ T1203] __should_failslab+0xac/0xf0 [ 55.497779][ T1203] should_failslab+0x9/0x20 [ 55.502385][ T1203] kmem_cache_alloc+0x3b/0x330 [ 55.507166][ T1203] build_skb+0x2a/0x220 [ 55.511345][ T1203] bpf_prog_test_run_skb+0x39b/0x12c0 [ 55.516922][ T1203] ? __fget_files+0x2d5/0x330 [ 55.521809][ T1203] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 55.527725][ T1203] bpf_prog_test_run+0x3e3/0x640 [ 55.532768][ T1203] ? bpf_prog_query+0x270/0x270 [ 55.537709][ T1203] ? selinux_bpf+0xce/0xf0 [ 55.542220][ T1203] ? security_bpf+0x93/0xb0 [ 55.546737][ T1203] __sys_bpf+0x5ee/0x850 [ 55.550980][ T1203] ? bpf_link_show_fdinfo+0x330/0x330 [ 55.556367][ T1203] ? __cfi_ksys_write+0x10/0x10 [ 55.561265][ T1203] ? debug_smp_processor_id+0x17/0x20 [ 55.566638][ T1203] __x64_sys_bpf+0x7c/0x90 [ 55.571055][ T1203] x64_sys_call+0x488/0x9a0 [ 55.575579][ T1203] do_syscall_64+0x4c/0xa0 [ 55.580086][ T1203] ? clear_bhb_loop+0x30/0x80 [ 55.584853][ T1203] ? clear_bhb_loop+0x30/0x80 [ 55.589552][ T1203] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 55.595464][ T1203] RIP: 0033:0x7f5f6bb9cdd9 [ 55.599890][ T1203] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 55.619497][ T1203] RSP: 002b:00007f5f6c9cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.627936][ T1203] RAX: ffffffffffffffda RBX: 00007f5f6be15fa0 RCX: 00007f5f6bb9cdd9 [ 55.635940][ T1203] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 55.643914][ T1203] RBP: 00007f5f6c9cf090 R08: 0000000000000000 R09: 0000000000000000 [ 55.651907][ T1203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.659889][ T1203] R13: 00007f5f6be16038 R14: 00007f5f6be15fa0 R15: 00007fffe735b4d8 [ 55.667902][ T1203] [ 55.742486][ T1213] IPv6: pim6reg1: Disabled Multicast RS [ 55.881317][ T1223] bY4`Ҙ: renamed from lo [ 55.906462][ T1199] device veth1_macvtap left promiscuous mode [ 55.936518][ T1199] device macsec0 entered promiscuous mode [ 56.601998][ T1246] IPv6: pim6reg1: Disabled Multicast RS [ 56.621054][ T1247] device wg2 left promiscuous mode [ 56.729533][ T1245] device wg2 entered promiscuous mode [ 56.836013][ T1259] FAULT_INJECTION: forcing a failure. [ 56.836013][ T1259] name failslab, interval 1, probability 0, space 0, times 0 [ 56.954197][ T1259] CPU: 1 PID: 1259 Comm: syz.3.273 Not tainted syzkaller #0 [ 56.962320][ T1259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 56.972471][ T1259] Call Trace: [ 56.975757][ T1259] [ 56.978956][ T1259] __dump_stack+0x21/0x24 [ 56.983563][ T1259] dump_stack_lvl+0x110/0x170 [ 56.988262][ T1259] ? __cfi_dump_stack_lvl+0x8/0x8 [ 56.993301][ T1259] dump_stack+0x15/0x24 [ 56.997477][ T1259] should_fail_ex+0x3d4/0x520 [ 57.002172][ T1259] ? skb_clone+0x1f5/0x380 [ 57.007210][ T1259] __should_failslab+0xac/0xf0 [ 57.012007][ T1259] should_failslab+0x9/0x20 [ 57.016711][ T1259] kmem_cache_alloc+0x3b/0x330 [ 57.021584][ T1259] ? unwind_get_return_address+0x4d/0x90 [ 57.027367][ T1259] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 57.034345][ T1259] skb_clone+0x1f5/0x380 [ 57.039056][ T1259] bpf_clone_redirect+0x180/0x500 [ 57.044099][ T1259] ? stack_trace_save+0xa6/0xf0 [ 57.049005][ T1259] bpf_prog_b36a1f39e2fdd4f4+0x56/0x5b [ 57.054579][ T1259] ? kasan_set_track+0x60/0x70 [ 57.059472][ T1259] ? kasan_set_track+0x4b/0x70 [ 57.064535][ T1259] ? kasan_save_alloc_info+0x25/0x30 [ 57.070102][ T1259] ? __kasan_slab_alloc+0x72/0x80 [ 57.075414][ T1259] ? slab_post_alloc_hook+0x4f/0x2d0 [ 57.081166][ T1259] ? kmem_cache_alloc+0x16e/0x330 [ 57.086489][ T1259] ? build_skb+0x2a/0x220 [ 57.091625][ T1259] ? bpf_prog_test_run_skb+0x39b/0x12c0 [ 57.097800][ T1259] ? bpf_prog_test_run+0x3e3/0x640 [ 57.102928][ T1259] ? __sys_bpf+0x5ee/0x850 [ 57.108278][ T1259] ? __x64_sys_bpf+0x7c/0x90 [ 57.112973][ T1259] ? x64_sys_call+0x488/0x9a0 [ 57.117765][ T1259] ? do_syscall_64+0x4c/0xa0 [ 57.122629][ T1259] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.129379][ T1259] ? ktime_get+0x141/0x170 [ 57.134044][ T1259] bpf_test_run+0x35f/0x940 [ 57.138587][ T1259] ? convert___skb_to_skb+0x5b0/0x5b0 [ 57.144097][ T1259] ? __cfi_eth_type_trans+0x10/0x10 [ 57.149496][ T1259] ? convert___skb_to_skb+0x40/0x5b0 [ 57.154812][ T1259] bpf_prog_test_run_skb+0xafb/0x12c0 [ 57.160315][ T1259] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 57.166230][ T1259] bpf_prog_test_run+0x3e3/0x640 [ 57.171307][ T1259] ? bpf_prog_query+0x270/0x270 [ 57.176707][ T1259] ? selinux_bpf+0xce/0xf0 [ 57.181502][ T1259] ? security_bpf+0x93/0xb0 [ 57.186123][ T1259] __sys_bpf+0x5ee/0x850 [ 57.190413][ T1259] ? bpf_link_show_fdinfo+0x330/0x330 [ 57.196242][ T1259] ? __cfi_ksys_write+0x10/0x10 [ 57.201414][ T1259] ? debug_smp_processor_id+0x17/0x20 [ 57.206817][ T1259] __x64_sys_bpf+0x7c/0x90 [ 57.211267][ T1259] x64_sys_call+0x488/0x9a0 [ 57.215891][ T1259] do_syscall_64+0x4c/0xa0 [ 57.220416][ T1259] ? clear_bhb_loop+0x30/0x80 [ 57.225115][ T1259] ? clear_bhb_loop+0x30/0x80 [ 57.229822][ T1259] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.235741][ T1259] RIP: 0033:0x7f2051f9cdd9 [ 57.240173][ T1259] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 57.260396][ T1259] RSP: 002b:00007f2052dec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.268840][ T1259] RAX: ffffffffffffffda RBX: 00007f2052215fa0 RCX: 00007f2051f9cdd9 [ 57.276930][ T1259] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 57.284928][ T1259] RBP: 00007f2052dec090 R08: 0000000000000000 R09: 0000000000000000 [ 57.294658][ T1259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.302995][ T1259] R13: 00007f2052216038 R14: 00007f2052215fa0 R15: 00007fff926a8be8 [ 57.310992][ T1259] [ 57.526058][ T28] audit: type=1400 audit(1778027450.638:130): avc: denied { setopt } for pid=1260 comm="syz.4.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 59.259633][ T28] audit: type=1400 audit(1778027452.368:131): avc: denied { associate } for pid=1314 comm="syz.0.295" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 59.275785][ T1319] device syzkaller0 entered promiscuous mode [ 59.604669][ T1345] device syzkaller0 entered promiscuous mode [ 60.477432][ T1418] FAULT_INJECTION: forcing a failure. [ 60.477432][ T1418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.530615][ T1418] CPU: 0 PID: 1418 Comm: syz.1.329 Not tainted syzkaller #0 [ 60.537965][ T1418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 60.548041][ T1418] Call Trace: [ 60.551322][ T1418] [ 60.554238][ T1418] __dump_stack+0x21/0x24 [ 60.559396][ T1418] dump_stack_lvl+0x110/0x170 [ 60.564118][ T1418] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.569482][ T1418] dump_stack+0x15/0x24 [ 60.573629][ T1418] should_fail_ex+0x3d4/0x520 [ 60.578294][ T1418] should_fail+0xb/0x10 [ 60.582443][ T1418] should_fail_usercopy+0x1a/0x20 [ 60.587469][ T1418] _copy_to_user+0x1e/0x90 [ 60.591878][ T1418] simple_read_from_buffer+0xe9/0x160 [ 60.597246][ T1418] proc_fail_nth_read+0x1a6/0x220 [ 60.602263][ T1418] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 60.607812][ T1418] ? security_file_permission+0x94/0xb0 [ 60.613470][ T1418] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 60.619019][ T1418] vfs_read+0x27a/0x910 [ 60.623192][ T1418] ? __cfi_vfs_read+0x10/0x10 [ 60.627879][ T1418] ? __kasan_check_write+0x14/0x20 [ 60.634295][ T1418] ? mutex_lock+0x93/0x1b0 [ 60.638820][ T1418] ? __cfi_mutex_lock+0x10/0x10 [ 60.643694][ T1418] ? __fdget_pos+0x2cd/0x380 [ 60.648301][ T1418] ? ksys_read+0x71/0x250 [ 60.652727][ T1418] ksys_read+0x149/0x250 [ 60.656962][ T1418] ? __cfi_ksys_read+0x10/0x10 [ 60.661835][ T1418] ? fput+0x154/0x1a0 [ 60.665820][ T1418] ? debug_smp_processor_id+0x17/0x20 [ 60.671187][ T1418] __x64_sys_read+0x7b/0x90 [ 60.675689][ T1418] x64_sys_call+0x2f/0x9a0 [ 60.680100][ T1418] do_syscall_64+0x4c/0xa0 [ 60.684509][ T1418] ? clear_bhb_loop+0x30/0x80 [ 60.689187][ T1418] ? clear_bhb_loop+0x30/0x80 [ 60.693896][ T1418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.699785][ T1418] RIP: 0033:0x7f752155d60e [ 60.704248][ T1418] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 60.724037][ T1418] RSP: 002b:00007f75223fefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 60.732552][ T1418] RAX: ffffffffffffffda RBX: 00007f75223ff6c0 RCX: 00007f752155d60e [ 60.740521][ T1418] RDX: 000000000000000f RSI: 00007f75223ff0a0 RDI: 0000000000000005 [ 60.748575][ T1418] RBP: 00007f75223ff090 R08: 0000000000000000 R09: 0000000000000000 [ 60.756541][ T1418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.764502][ T1418] R13: 00007f7521816038 R14: 00007f7521815fa0 R15: 00007ffcd738e3c8 [ 60.772560][ T1418] [ 60.860435][ T1429] FAULT_INJECTION: forcing a failure. [ 60.860435][ T1429] name failslab, interval 1, probability 0, space 0, times 0 [ 60.873396][ T1429] CPU: 1 PID: 1429 Comm: syz.2.332 Not tainted syzkaller #0 [ 60.880696][ T1429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 60.890844][ T1429] Call Trace: [ 60.894125][ T1429] [ 60.897488][ T1429] __dump_stack+0x21/0x24 [ 60.901841][ T1429] dump_stack_lvl+0x110/0x170 [ 60.907585][ T1429] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.912733][ T1429] ? skb_release_data+0x1d2/0x890 [ 60.917998][ T1429] ? skb_ensure_writable+0x2f8/0x470 [ 60.923382][ T1429] dump_stack+0x15/0x24 [ 60.927536][ T1429] should_fail_ex+0x3d4/0x520 [ 60.932382][ T1429] ? skb_clone+0x1f5/0x380 [ 60.937002][ T1429] __should_failslab+0xac/0xf0 [ 60.941781][ T1429] should_failslab+0x9/0x20 [ 60.946385][ T1429] kmem_cache_alloc+0x3b/0x330 [ 60.951417][ T1429] skb_clone+0x1f5/0x380 [ 60.955933][ T1429] bpf_clone_redirect+0x180/0x500 [ 60.961334][ T1429] bpf_prog_b36a1f39e2fdd4f4+0x56/0x5b [ 60.966885][ T1429] ? kasan_set_track+0x60/0x70 [ 60.971749][ T1429] ? kasan_set_track+0x4b/0x70 [ 60.976855][ T1429] ? kasan_save_alloc_info+0x25/0x30 [ 60.982143][ T1429] ? __kasan_slab_alloc+0x72/0x80 [ 60.987171][ T1429] ? slab_post_alloc_hook+0x4f/0x2d0 [ 60.992456][ T1429] ? kmem_cache_alloc+0x16e/0x330 [ 60.997484][ T1429] ? build_skb+0x2a/0x220 [ 61.001988][ T1429] ? bpf_prog_test_run_skb+0x39b/0x12c0 [ 61.007552][ T1429] ? bpf_prog_test_run+0x3e3/0x640 [ 61.012659][ T1429] ? __sys_bpf+0x5ee/0x850 [ 61.017202][ T1429] ? __x64_sys_bpf+0x7c/0x90 [ 61.021997][ T1429] ? x64_sys_call+0x488/0x9a0 [ 61.026683][ T1429] ? do_syscall_64+0x4c/0xa0 [ 61.031724][ T1429] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 61.037980][ T1429] ? __kasan_check_read+0x11/0x20 [ 61.042997][ T1429] ? bpf_test_timer_continue+0x147/0x4a0 [ 61.048645][ T1429] bpf_test_run+0x35f/0x940 [ 61.053861][ T1429] ? convert___skb_to_skb+0x5b0/0x5b0 [ 61.059255][ T1429] ? __cfi_eth_type_trans+0x10/0x10 [ 61.064655][ T1429] ? convert___skb_to_skb+0x40/0x5b0 [ 61.070117][ T1429] bpf_prog_test_run_skb+0xafb/0x12c0 [ 61.075641][ T1429] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 61.081741][ T1429] bpf_prog_test_run+0x3e3/0x640 [ 61.086939][ T1429] ? bpf_prog_query+0x270/0x270 [ 61.091956][ T1429] ? selinux_bpf+0xce/0xf0 [ 61.096637][ T1429] ? security_bpf+0x93/0xb0 [ 61.101683][ T1429] __sys_bpf+0x5ee/0x850 [ 61.106211][ T1429] ? bpf_link_show_fdinfo+0x330/0x330 [ 61.111603][ T1429] ? __cfi_ksys_write+0x10/0x10 [ 61.116456][ T1429] ? debug_smp_processor_id+0x17/0x20 [ 61.122007][ T1429] __x64_sys_bpf+0x7c/0x90 [ 61.126418][ T1429] x64_sys_call+0x488/0x9a0 [ 61.131277][ T1429] do_syscall_64+0x4c/0xa0 [ 61.135843][ T1429] ? clear_bhb_loop+0x30/0x80 [ 61.140535][ T1429] ? clear_bhb_loop+0x30/0x80 [ 61.145213][ T1429] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 61.151306][ T1429] RIP: 0033:0x7fd05059cdd9 [ 61.155825][ T1429] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 61.176833][ T1429] RSP: 002b:00007fd051509028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.185338][ T1429] RAX: ffffffffffffffda RBX: 00007fd050815fa0 RCX: 00007fd05059cdd9 [ 61.193564][ T1429] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 61.201901][ T1429] RBP: 00007fd051509090 R08: 0000000000000000 R09: 0000000000000000 [ 61.210491][ T1429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.219685][ T1429] R13: 00007fd050816038 R14: 00007fd050815fa0 R15: 00007ffea3e7c878 [ 61.227924][ T1429] [ 61.596048][ T28] audit: type=1400 audit(1778027454.708:132): avc: denied { create } for pid=1477 comm="syz.4.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 63.141711][ T28] audit: type=1400 audit(1778027456.258:133): avc: denied { create } for pid=1555 comm="syz.3.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 63.321323][ T28] audit: type=1400 audit(1778027456.428:134): avc: denied { create } for pid=1567 comm="syz.4.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 64.433491][ T1620] -: renamed from syzkaller0 [ 65.411021][ T28] audit: type=1400 audit(1778027458.528:135): avc: denied { create } for pid=1646 comm="syz.0.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.359984][ T1679] device syzkaller0 entered promiscuous mode [ 66.378711][ T1684] device macsec0 entered promiscuous mode [ 66.468018][ T1684] device veth1_macvtap left promiscuous mode [ 67.023546][ T1708] device syzkaller0 entered promiscuous mode [ 68.106053][ T1735] device syzkaller0 entered promiscuous mode [ 68.168906][ T28] audit: type=1400 audit(1778027461.278:136): avc: denied { create } for pid=1734 comm="syz.1.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 69.874121][ T1773] device veth1_macvtap left promiscuous mode [ 70.003737][ T1771] device veth1_macvtap entered promiscuous mode [ 70.125731][ T1771] device macsec0 entered promiscuous mode [ 70.343171][ T1793] device macsec0 left promiscuous mode [ 70.366748][ T1794] device veth1_macvtap entered promiscuous mode [ 70.383427][ T1794] device macsec0 entered promiscuous mode [ 70.579325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.616068][ T1804] device syzkaller0 entered promiscuous mode [ 71.294897][ T28] audit: type=1400 audit(1778027464.408:137): avc: denied { create } for pid=1813 comm="syz.0.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 73.437800][ T1866] device bridge_slave_0 entered promiscuous mode [ 73.455654][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.273285][ T1879] device syzkaller0 entered promiscuous mode [ 74.541085][ T28] audit: type=1400 audit(1778027467.658:138): avc: denied { create } for pid=1908 comm="syz.2.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 77.724335][ T2029] device syzkaller0 entered promiscuous mode [ 77.821377][ T28] audit: type=1400 audit(1778027470.938:139): avc: denied { create } for pid=2028 comm="syz.2.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 79.450447][ C1] sched: RT throttling activated [ 81.444831][ T2078] IPv6: pim6reg1: Disabled Multicast RS [ 81.849384][ T28] audit: type=1400 audit(1778027474.958:140): avc: denied { create } for pid=2093 comm="syz.3.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 83.081521][ T28] audit: type=1400 audit(1778027476.198:141): avc: denied { create } for pid=2128 comm="syz.3.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 83.563252][ T2149] device syzkaller0 entered promiscuous mode [ 85.221712][ T2293] device syzkaller0 entered promiscuous mode [ 85.564868][ T2315] device syzkaller0 entered promiscuous mode [ 90.453388][ T28] audit: type=1400 audit(1778027483.568:142): avc: denied { create } for pid=2403 comm="syz.1.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 90.507988][ T2399] : renamed from team_slave_1 [ 90.992392][ T28] audit: type=1400 audit(1778027484.108:143): avc: denied { create } for pid=2418 comm="syz.4.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 91.101472][ T28] audit: type=1400 audit(1778027484.128:144): avc: denied { create } for pid=2418 comm="syz.4.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 91.866178][ T28] audit: type=1400 audit(1778027484.978:145): avc: denied { read } for pid=2474 comm="syz.0.683" dev="nsfs" ino=4026532288 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 92.060690][ T28] audit: type=1400 audit(1778027484.978:146): avc: denied { open } for pid=2474 comm="syz.0.683" path="pid:[4026532288]" dev="nsfs" ino=4026532288 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 93.376771][ T2583] device syzkaller0 entered promiscuous mode [ 95.957664][ T2770] syz.3.778[2770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.957787][ T2770] syz.3.778[2770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.180711][ T28] audit: type=1400 audit(1778027491.298:147): avc: denied { create } for pid=2829 comm="syz.0.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 98.347545][ T28] audit: type=1400 audit(1778027491.458:148): avc: denied { create } for pid=2837 comm="syz.0.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 98.446846][ T2825] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.496663][ T2825] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.507402][ T2825] device bridge_slave_0 entered promiscuous mode [ 98.530630][ T2825] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.560818][ T2825] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.593132][ T2825] device bridge_slave_1 entered promiscuous mode [ 98.733545][ T28] audit: type=1400 audit(1778027491.848:149): avc: denied { create } for pid=2825 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.761770][ T433] device 26 left promiscuous mode [ 98.767241][ T28] audit: type=1400 audit(1778027491.868:150): avc: denied { write } for pid=2825 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.768398][ T433] bridge0: port 3(26) entered disabled state [ 98.788350][ T28] audit: type=1400 audit(1778027491.868:151): avc: denied { read } for pid=2825 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.815161][ T433] device bridge_slave_1 left promiscuous mode [ 98.823635][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.840840][ T433] device bridge_slave_0 left promiscuous mode [ 98.847435][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.873642][ T433] device veth1_macvtap left promiscuous mode [ 99.086908][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.095203][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.110877][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.119399][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.128597][ T1641] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.135674][ T1641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.144017][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.153877][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.162280][ T1641] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.169377][ T1641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.185099][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.193395][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.228759][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.300271][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.309795][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.331766][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 99.340175][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.350743][ T2825] device veth0_vlan entered promiscuous mode [ 99.373518][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 99.383564][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.397107][ T2825] device veth1_macvtap entered promiscuous mode [ 99.404679][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.413202][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.421035][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.429208][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.438492][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.471460][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.494275][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.513945][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.522750][ T1641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.569108][ T2877] @: port 1(veth0_to_hsr) entered blocking state [ 99.577840][ T2877] @: port 1(veth0_to_hsr) entered disabled state [ 99.586232][ T2877] device veth0_to_hsr entered promiscuous mode [ 99.621430][ T2891] device syzkaller0 entered promiscuous mode [ 100.219142][ T2928] dvmrp1: tun_chr_ioctl cmd 1074025681 [ 100.414425][ T2917] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.421766][ T2917] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.429245][ T2917] device bridge_slave_0 entered promiscuous mode [ 100.457519][ T2917] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.470304][ T2917] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.477944][ T2917] device bridge_slave_1 entered promiscuous mode [ 100.777736][ T2917] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.784858][ T2917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.792157][ T2917] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.799193][ T2917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.210016][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.221184][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.246918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.278241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.299546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.314819][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.332901][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.340635][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.361701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.377836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.398583][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.405703][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.531760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.550151][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.647386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.660779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.685598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.722421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.815016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.830865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.952622][ T2917] device veth0_vlan entered promiscuous mode [ 101.963608][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.971571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.064249][ T28] audit: type=1400 audit(1778027495.178:152): avc: denied { attach_queue } for pid=2989 comm="syz.3.854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 102.070026][ T2917] device veth1_macvtap entered promiscuous mode [ 102.120382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.134308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.143132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.218618][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.227567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.303113][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.319896][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.456013][ T433] device bridge_slave_1 left promiscuous mode [ 102.462266][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.469956][ T433] device bridge_slave_0 left promiscuous mode [ 102.484814][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.495145][ T433] device veth1_macvtap left promiscuous mode [ 102.501916][ T433] device veth0_vlan left promiscuous mode [ 103.231980][ T3042] device syzkaller0 entered promiscuous mode [ 103.348911][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.404685][ T3022] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.461066][ T3022] device bridge_slave_0 entered promiscuous mode [ 103.671425][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.689740][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.730866][ T3022] device bridge_slave_1 entered promiscuous mode [ 104.901357][ T433] device bridge_slave_1 left promiscuous mode [ 104.907539][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.981561][ T433] device bridge_slave_0 left promiscuous mode [ 105.012409][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.115034][ T433] device veth1_macvtap left promiscuous mode [ 105.121631][ T433] device veth0_vlan left promiscuous mode [ 105.267674][ T3064] device macsec0 left promiscuous mode [ 105.293465][ T3064] device veth1_macvtap entered promiscuous mode [ 105.300138][ T3064] device macsec0 entered promiscuous mode [ 105.309965][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.318894][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.327376][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.342907][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.353023][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.361843][ T1640] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.368905][ T1640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.376405][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.385902][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.394513][ T1640] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.401596][ T1640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.433788][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.456151][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.465367][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.547388][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.659582][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.668058][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.678531][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.686206][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.758760][ T3022] device veth0_vlan entered promiscuous mode [ 105.833930][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.845058][ T28] audit: type=1400 audit(1778027498.958:153): avc: denied { create } for pid=3079 comm="syz.4.884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.845614][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.875473][ T3022] device veth1_macvtap entered promiscuous mode [ 105.946864][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.958421][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.984091][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.002689][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.030928][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 106.055445][ T3090] : renamed from team_slave_1 [ 106.099076][ T3101] device syzkaller0 entered promiscuous mode [ 106.123296][ T3098] device syzkaller0 entered promiscuous mode [ 106.811995][ T3114] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.819070][ T3114] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.836825][ T3114] device bridge_slave_0 entered promiscuous mode [ 106.860636][ T3114] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.869067][ T3114] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.878210][ T3114] device bridge_slave_1 entered promiscuous mode [ 106.947284][ T3118] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 107.013043][ T3114] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.020221][ T3114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.027713][ T3114] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.034765][ T3114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.136945][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.240913][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.250904][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.353692][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.382976][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.390066][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.407864][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.436297][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.443395][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.503898][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.586588][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.644496][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.693730][ T3169] device syzkaller0 entered promiscuous mode [ 107.706419][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.715124][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.739423][ T3114] device veth0_vlan entered promiscuous mode [ 107.757803][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.775685][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.804299][ T3163] : renamed from bond_slave_0 [ 107.812159][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.826724][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.884185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.898597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.913092][ T433] device bridge_slave_1 left promiscuous mode [ 107.929442][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.939907][ T433] device bridge_slave_0 left promiscuous mode [ 107.982735][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.055454][ T433] device veth1_macvtap left promiscuous mode [ 108.094545][ T433] device veth0_vlan left promiscuous mode [ 108.417288][ T3114] device veth1_macvtap entered promiscuous mode [ 108.521859][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.530177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.546930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.555450][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.573911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.582499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.890329][ T3210] cgroup: fork rejected by pids controller in /syz3 [ 109.539726][ T433] device bridge_slave_1 left promiscuous mode [ 109.582282][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.637252][ T433] device bridge_slave_0 left promiscuous mode [ 109.656515][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.759912][ T433] device veth1_macvtap left promiscuous mode [ 109.779328][ T433] device veth0_vlan left promiscuous mode [ 110.485783][ T3242] device syzkaller0 entered promiscuous mode [ 110.580662][ T3245] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.587841][ T3245] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.595443][ T3245] device bridge_slave_0 entered promiscuous mode [ 110.602844][ T3228] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.609985][ T3228] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.617621][ T3228] device bridge_slave_0 entered promiscuous mode [ 110.624998][ T3245] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.632281][ T3245] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.649540][ T3245] device bridge_slave_1 entered promiscuous mode [ 110.688074][ T3228] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.699283][ T3228] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.710874][ T3228] device bridge_slave_1 entered promiscuous mode [ 110.858757][ T3245] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.866033][ T3245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.873545][ T3245] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.880599][ T3245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.946510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.962143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.970899][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.981705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.990173][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.998521][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.008769][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.017019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.024826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.033372][ T3245] device veth0_vlan entered promiscuous mode [ 111.056721][ T3274] bY4`Ҙ: renamed from lo [ 111.074730][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.094214][ T3245] device veth1_macvtap entered promiscuous mode [ 111.135429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.144422][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.190048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.198066][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.208830][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.215920][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.223428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.242523][ T3280] device syzkaller0 entered promiscuous mode [ 111.258832][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.267511][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.274595][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.288639][ T3280] syzkaller0: tun_net_xmit 126 [ 111.298322][ T3288] device syzkaller0 entered promiscuous mode [ 111.308514][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.334995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.351508][ T3228] device veth0_vlan entered promiscuous mode [ 111.365858][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.374616][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.383289][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.391001][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.404240][ T3228] device veth1_macvtap entered promiscuous mode [ 111.432456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.457049][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.470264][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.488999][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.607760][ T3333] sock: sock_set_timeout: `syz.1.952' (pid 3333) tries to set negative timeout [ 111.731224][ T433] device veth0_to_hsr left promiscuous mode [ 111.737330][ T433] @: port 1(veth0_to_hsr) entered disabled state [ 111.745388][ T433] device bridge_slave_1 left promiscuous mode [ 111.751725][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.759425][ T433] device bridge_slave_0 left promiscuous mode [ 111.765853][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.773843][ T433] device veth1_macvtap left promiscuous mode [ 112.396392][ T3352] device syzkaller0 entered promiscuous mode [ 113.018964][ T433] device bridge_slave_1 left promiscuous mode [ 113.027498][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.064523][ T433] device bridge_slave_0 left promiscuous mode [ 113.082727][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.115762][ T433] device veth1_macvtap left promiscuous mode [ 113.132188][ T433] device veth0_vlan left promiscuous mode [ 113.398282][ T3359] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.420494][ T3359] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.428053][ T3359] device bridge_slave_0 entered promiscuous mode [ 113.443511][ T3359] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.467962][ T3359] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.488798][ T3359] device bridge_slave_1 entered promiscuous mode [ 113.940407][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.948124][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.966109][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.996030][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.004320][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.011419][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.018885][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.040029][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.058682][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.078788][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.085895][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.134052][ T3394] device syzkaller0 entered promiscuous mode [ 114.182127][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.190702][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.266801][ T3359] device veth0_vlan entered promiscuous mode [ 114.281051][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.299314][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.330351][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.338382][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.359589][ T3359] device veth1_macvtap entered promiscuous mode [ 114.381431][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.424405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.434481][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.535193][ T3415] device syzkaller0 entered promiscuous mode [ 114.766061][ T3408] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.773593][ T3408] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.781023][ T3408] device bridge_slave_0 entered promiscuous mode [ 114.793124][ T3408] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.800242][ T3408] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.808321][ T3408] device bridge_slave_1 entered promiscuous mode [ 114.884404][ T3408] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.891530][ T3408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.898857][ T3408] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.906019][ T3408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.916995][ T3436] FAULT_INJECTION: forcing a failure. [ 114.916995][ T3436] name failslab, interval 1, probability 0, space 0, times 0 [ 114.936580][ T3436] CPU: 0 PID: 3436 Comm: syz.0.985 Not tainted syzkaller #0 [ 114.944102][ T3436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 114.954699][ T3436] Call Trace: [ 114.957989][ T3436] [ 114.961351][ T3436] __dump_stack+0x21/0x24 [ 114.965707][ T3436] dump_stack_lvl+0x110/0x170 [ 114.970504][ T3436] ? __cfi_dump_stack_lvl+0x8/0x8 [ 114.975535][ T3436] ? avc_has_perm+0x163/0x250 [ 114.980318][ T3436] dump_stack+0x15/0x24 [ 114.984561][ T3436] should_fail_ex+0x3d4/0x520 [ 114.989256][ T3436] __should_failslab+0xac/0xf0 [ 114.994028][ T3436] ? __get_vm_area_node+0x12c/0x360 [ 114.999269][ T3436] should_failslab+0x9/0x20 [ 115.003769][ T3436] __kmem_cache_alloc_node+0x3d/0x2c0 [ 115.009135][ T3436] ? __get_vm_area_node+0x12c/0x360 [ 115.014318][ T3436] kmalloc_node_trace+0x26/0xb0 [ 115.019158][ T3436] __get_vm_area_node+0x12c/0x360 [ 115.024168][ T3436] __vmalloc_node_range+0x326/0x1430 [ 115.029465][ T3436] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.035011][ T3436] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 115.040868][ T3436] ? __stack_depot_save+0x36/0x480 [ 115.046068][ T3436] ? __cfi___vmalloc_node_range+0x10/0x10 [ 115.051778][ T3436] ? __cfi_selinux_capable+0x10/0x10 [ 115.057054][ T3436] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.062793][ T3436] __vmalloc+0x79/0x90 [ 115.066851][ T3436] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.072386][ T3436] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.077745][ T3436] ? security_capable+0x99/0xc0 [ 115.082590][ T3436] bpf_prog_alloc+0x22/0x1c0 [ 115.087174][ T3436] bpf_prog_load+0x825/0x16a0 [ 115.091838][ T3436] ? map_freeze+0x390/0x390 [ 115.096328][ T3436] ? selinux_bpf+0xc7/0xf0 [ 115.100733][ T3436] ? security_bpf+0x93/0xb0 [ 115.105232][ T3436] __sys_bpf+0x57b/0x850 [ 115.109458][ T3436] ? bpf_link_show_fdinfo+0x330/0x330 [ 115.114814][ T3436] ? __cfi_ksys_write+0x10/0x10 [ 115.119648][ T3436] ? debug_smp_processor_id+0x17/0x20 [ 115.125438][ T3436] __x64_sys_bpf+0x7c/0x90 [ 115.130012][ T3436] x64_sys_call+0x488/0x9a0 [ 115.134501][ T3436] do_syscall_64+0x4c/0xa0 [ 115.138904][ T3436] ? clear_bhb_loop+0x30/0x80 [ 115.143566][ T3436] ? clear_bhb_loop+0x30/0x80 [ 115.148236][ T3436] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 115.154129][ T3436] RIP: 0033:0x7f5f6bb9cdd9 [ 115.158542][ T3436] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 115.178139][ T3436] RSP: 002b:00007f5f6c9cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.186548][ T3436] RAX: ffffffffffffffda RBX: 00007f5f6be15fa0 RCX: 00007f5f6bb9cdd9 [ 115.194505][ T3436] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 115.202476][ T3436] RBP: 00007f5f6c9cf090 R08: 0000000000000000 R09: 0000000000000000 [ 115.210435][ T3436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.218462][ T3436] R13: 00007f5f6be16038 R14: 00007f5f6be15fa0 R15: 00007fffe735b4d8 [ 115.226790][ T3436] [ 115.232924][ T3438] device syzkaller0 entered promiscuous mode [ 115.242239][ T3436] syz.0.985: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 115.263473][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.272109][ T3436] CPU: 0 PID: 3436 Comm: syz.0.985 Not tainted syzkaller #0 [ 115.279431][ T3436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 115.289482][ T3436] Call Trace: [ 115.292754][ T3436] [ 115.295699][ T3436] __dump_stack+0x21/0x24 [ 115.300142][ T3436] dump_stack_lvl+0x110/0x170 [ 115.304823][ T3436] ? __cfi_dump_stack_lvl+0x8/0x8 [ 115.309851][ T3436] ? pr_cont_kernfs_name+0x133/0x160 [ 115.315134][ T3436] dump_stack+0x15/0x24 [ 115.320226][ T3436] warn_alloc+0x1dc/0x200 [ 115.324661][ T3436] ? should_failslab+0x9/0x20 [ 115.329329][ T3436] ? __cfi_warn_alloc+0x10/0x10 [ 115.334170][ T3436] ? kmalloc_node_trace+0x3d/0xb0 [ 115.339326][ T3436] ? __get_vm_area_node+0x353/0x360 [ 115.344524][ T3436] __vmalloc_node_range+0x34b/0x1430 [ 115.349808][ T3436] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 115.355529][ T3436] ? __stack_depot_save+0x36/0x480 [ 115.360731][ T3436] ? __cfi___vmalloc_node_range+0x10/0x10 [ 115.366579][ T3436] ? __cfi_selinux_capable+0x10/0x10 [ 115.371956][ T3436] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.377507][ T3436] __vmalloc+0x79/0x90 [ 115.381581][ T3436] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.387129][ T3436] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 115.392486][ T3436] ? security_capable+0x99/0xc0 [ 115.397324][ T3436] bpf_prog_alloc+0x22/0x1c0 [ 115.401996][ T3436] bpf_prog_load+0x825/0x16a0 [ 115.406661][ T3436] ? map_freeze+0x390/0x390 [ 115.411152][ T3436] ? selinux_bpf+0xc7/0xf0 [ 115.415554][ T3436] ? security_bpf+0x93/0xb0 [ 115.420048][ T3436] __sys_bpf+0x57b/0x850 [ 115.424276][ T3436] ? bpf_link_show_fdinfo+0x330/0x330 [ 115.429636][ T3436] ? __cfi_ksys_write+0x10/0x10 [ 115.434472][ T3436] ? debug_smp_processor_id+0x17/0x20 [ 115.439923][ T3436] __x64_sys_bpf+0x7c/0x90 [ 115.444334][ T3436] x64_sys_call+0x488/0x9a0 [ 115.448912][ T3436] do_syscall_64+0x4c/0xa0 [ 115.453307][ T3436] ? clear_bhb_loop+0x30/0x80 [ 115.457970][ T3436] ? clear_bhb_loop+0x30/0x80 [ 115.462650][ T3436] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 115.468530][ T3436] RIP: 0033:0x7f5f6bb9cdd9 [ 115.472934][ T3436] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 115.492544][ T3436] RSP: 002b:00007f5f6c9cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.500960][ T3436] RAX: ffffffffffffffda RBX: 00007f5f6be15fa0 RCX: 00007f5f6bb9cdd9 [ 115.509011][ T3436] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 115.517272][ T3436] RBP: 00007f5f6c9cf090 R08: 0000000000000000 R09: 0000000000000000 [ 115.525587][ T3436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.533559][ T3436] R13: 00007f5f6be16038 R14: 00007f5f6be15fa0 R15: 00007fffe735b4d8 [ 115.541520][ T3436] [ 115.546287][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.554884][ T3436] Mem-Info: [ 115.558280][ T3436] active_anon:5724 inactive_anon:0 isolated_anon:0 [ 115.558280][ T3436] active_file:26170 inactive_file:2337 isolated_file:0 [ 115.558280][ T3436] unevictable:0 dirty:71 writeback:0 [ 115.558280][ T3436] slab_reclaimable:7386 slab_unreclaimable:77755 [ 115.558280][ T3436] mapped:24059 shmem:163 pagetables:519 [ 115.558280][ T3436] sec_pagetables:0 bounce:0 [ 115.558280][ T3436] kernel_misc_reclaimable:0 [ 115.558280][ T3436] free:1519691 free_pcp:14302 free_cma:0 [ 115.603624][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.603610][ T3436] Node 0 active_anon:22896kB inactive_anon:0kB active_file:104680kB inactive_file:9348kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:96236kB dirty:284kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4316kB pagetables:2076kB sec_pagetables:0kB all_unreclaimable? no [ 115.611445][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.643234][ T3436] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971884kB mlocked:0kB bounce:0kB free_pcp:5400kB local_pcp:56kB free_cma:0kB [ 115.679174][ T3436] lowmem_reserve[]: 0 3932 3932 3932 [ 115.684565][ T3436] Normal free:3112280kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:22896kB inactive_anon:0kB active_file:104680kB inactive_file:9348kB unevictable:0kB writepending:248kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:51708kB local_pcp:26128kB free_cma:0kB [ 115.714466][ T3436] lowmem_reserve[]: 0 0 0 0 [ 115.719026][ T3436] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 115.734503][ T3436] Normal: 3540*4kB (UME) 2881*8kB (UME) 1428*16kB (UME) 1295*32kB (UME) 877*64kB (UME) 299*128kB (UME) 204*256kB (UME) 115*512kB (UME) 60*1024kB (UME) 32*2048kB (UME) 661*4096kB (UM) = 3141432kB [ 115.753786][ T3436] 28670 total pagecache pages [ 115.758506][ T3436] 0 pages in swap cache [ 115.762715][ T3436] Free swap = 124996kB [ 115.766858][ T3436] Total swap = 124996kB [ 115.771347][ T3436] 2097051 pages RAM [ 115.775147][ T3436] 0 pages HighMem/MovableOnly [ 115.785354][ T3436] 347480 pages reserved [ 115.785803][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.790171][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.797988][ T3436] 0 pages cma reserved [ 115.805007][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.805397][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.825043][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.832101][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.840892][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.849056][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.859875][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.868111][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.882946][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.891370][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.904416][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.912302][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.920209][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.927886][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.936506][ T3408] device veth0_vlan entered promiscuous mode [ 115.946430][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.954906][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.964489][ T28] audit: type=1400 audit(1778027509.078:154): avc: denied { create } for pid=3442 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 115.994461][ T3408] device veth1_macvtap entered promiscuous mode [ 116.064104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.144214][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.192037][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.203742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.212351][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.538871][ T3463] IPv6: pim6reg1: Disabled Multicast RS [ 116.548612][ T3447] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.556961][ T3447] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.564495][ T3447] device bridge_slave_0 entered promiscuous mode [ 116.571976][ T3447] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.579039][ T3447] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.586750][ T3447] device bridge_slave_1 entered promiscuous mode [ 117.138782][ T433] device bridge_slave_1 left promiscuous mode [ 117.148496][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.200299][ T433] device bridge_slave_0 left promiscuous mode [ 117.249702][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.301931][ T433] device bridge_slave_1 left promiscuous mode [ 117.323608][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.352044][ T433] device bridge_slave_0 left promiscuous mode [ 117.374104][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.422826][ T433] device veth1_macvtap left promiscuous mode [ 117.442473][ T433] device veth0_vlan left promiscuous mode [ 117.449236][ T433] device veth1_macvtap left promiscuous mode [ 117.468988][ T433] device veth0_vlan left promiscuous mode [ 117.755903][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.770696][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.808929][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.829696][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.847956][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.855192][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.868865][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.877796][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.886275][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.893445][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.930897][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.944376][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.982610][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.990968][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.999147][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.066297][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.075371][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.113955][ T3447] device veth0_vlan entered promiscuous mode [ 118.124245][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.201023][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.260867][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.321240][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.354427][ T3447] device veth1_macvtap entered promiscuous mode [ 118.389976][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 118.406567][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.443325][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.524811][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.562179][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.570842][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.579840][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.595611][ T3586] : renamed from bond_slave_0 [ 119.271011][ T433] device bridge_slave_1 left promiscuous mode [ 119.277188][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.284674][ T433] device bridge_slave_0 left promiscuous mode [ 119.290821][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.298615][ T433] device veth1_macvtap left promiscuous mode [ 119.304705][ T433] device veth0_vlan left promiscuous mode [ 119.697359][ T3610] device syzkaller0 entered promiscuous mode [ 119.753566][ T3606] device wg2 entered promiscuous mode [ 119.781657][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 119.873031][ T3603] device syzkaller0 entered promiscuous mode [ 120.006759][ T3617] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.014100][ T3617] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.022302][ T3617] device bridge_slave_0 entered promiscuous mode [ 120.046151][ T3631] device syzkaller0 entered promiscuous mode [ 120.056323][ T3617] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.070346][ T3617] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.079455][ T3617] device bridge_slave_1 entered promiscuous mode [ 120.332456][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.340219][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.355780][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.382708][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.391243][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.398309][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.409313][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 120.457186][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 120.470785][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.489075][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.496187][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.507576][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.517747][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.555366][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.568596][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.576848][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.585349][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.597613][ T3617] device veth0_vlan entered promiscuous mode [ 120.618603][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.632998][ T3617] device veth1_macvtap entered promiscuous mode [ 120.646564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.656125][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.783643][ T433] device bridge_slave_1 left promiscuous mode [ 121.790141][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.828170][ T433] device bridge_slave_0 left promiscuous mode [ 121.848253][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.877240][ T433] device veth1_macvtap left promiscuous mode [ 121.888391][ T433] device veth0_vlan left promiscuous mode [ 122.200171][ C0] ================================================================== [ 122.203472][ T3746] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.208273][ C0] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 122.208304][ C0] Write of size 32 at addr ffff88813311ff90 by task syz.4.1088/3770 [ 122.215521][ T3746] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.223108][ C0] [ 122.223135][ C0] CPU: 0 PID: 3770 Comm: syz.4.1088 Not tainted syzkaller #0 [ 122.223152][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 122.223163][ C0] Call Trace: [ 122.223169][ C0] [ 122.223177][ C0] __dump_stack+0x21/0x24 [ 122.232144][ T3746] device bridge_slave_0 entered promiscuous mode [ 122.238137][ C0] dump_stack_lvl+0x110/0x170 [ 122.238161][ C0] ? __cfi_dump_stack_lvl+0x8/0x8 [ 122.284518][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 122.289643][ C0] print_address_description+0x71/0x200 [ 122.295211][ C0] print_report+0x4a/0x60 [ 122.299555][ C0] kasan_report+0x122/0x150 [ 122.304076][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 122.309205][ C0] kasan_check_range+0x249/0x2a0 [ 122.314161][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 122.319286][ C0] memcpy+0x44/0x70 [ 122.323105][ C0] __bpf_get_stackid+0x6fa/0x960 [ 122.328055][ C0] bpf_get_stackid_pe+0x2ee/0x400 [ 122.333092][ C0] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 122.338564][ C0] bpf_overflow_handler+0x3d0/0x5e0 [ 122.343780][ C0] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 122.349525][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 122.354738][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 122.360338][ C0] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 122.366600][ C0] __perf_event_overflow+0x437/0x620 [ 122.371987][ C0] perf_swevent_hrtimer+0x400/0x5b0 [ 122.377196][ C0] ? check_preempt_wakeup+0x5ca/0xbe0 [ 122.382570][ C0] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 122.388472][ C0] ? timerqueue_add+0x20e/0x230 [ 122.393333][ C0] ? timerqueue_del+0xd3/0x120 [ 122.398195][ C0] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 122.404021][ C0] __hrtimer_run_queues+0x3bb/0x8e0 [ 122.409232][ C0] ? hrtimer_interrupt+0x8c0/0x8c0 [ 122.414352][ C0] ? ktime_get_update_offsets_now+0x30c/0x320 [ 122.420517][ C0] hrtimer_interrupt+0x3c7/0x8c0 [ 122.425467][ C0] __sysvec_apic_timer_interrupt+0x11e/0x440 [ 122.431455][ C0] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 122.437092][ C0] [ 122.440015][ C0] [ 122.442942][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 122.448935][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x1/0x60 [ 122.455007][ C0] Code: fb e8 23 00 00 00 48 8b 3d 2c 70 21 06 48 89 de e8 24 e2 44 00 5b 5d c3 00 90 90 90 90 90 90 90 90 90 90 90 b8 0c 67 40 a5 55 <48> 89 e5 48 8b 45 08 65 48 8b 0d 60 f7 90 7e 65 8b 15 61 f7 90 7e [ 122.474781][ C0] RSP: 0018:ffffc90000affbd0 EFLAGS: 00000246 [ 122.480860][ C0] RAX: ffffffff819a083d RBX: 0000000000000000 RCX: 0000000000000002 [ 122.488825][ C0] RDX: ffff88810eaca880 RSI: 0000000000000000 RDI: 0000000000000000 [ 122.496878][ C0] RBP: ffffc90000affe80 R08: ffff88810f9d90bf R09: 1ffff11021f3b217 [ 122.504853][ C0] R10: dffffc0000000000 R11: ffffed1021f3b218 R12: 0000000040042408 [ 122.512834][ C0] R13: dffffc0000000000 R14: fffff5200015ff8c R15: ffffc90000d6f000 [ 122.520837][ C0] ? perf_ioctl+0x8dd/0x1e70 [ 122.526146][ C0] ? perf_ioctl+0x147f/0x1e70 [ 122.530845][ C0] ? ioctl_has_perm+0x40f/0x4f0 [ 122.535729][ C0] ? has_cap_mac_admin+0x370/0x370 [ 122.540861][ C0] ? __cfi_perf_ioctl+0x10/0x10 [ 122.545721][ C0] ? __hrtimer_run_queues+0x87f/0x8e0 [ 122.551101][ C0] ? do_futex+0x2bf/0x430 [ 122.555425][ C0] ? selinux_file_ioctl+0x3a0/0x4d0 [ 122.560622][ C0] ? __cfi_do_futex+0x10/0x10 [ 122.565329][ C0] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 122.570874][ C0] ? __fget_files+0x2d5/0x330 [ 122.575637][ C0] ? security_file_ioctl+0x95/0xc0 [ 122.580748][ C0] ? __cfi_perf_ioctl+0x10/0x10 [ 122.585592][ C0] __se_sys_ioctl+0x12f/0x1b0 [ 122.590287][ C0] __x64_sys_ioctl+0x7b/0x90 [ 122.594873][ C0] x64_sys_call+0x58b/0x9a0 [ 122.599372][ C0] do_syscall_64+0x4c/0xa0 [ 122.603870][ C0] ? clear_bhb_loop+0x30/0x80 [ 122.608546][ C0] ? clear_bhb_loop+0x30/0x80 [ 122.613219][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 122.619108][ C0] RIP: 0033:0x7f88d039cdd9 [ 122.623519][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 122.643119][ C0] RSP: 002b:00007f88d12ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 122.651534][ C0] RAX: ffffffffffffffda RBX: 00007f88d0616090 RCX: 00007f88d039cdd9 [ 122.659504][ C0] RDX: 000000000000000a RSI: 0000000040042408 RDI: 000000000000000b [ 122.667472][ C0] RBP: 00007f88d0432d69 R08: 0000000000000000 R09: 0000000000000000 [ 122.675444][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 122.683466][ C0] R13: 00007f88d0616128 R14: 00007f88d0616090 R15: 00007ffe7f04f0d8 [ 122.691543][ C0] [ 122.694610][ C0] [ 122.696958][ C0] Allocated by task 3763: [ 122.701654][ C0] kasan_set_track+0x4b/0x70 [ 122.706252][ C0] kasan_save_alloc_info+0x25/0x30 [ 122.711380][ C0] __kasan_kmalloc+0x95/0xb0 [ 122.716067][ C0] __kmalloc_node+0xb2/0x1e0 [ 122.720746][ C0] bpf_map_area_alloc+0x4b/0xe0 [ 122.725643][ C0] prealloc_elems_and_freelist+0x8a/0x1e0 [ 122.731448][ C0] stack_map_alloc+0x3a7/0x530 [ 122.736233][ C0] map_create+0x49c/0xd80 [ 122.740575][ C0] __sys_bpf+0x34e/0x850 [ 122.744831][ C0] __x64_sys_bpf+0x7c/0x90 [ 122.749247][ C0] x64_sys_call+0x488/0x9a0 [ 122.753748][ C0] do_syscall_64+0x4c/0xa0 [ 122.758163][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 122.764059][ C0] [ 122.766377][ C0] The buggy address belongs to the object at ffff88813311ff80 [ 122.766377][ C0] which belongs to the cache kmalloc-64 of size 64 [ 122.780250][ C0] The buggy address is located 16 bytes inside of [ 122.780250][ C0] 64-byte region [ffff88813311ff80, ffff88813311ffc0) [ 122.793457][ C0] [ 122.795789][ C0] The buggy address belongs to the physical page: [ 122.802199][ C0] page:ffffea0004cc47c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13311f [ 122.812540][ C0] flags: 0x4000000000000200(slab|zone=1) [ 122.818275][ C0] raw: 4000000000000200 ffffea0004c9b800 dead000000000003 ffff888100042780 [ 122.827049][ C0] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 122.835643][ C0] page dumped because: kasan: bad access detected [ 122.842084][ C0] page_owner tracks the page as allocated [ 122.848146][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 341, tgid 340 (syz.2.3), ts 26606437902, free_ts 0 [ 122.864929][ C0] post_alloc_hook+0x1f5/0x210 [ 122.869745][ C0] prep_new_page+0x1c/0x110 [ 122.874300][ C0] get_page_from_freelist+0x2d12/0x2d80 [ 122.879863][ C0] __alloc_pages+0x1fa/0x610 [ 122.884463][ C0] alloc_slab_page+0x6e/0xf0 [ 122.889053][ C0] new_slab+0x98/0x3d0 [ 122.893113][ C0] ___slab_alloc+0x6bd/0xb20 [ 122.897715][ C0] __slab_alloc+0x5e/0xa0 [ 122.902047][ C0] __kmem_cache_alloc_node+0x203/0x2c0 [ 122.907508][ C0] kmalloc_node_trace+0x26/0xb0 [ 122.912354][ C0] __get_vm_area_node+0x12c/0x360 [ 122.917371][ C0] __vmalloc_node_range+0x326/0x1430 [ 122.922663][ C0] __vmalloc+0x79/0x90 [ 122.926725][ C0] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 122.932095][ C0] bpf_prog_alloc+0x22/0x1c0 [ 122.936709][ C0] bpf_prog_load+0x825/0x16a0 [ 122.941383][ C0] page_owner free stack trace missing [ 122.946775][ C0] [ 122.949120][ C0] Memory state around the buggy address: [ 122.954755][ C0] ffff88813311fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 122.962810][ C0] ffff88813311ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 122.970871][ C0] >ffff88813311ff80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 122.978944][ C0] ^ [ 122.984336][ C0] ffff888133120000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 122.992393][ C0] ffff888133120080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 123.000482][ C0] ================================================================== [ 123.008807][ C0] Disabling lock debugging due to kernel taint [ 123.022391][ T28] audit: type=1400 audit(1778027515.368:155): avc: denied { write } for pid=279 comm="syz-executor" path="pipe:[15375]" dev="pipefs" ino=15375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 123.060807][ T28] audit: type=1400 audit(1778027516.138:156): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 123.122945][ T28] audit: type=1400 audit(1778027516.138:157): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.230547][ T28] audit: type=1400 audit(1778027516.138:158): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.319320][ T28] audit: type=1400 audit(1778027516.138:159): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.341061][ T28] audit: type=1400 audit(1778027516.138:160): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 123.364295][ T28] audit: type=1400 audit(1778027516.138:161): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 123.410536][ T28] audit: type=1400 audit(1778027516.138:162): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 124.021739][ T433] device bridge_slave_1 left promiscuous mode [ 124.027955][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.035399][ T433] device bridge_slave_0 left promiscuous mode [ 124.041572][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.049206][ T433] device veth1_macvtap left promiscuous mode [ 124.831212][ T433] device bridge_slave_1 left promiscuous mode [ 124.837371][ T433] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.844972][ T433] device bridge_slave_0 left promiscuous mode [ 124.851234][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.858795][ T433] device dummy0 left promiscuous mode [ 124.864287][ T433] GPL: port 1(dummy0) entered disabled state [ 124.871120][ T433] device bridge_slave_0 left promiscuous mode [ 124.877228][ T433] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.885347][ T433] device veth1_macvtap left promiscuous mode [ 124.891401][ T433] device veth0_vlan left promiscuous mode [ 124.897356][ T433] device veth1_macvtap left promiscuous mode [ 124.903696][ T433] device veth1_macvtap left promiscuous mode [ 124.909688][ T433] device veth0_vlan left promiscuous mode