last executing test programs: 16.074694698s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 12.73837914s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 10.502477722s ago: executing program 1 (id=863): socketpair(0x0, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000340)='writeback_pages_written\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYRES64=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="000000000400"/20, @ANYRESOCT=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYRESDEC=r6], 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000500"/19], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x15, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000001a850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r12, 0xfca804a0, 0x8, 0x8, &(0x7f00000002c0)="b820090560170010", &(0x7f0000000300)=""/8, 0xa02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) 10.353930075s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 8.473518475s ago: executing program 0 (id=867): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='hrtimer_init\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x7, 'cpuset'}, {0x0, 'cpu', 0x8}, {0x6, 'cpu'}]}, 0x12) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (fail_nth: 2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002030702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000110020850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 8.472855225s ago: executing program 1 (id=868): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='hrtimer_init\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x7, 'cpuset'}, {0x0, 'cpu', 0x8}, {0x6, 'cpu'}]}, 0x12) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002030702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000110020850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 8.472248135s ago: executing program 2 (id=869): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000531e5420000000000000001000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000f40)='mmap_lock_acquire_returned\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r7}, &(0x7f00000001c0), &(0x7f00000002c0)='%+9llu \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r9, 0x0, 0x1ba8847c99}, 0x38) 8.429303889s ago: executing program 0 (id=871): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000000040002080000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000004000000000000000000008500000041000000850000009e00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000001040000000000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000100000000000b702000014000000b7030000000000008500000083000000bf090000000000000000ffff000000009500000000000000699510001000000018400000fbfffffffcffffffffffffffbf91000000000000b7020900000000000000000084000000b7000000000000009500000000000000"], &(0x7f0000000780)='syzkaller\x00', 0x7f26, 0xbf, &(0x7f00000007c0)=""/191, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x0, 0xb, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000900)=[r1, r1, r1, r1, r1, r1], &(0x7f0000000940)=[{0x1, 0x5, 0x6, 0x5}, {0x1, 0x3, 0x4, 0xb}, {0x0, 0x5, 0x5, 0x8}, {0x5, 0x4, 0x8, 0x1}, {0x2, 0x4, 0xa, 0x5}, {0x2, 0x1, 0x10, 0x7}], 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000a80)='cachefiles_mark_failed\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000060000004500000000100000354617ac0ed992bdc5d36cd149437c8a65fcb2cf80320652a3e6d3e003130daad9fc06087ce0dc3ad9874fbd3504092e4a36b40793494f15f70c00"/89, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x8) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 8.409187341s ago: executing program 1 (id=872): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000010000e1850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0xa2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}, 0x2112, 0x0, 0x0, 0x1, 0x0, 0x9dae}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r6, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @ptr={0x0, 0x0, 0x0, 0x4}, @func={0x4, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="000000000300000000ba41f762c24537b64f000000e5ffffff000000"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x6, 0x9, 0x87, 0x0, 0xffffffffffffffff, 0x0, '\x00', r7, r8, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') sendmsg$inet(r10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r12, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r13}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r14, 0x108, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f09df33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1e00000001000000050000000400000019210000", @ANYRES64=r9, @ANYRESDEC, @ANYRES32=r7, @ANYRES32=r8, @ANYRES8=r7], 0x48) 5.114517198s ago: executing program 1 (id=874): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x3, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0xfffffffffffffe48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f0"], &(0x7f00000003c0)=""/87, 0x4b, 0x57, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001d00)=ANY=[@ANYBLOB="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", @ANYRESOCT=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 5.106929699s ago: executing program 3 (id=875): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 5.058239104s ago: executing program 2 (id=876): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000186b87821b1a858327600000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x2b) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 5.039282935s ago: executing program 3 (id=877): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xfc, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="9324c7d9fce1c7ff1c585b90a4c2bfede5d3a0023c96f4090f1b7745d3c9967045e7e07277fd17f0dac97d1e2bce066555d0ba2c112185b453d869696ee5796538bb522094592f226c62b6282a325e4b04a326da78cd4425285c4268413edf9bfeceec00a62e274b8895638427ebcfbe1a396a6d09e7f37490425f8eea"], 0x0, 0x93bb, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000086fe4fc7ede7a6fd34adc60aed75c7e522500adf778c5f7de1493d60a9048715d001675b6db8fda7c830a18ea4480af67a588ffb196e2254dda3d85e6239725ffa164e8c6b7342b4569a59583ea146ac97141c8b8c13672458268fd12be3163d6070a4c1b4b0bd2c2877241e2808346cf3d4c64dbc5ea25eacae26db034675298c7d7590394d89ae82f03b5e41505d1fb58456c0287af7ea428f87ea036796eaf0048aa3dea5f9f1f84a3e08769162f32c1f6fbdec3c0a047572de829a5f5721529b7", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x40305828, 0x20000012) 5.020206707s ago: executing program 0 (id=878): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, &(0x7f00000008c0)=""/223}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010001000000004000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000004c0)=r2, 0x4) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x48) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_int(r7, &(0x7f0000000200)='memory.max\x00', 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r10, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd2, &(0x7f0000000340)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x58, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x3, 0x6, 0x6, 0x998, r9, 0x2, '\x00', r11, r12, 0x2, 0x3, 0x1, 0xc, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x19, 0x1, 0xffffffff, 0xa03, 0xd522, 0xffffffffffffffff, 0x3, '\x00', r11, r4, 0x0, 0x5, 0x3, 0x0, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x15, 0xf, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000009000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b702000001000048472cb7ce796e6300b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xfffffff7, 0xd4, &(0x7f0000000700)=""/212, 0x41000, 0x14, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x5, 0xb, 0x7ff}, 0x10, 0x0, r2, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, r5], 0x0, 0x10, 0xf, @void, @value}, 0x94) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 4.961732562s ago: executing program 2 (id=879): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x5, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffb0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xffffffffffffff78) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x5, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffb0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xffffffffffffff78) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x20000000}]}]}}, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x2, 0x1, 0xf, 0x3e02, r0, 0xfffffffa, '\x00', r6, r7, 0x1, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 4.940468224s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 2.793335578s ago: executing program 0 (id=880): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/12], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r4}, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) 2.792372578s ago: executing program 1 (id=881): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, &(0x7f00000008c0)=""/223}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010001000000004000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000004c0)=r2, 0x4) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x48) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_int(r7, &(0x7f0000000200)='memory.max\x00', 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r10, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd2, &(0x7f0000000340)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x58, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x3, 0x6, 0x6, 0x998, r9, 0x2, '\x00', r11, r12, 0x2, 0x3, 0x1, 0xc, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x19, 0x1, 0xffffffff, 0xa03, 0xd522, 0xffffffffffffffff, 0x3, '\x00', r11, r4, 0x0, 0x5, 0x3, 0x0, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x15, 0xf, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000009000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b702000001000048472cb7ce796e6300b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xfffffff7, 0xd4, &(0x7f0000000700)=""/212, 0x41000, 0x14, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x5, 0xb, 0x7ff}, 0x10, 0x0, r2, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, r5], 0x0, 0x10, 0xf, @void, @value}, 0x94) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.792109308s ago: executing program 2 (id=882): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000020000007020000f8ffffffb703000008000000b7040000000000008500000001000000953972564b944df471e8b13ff1b26c2cebc30aba60be0012b632b4ddb47bf80a81399563edc37aea4d577910b12b6aef7ee06c1f5bec108ac781346d65ffd7ecc8a0c99eed610fb4ed895877ed1a647ec83fd2dd76d0d966597fa149d98b27f122305a9b2fdb78c693b09a8f9a457dd1230929679c4ede02c4c5a657857fbf96ce4d73e9b0370c43d523a6225e2431fda39a25b74a53e0fe632a09672fb64423c4be6c83cd13711b021b60d51a524a90"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 2.791440508s ago: executing program 3 (id=883): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000e10000fea4fcfe8e9f4c7c4502a7ac3075de776a56a081c503c7d7166e07bc60366be150724546c1bf607b9bfed7d620842ba450daea1d265c4a26669d3e0b9532cdf32cbd0000001300000000000000000000003be71888beaa0d6eda5e8c6d994e5b37ba92462f7f55d26f9aad0133908cd39b626a4744fd45", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000001850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x10) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) close(r7) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x15, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b702000000000000c500000005000000b70000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r8, &(0x7f0000000b40), 0x0, 0x4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r9, 0x0, 0x21, 0x0, &(0x7f00000008c0)="982b2cebba66dd9f6cfaa1ebec0f39d07e5e3c14be4749922b41c58c3534b8cb97", 0x0, 0xa1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='timer_start\x00', r4}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.695415467s ago: executing program 2 (id=884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7c0, 0x0, 0x0, 0x0, 0x6}, [@alu={0x4, 0x1, 0x9, 0x7, 0x4, 0xfffffffffffffffe, 0xffffffffffffffff}, @ldst={0x0, 0x3, 0x3, 0x9, 0x7, 0xffffffffffffffc0, 0x10}]}, &(0x7f0000000500)='syzkaller\x00', 0x3, 0xc2, &(0x7f00000005c0)=""/194, 0x40f00, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0x2, 0x5, 0x38000000}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000780)=[{0x0, 0x2, 0x10, 0x3}], 0x10, 0x1, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740)="d36e4cb1", &(0x7f00000007c0), 0xffffd6c0, r2}, 0x38) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="06000000040000005b0000008a00000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000abd1dfd909d727f96c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r5, r6}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, 0x0) 2.619779584s ago: executing program 3 (id=885): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069113200140000008510000002000000850000000500000095000000000000009500ae0500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000740)="ddfd0f9dcfd5bbf5854ccc3a4a245b0a7c50bb589eec5b307d608739d57ae89dfeb665d972f3913fbbe4a5f43ed0d9a06b51f1d13bd0ef9dd484b4070d3e5f61fa2e43a60f5e6fe135f6ea2725da951779caa95aa3d4588bd09a6b51d163669a2a91710c8a0d9ef31ed170dffbf12468e9a529edf3d9c1ec464a2b3403480bfc5aac0ba4f290c53cca3a223fe49e1963da5cef3fd5164358f865df2f0d84d901efaf2b6f682457bb292d4f2d1f41e8242d5ed692a4f453421563", 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000300)='cdev_update\x00', r0, 0x0, 0xfffffffffffffff7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffff7ec0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 2.611972074s ago: executing program 0 (id=886): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x5, 0x9, 0x84, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000380), &(0x7f0000000240), 0x800, r1, 0x0, 0x100000000000000}, 0x38) (fail_nth: 1) 2.133422388s ago: executing program 3 (id=887): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000008000"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000fae00000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4, 0x0, 0x2}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) close(0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8995, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='veth0_vlan\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x10, 0x5, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x38}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x5, 0x9, 0x84, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000380), &(0x7f0000000240), 0x800, r7, 0x0, 0x100000000000000}, 0x38) 2.11036737s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 67.302544ms ago: executing program 0 (id=888): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x29) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000005000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x40800) sendmsg$inet(r7, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r7, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r6, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r9}, 0x10) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="580161cef0ffffff68b625559c3eb92f32e8f6dd5bed9db2605e32c6c0bfb41bb724dd3ab56f445d9317abb57e6e4a7bd30c0e661a4aba09c531ebd3"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000e2bac15d3b6641a215f099e26603a050337b2ccc70a9f928ba3c529bb6e7365e7e246317380f5884d79663e7fcaa89795d7b10e88378c33265a7af06040e3d0bbc6a5864dfa023c6ac1da574242785bbb4ece12b11da52496875e1e384042aad63a3094bf3bc0e40a79960f9f1610940e67e30611d9873d1e6cb9c4cce44c999c49ff52a6400192fd021d7158438d7686a6f66778022c93c544189b684754e7e0f77a4f498609e53104c8aa70632fcc58c757bbc06f6472622dce2729d7296959ce003ec84acd015e352484c42fc29e5aea62fb7977813f7254fd6f62fec638abf292e6c33925b29"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r10}, 0x10) syz_clone(0x2202351f, 0x0, 0x0, 0x0, 0x0, 0x0) 63.754675ms ago: executing program 1 (id=889): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000186b87821b1a858327600000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x2b) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 62.815005ms ago: executing program 2 (id=890): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000280), &(0x7f0000000380)=r2}, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0xd, 0x4, 0x8, 0x3020, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0xc, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000020000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="18000000000000000f000000000000008500000061000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r6, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) r7 = openat$cgroup_type(r4, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) 62.341425ms ago: executing program 3 (id=891): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000008000000030000000500000012000000", @ANYRES32, @ANYBLOB="00000000000031236828ed4be500000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpid() bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000004a0f8abea6234996e8d19ad2469cbdd8452f4e329addf667d1be438596f28e016394944d470d533a7bbb4364a45c28f527c1d5eae2bea11bea09c567401cbbca7b083c8c279d5b8c46cd4c5fda43955d18452d4ffc0e9f0fa4366fc9480f5d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0e00000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000f3ffffffffffffff0000000000000000000000008000ea9f02d3ba784d0ed5c72264e7a54413eb9c114291742c3f79a284772abed1acc938124b0cbc0f1cedb9f24e515936dd4d43c9c8ee5962e2169efccc9f6fbec539cd7f7dd48b7fc86d89262b1b85deeb974e3309ea937cc4068123a0c873e62e602076bbcb8e038b0c9700c841bfe5fc"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r6}, 0x10) r7 = openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x114, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 0s ago: executing program 4 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a530561, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.232' (ED25519) to the list of known hosts. [ 344.937777][ T28] audit: type=1400 audit(1726793714.780:66): avc: denied { mounton } for pid=605 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 344.938994][ T605] cgroup: Unknown subsys name 'net' [ 344.960680][ T28] audit: type=1400 audit(1726793714.780:67): avc: denied { mount } for pid=605 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 344.987555][ T28] audit: type=1400 audit(1726793714.810:68): avc: denied { unmount } for pid=605 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 344.987821][ T605] cgroup: Unknown subsys name 'devices' [ 345.102221][ T605] cgroup: Unknown subsys name 'hugetlb' [ 345.111962][ T605] cgroup: Unknown subsys name 'rlimit' [ 345.236555][ T28] audit: type=1400 audit(1726793715.080:69): avc: denied { setattr } for pid=605 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.259567][ T28] audit: type=1400 audit(1726793715.080:70): avc: denied { mounton } for pid=605 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 345.286655][ T28] audit: type=1400 audit(1726793715.080:71): avc: denied { mount } for pid=605 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 345.314286][ T608] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 345.323003][ T28] audit: type=1400 audit(1726793715.170:72): avc: denied { relabelto } for pid=608 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 345.363827][ T28] audit: type=1400 audit(1726793715.170:73): avc: denied { write } for pid=608 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 345.406507][ T28] audit: type=1400 audit(1726793715.250:74): avc: denied { read } for pid=605 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 345.446741][ T28] audit: type=1400 audit(1726793715.250:75): avc: denied { open } for pid=605 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 345.446884][ T605] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 346.133874][ T615] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.140788][ T615] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.147957][ T615] device bridge_slave_0 entered promiscuous mode [ 346.170868][ T615] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.177707][ T615] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.186036][ T615] device bridge_slave_1 entered promiscuous mode [ 346.258527][ T616] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.265524][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.273800][ T616] device bridge_slave_0 entered promiscuous mode [ 346.296281][ T617] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.306181][ T617] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.314429][ T617] device bridge_slave_0 entered promiscuous mode [ 346.325399][ T616] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.332425][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.339510][ T616] device bridge_slave_1 entered promiscuous mode [ 346.349394][ T617] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.356312][ T617] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.363493][ T617] device bridge_slave_1 entered promiscuous mode [ 346.409254][ T614] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.416228][ T614] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.423435][ T614] device bridge_slave_0 entered promiscuous mode [ 346.444158][ T614] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.451022][ T614] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.458101][ T614] device bridge_slave_1 entered promiscuous mode [ 346.558578][ T618] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.567022][ T618] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.574327][ T618] device bridge_slave_0 entered promiscuous mode [ 346.595611][ T618] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.602495][ T618] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.609715][ T618] device bridge_slave_1 entered promiscuous mode [ 346.699978][ T614] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.706846][ T614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.713993][ T614] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.720829][ T614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.733142][ T615] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.744812][ T615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.754307][ T615] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.761995][ T615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.792762][ T616] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.799629][ T616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.806759][ T616] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.813527][ T616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.829788][ T617] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.836659][ T617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.843771][ T617] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.850541][ T617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.886914][ T618] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.893782][ T618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.901048][ T618] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.907824][ T618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.917256][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.924742][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.931999][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.938941][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.946318][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.953292][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.960413][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.967353][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.974639][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.981821][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.989109][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.996530][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.021104][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.029097][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.035961][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.043103][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.052364][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.059542][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.066777][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.074549][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.095709][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.112650][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.124303][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.133328][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.140194][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.175459][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.182710][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.190128][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.198168][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.206505][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.213349][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.220512][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.228523][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.236487][ T637] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.243323][ T637] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.250529][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.258336][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.266184][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.273979][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.281757][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.289787][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.297848][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.304682][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.311904][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.319947][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.327951][ T637] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.334790][ T637] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.342060][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.350231][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.358172][ T637] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.365019][ T637] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.372171][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.379953][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.387754][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.395597][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.403413][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.411691][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.419339][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.427229][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.441945][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.450155][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.458886][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.466959][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.484108][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.491371][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.499419][ T615] device veth0_vlan entered promiscuous mode [ 347.515443][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.522886][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.530125][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.538186][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.546175][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.553005][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.560218][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.568268][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.576556][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.583388][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.593461][ T614] device veth0_vlan entered promiscuous mode [ 347.600303][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.608428][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.616840][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.624558][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.632707][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.639938][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.656086][ T616] device veth0_vlan entered promiscuous mode [ 347.668513][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.676763][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.684970][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.692812][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.700506][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.708169][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.716556][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.724503][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.732571][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.739803][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.756231][ T614] device veth1_macvtap entered promiscuous mode [ 347.764599][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.772983][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.780744][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.787896][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.795438][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.803399][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.811403][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.819543][ T615] device veth1_macvtap entered promiscuous mode [ 347.826942][ T616] device veth1_macvtap entered promiscuous mode [ 347.834608][ T618] device veth0_vlan entered promiscuous mode [ 347.852979][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.860423][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.868335][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.876493][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.884539][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.892604][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.900733][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.917510][ T618] device veth1_macvtap entered promiscuous mode [ 347.929397][ T617] device veth0_vlan entered promiscuous mode [ 347.937825][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.945916][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.954395][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.962522][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.970579][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.978597][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.986384][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.994288][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.001663][ T619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.025284][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.034126][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.076736][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.090855][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.099068][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.107936][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.135433][ T617] device veth1_macvtap entered promiscuous mode [ 348.158752][ T638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.219918][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.255375][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.290009][ C1] hrtimer: interrupt took 27317 ns [ 348.392066][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.408855][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 356.056089][ T830] syz.4.35 (830) used greatest stack depth: 21912 bytes left [ 359.472828][ T891] syz.2.46 (891) used greatest stack depth: 21656 bytes left [ 363.367914][ T947] syz.1.57 (947) used greatest stack depth: 20952 bytes left [ 368.113877][ T1056] device pim6reg1 entered promiscuous mode [ 369.360837][ T1083] device pim6reg1 entered promiscuous mode [ 391.161360][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 391.161377][ T28] audit: type=1400 audit(1726793760.990:106): avc: denied { create } for pid=1420 comm="syz.4.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 391.698386][ T28] audit: type=1400 audit(1726793761.510:107): avc: denied { read } for pid=1432 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 392.036617][ T28] audit: type=1400 audit(1726793761.540:108): avc: denied { write } for pid=1432 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 392.395756][ T28] audit: type=1400 audit(1726793761.570:109): avc: denied { setopt } for pid=1432 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 399.684348][ T1565] device syzkaller0 entered promiscuous mode [ 403.817339][ T1618] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.824379][ T1618] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.247183][ T1649] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.264673][ T1649] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.208171][ T1657] device syzkaller0 entered promiscuous mode [ 407.831308][ T1672] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.838322][ T1672] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.960502][ T1670] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.967398][ T1670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.974539][ T1670] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.981387][ T1670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.166789][ T1670] device bridge0 entered promiscuous mode [ 408.199006][ T706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 408.399460][ T1677] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.417707][ T1677] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.366308][ T1699] device syzkaller0 entered promiscuous mode [ 409.375333][ T1707] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.382208][ T1707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.389303][ T1707] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.396104][ T1707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.430475][ T1707] device bridge0 entered promiscuous mode [ 410.192030][ T1721] device syzkaller0 entered promiscuous mode [ 410.983996][ T1728] device syzkaller0 entered promiscuous mode [ 411.001501][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 411.395080][ T1740] device syzkaller0 entered promiscuous mode [ 411.492263][ T1744] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.499155][ T1744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.506281][ T1744] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.513135][ T1744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.661630][ T1744] device bridge0 entered promiscuous mode [ 413.043264][ T683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 413.052709][ T1757] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.059607][ T1757] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.087887][ T1757] device bridge0 left promiscuous mode [ 414.105114][ T1782] device syzkaller0 entered promiscuous mode [ 414.123067][ T1783] device syzkaller0 entered promiscuous mode [ 415.117466][ T1812] device syzkaller0 entered promiscuous mode [ 415.525878][ T1825] device syzkaller0 entered promiscuous mode [ 415.532613][ T28] audit: type=1400 audit(1726793785.380:110): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 415.574252][ T28] audit: type=1400 audit(1726793785.380:111): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 416.308435][ T1843] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.315459][ T1843] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.328527][ T1840] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.336684][ T1840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.344274][ T1840] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.351183][ T1840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.360235][ T1840] device bridge0 entered promiscuous mode [ 416.489853][ T1842] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.496806][ T1842] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.507820][ T1842] device bridge0 left promiscuous mode [ 416.556251][ T1847] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.563154][ T1847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.570240][ T1847] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.576999][ T1847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.672703][ T1847] device bridge0 entered promiscuous mode [ 416.770206][ T28] audit: type=1400 audit(1726793786.600:112): avc: denied { relabelfrom } for pid=1852 comm="syz.4.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 416.862882][ T1855] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.869758][ T1855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.876913][ T1855] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.883762][ T1855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.034151][ T1855] device bridge0 entered promiscuous mode [ 417.106583][ T28] audit: type=1400 audit(1726793786.610:113): avc: denied { relabelto } for pid=1852 comm="syz.4.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 417.869254][ T1870] device syzkaller0 entered promiscuous mode [ 418.281759][ T1869] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.288691][ T1869] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.296009][ T1869] device bridge0 left promiscuous mode [ 418.302118][ T1877] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.308980][ T1877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.316184][ T1877] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.322950][ T1877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.330684][ T1877] device bridge0 entered promiscuous mode [ 418.348568][ T1878] device syzkaller0 entered promiscuous mode [ 418.358792][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.845699][ T1894] device wg2 entered promiscuous mode [ 419.185421][ T1888] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.198884][ T1888] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.208086][ T1888] device bridge0 left promiscuous mode [ 419.216268][ T1891] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.223161][ T1891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.230257][ T1891] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.237005][ T1891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.244943][ T1891] device bridge0 entered promiscuous mode [ 419.304789][ T1905] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.317567][ T1905] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.337370][ T1905] device bridge0 left promiscuous mode [ 419.521274][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.529245][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.537337][ T1909] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.544201][ T1909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.556634][ T1909] device bridge0 entered promiscuous mode [ 419.959377][ T1914] device syzkaller0 entered promiscuous mode [ 420.040987][ T1918] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.048356][ T1918] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.056938][ T1918] device bridge0 left promiscuous mode [ 420.065060][ T1922] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.071939][ T1922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.079158][ T1922] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.090010][ T1922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.097452][ T1922] device bridge0 entered promiscuous mode [ 420.766616][ T1942] device wg2 entered promiscuous mode [ 420.775940][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.798578][ T1948] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.810195][ T1948] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.837186][ T1948] device bridge0 left promiscuous mode [ 421.117452][ T1951] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.124359][ T1951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.131453][ T1951] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.138201][ T1951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.211437][ T1951] device bridge0 entered promiscuous mode [ 421.291237][ T1950] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.303105][ T1950] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.320040][ T1950] device bridge0 left promiscuous mode [ 421.477494][ T1957] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.484375][ T1957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.491489][ T1957] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.498350][ T1957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.515849][ T1957] device bridge0 entered promiscuous mode [ 421.561796][ T1962] device wg2 entered promiscuous mode [ 422.021591][ T1966] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.031032][ T1966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.047079][ T1966] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.058322][ T1966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.284417][ T1966] device bridge0 entered promiscuous mode [ 422.292093][ T1974] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.299005][ T1974] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.310956][ T1974] device bridge0 left promiscuous mode [ 422.345067][ T1972] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.353408][ T1972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.362916][ T1972] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.369908][ T1972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.381175][ T1972] device bridge0 entered promiscuous mode [ 422.406033][ T1971] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.413649][ T1971] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.434954][ T1971] device bridge0 left promiscuous mode [ 422.566248][ T1981] device wg2 left promiscuous mode [ 422.572043][ T1982] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.582322][ T1982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.589488][ T1982] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.596301][ T1982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.606995][ T1982] device bridge0 entered promiscuous mode [ 422.650914][ T1987] device wg2 entered promiscuous mode [ 422.657320][ T1989] device wg2 left promiscuous mode [ 422.672179][ T1991] device wg2 entered promiscuous mode [ 422.696462][ T1997] device wg2 left promiscuous mode [ 423.128143][ T2002] device syzkaller0 entered promiscuous mode [ 423.166079][ T1997] device wg2 entered promiscuous mode [ 423.296329][ T638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 423.331011][ T2007] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.337943][ T2007] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.362486][ T2007] device bridge0 left promiscuous mode [ 423.398959][ T1999] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.407960][ T1999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.419760][ T1999] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.428481][ T1999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.451461][ T1999] device bridge0 entered promiscuous mode [ 423.577234][ T2017] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.584347][ T2017] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.647759][ T2017] device bridge0 left promiscuous mode [ 423.962267][ T2020] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.969746][ T2020] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.977416][ T2020] device bridge0 left promiscuous mode [ 423.986004][ T2026] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.992878][ T2026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.000184][ T2026] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.006925][ T2026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.014164][ T2026] device bridge0 entered promiscuous mode [ 424.020515][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.027537][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.047587][ T2023] device bridge0 left promiscuous mode [ 424.285194][ T2029] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.292203][ T2029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.299281][ T2029] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.306076][ T2029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.326193][ T2029] device bridge0 entered promiscuous mode [ 424.332769][ T2028] device wg2 left promiscuous mode [ 424.339871][ T2030] device wg2 entered promiscuous mode [ 424.349378][ T2025] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.360692][ T2025] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.392799][ T2025] device bridge0 left promiscuous mode [ 424.461395][ T2032] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.468284][ T2032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.475675][ T2032] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.482553][ T2032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.528374][ T2032] device bridge0 entered promiscuous mode [ 424.750374][ T2046] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.757240][ T2046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.764381][ T2046] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.771206][ T2046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.783565][ T2046] device bridge0 entered promiscuous mode [ 424.789737][ T2050] bond_slave_1: mtu less than device minimum [ 425.683167][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 426.491782][ T2073] device syzkaller0 entered promiscuous mode [ 430.263923][ T2144] device wg2 left promiscuous mode [ 430.558675][ T2145] device wg2 entered promiscuous mode [ 430.669768][ T2148] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.677623][ T2148] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.685007][ T2148] device bridge0 left promiscuous mode [ 430.737259][ T2141] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.746830][ T2141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.757269][ T2141] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.764208][ T2141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.774083][ T2141] device bridge0 entered promiscuous mode [ 431.506740][ T2165] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.513770][ T2165] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.520975][ T2165] device bridge0 left promiscuous mode [ 431.533085][ T2163] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.540607][ T2163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.553256][ T2163] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.561376][ T2163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.579697][ T2163] device bridge0 entered promiscuous mode [ 431.695256][ T2167] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.707137][ T2167] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.740214][ T2167] device bridge0 left promiscuous mode [ 431.843623][ T2170] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.850615][ T2170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.857686][ T2170] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.864506][ T2170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.911239][ T2170] device bridge0 entered promiscuous mode [ 431.921282][ T2177] bond_slave_1: mtu less than device minimum [ 432.046518][ T2179] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.053568][ T2179] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.143348][ T2179] device bridge0 left promiscuous mode [ 432.337778][ T2183] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.344672][ T2183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.351793][ T2183] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.358534][ T2183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.365769][ T2183] device bridge0 entered promiscuous mode [ 433.086878][ T2201] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.099759][ T2201] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.118019][ T2201] device bridge0 left promiscuous mode [ 433.263905][ T2207] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.270798][ T2207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.277897][ T2207] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.284780][ T2207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.292703][ T2207] device bridge0 entered promiscuous mode [ 433.325562][ T2208] device syzkaller0 entered promiscuous mode [ 433.525652][ T2216] device syzkaller0 entered promiscuous mode [ 433.535633][ T2215] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.545280][ T2215] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.553028][ T2215] device bridge0 left promiscuous mode [ 433.561332][ T2220] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.568189][ T2220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.575336][ T2220] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.582265][ T2220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.589421][ T2220] device bridge0 entered promiscuous mode [ 433.610614][ T2219] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.618641][ T2219] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.629103][ T2219] device bridge0 left promiscuous mode [ 433.668303][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.675185][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.682288][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.689052][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.696206][ T2222] device bridge0 entered promiscuous mode [ 433.819644][ T2229] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.833944][ T2229] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.848338][ T2229] device bridge0 left promiscuous mode [ 434.169370][ T2233] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.176257][ T2233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.183368][ T2233] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.190141][ T2233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.351685][ T2233] device bridge0 entered promiscuous mode [ 435.252234][ T2253] device syzkaller0 entered promiscuous mode [ 435.551045][ T2255] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.566033][ T2255] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.726012][ T2255] device bridge0 left promiscuous mode [ 436.033017][ T2257] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.039883][ T2257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.047043][ T2257] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.053888][ T2257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.061079][ T2257] device bridge0 entered promiscuous mode [ 436.227468][ T2264] device syzkaller0 entered promiscuous mode [ 436.680805][ T2266] device syzkaller0 entered promiscuous mode [ 437.874672][ T2294] device syzkaller0 entered promiscuous mode [ 437.914252][ T2302] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.921184][ T2302] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.929777][ T2302] device bridge0 left promiscuous mode [ 437.943862][ T2297] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.956803][ T2297] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.981037][ T2297] device bridge0 left promiscuous mode [ 438.145785][ T2295] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.155049][ T2295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.171339][ T2295] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.179377][ T2295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.224532][ T2295] device bridge0 entered promiscuous mode [ 438.328028][ T2301] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.336547][ T2301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.347120][ T2301] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.354356][ T2301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.380395][ T2301] device bridge0 entered promiscuous mode [ 438.703830][ T2319] device syzkaller0 entered promiscuous mode [ 439.334427][ T2327] device syzkaller0 entered promiscuous mode [ 439.721783][ T2342] device wg2 left promiscuous mode [ 439.822442][ T2342] device wg2 entered promiscuous mode [ 441.025444][ T2353] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.042605][ T2353] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.105471][ T2353] device bridge0 left promiscuous mode [ 441.204328][ T2356] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.211229][ T2356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.218341][ T2356] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.225216][ T2356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.232695][ T2356] device bridge0 entered promiscuous mode [ 441.445204][ T2368] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.452141][ T2368] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.460367][ T2368] device bridge0 left promiscuous mode [ 441.615441][ T2364] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.624441][ T2364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.640761][ T2364] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.649429][ T2364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.873325][ T2364] device bridge0 entered promiscuous mode [ 442.559947][ T2392] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.572138][ T2392] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.728040][ T2392] device bridge0 left promiscuous mode [ 443.620953][ T2408] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.627880][ T2408] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.840379][ T2408] device bridge0 left promiscuous mode [ 444.023948][ T2407] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.031945][ T2407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.044944][ T2407] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.054945][ T2407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.076228][ T2407] device bridge0 entered promiscuous mode [ 445.307252][ T2413] device syzkaller0 entered promiscuous mode [ 446.363925][ T2448] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.370956][ T2448] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.430706][ T2448] device bridge0 left promiscuous mode [ 446.586491][ T2448] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.593378][ T2448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.600609][ T2448] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.607463][ T2448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.614908][ T2448] device bridge0 entered promiscuous mode [ 446.670257][ T2444] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.680683][ T2444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.694682][ T2444] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.702735][ T2444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.798699][ T2444] device bridge0 entered promiscuous mode [ 446.889587][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 447.486887][ T2450] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.493818][ T2450] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.555181][ T2450] device bridge0 left promiscuous mode [ 447.566930][ T2457] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.573886][ T2457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.581092][ T2457] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.587839][ T2457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.595944][ T2457] device bridge0 entered promiscuous mode [ 448.359763][ T2464] device syzkaller0 entered promiscuous mode [ 448.928979][ T2480] device wg2 entered promiscuous mode [ 450.220555][ T2508] device syzkaller0 entered promiscuous mode [ 451.451227][ T2527] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.458254][ T2527] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.763012][ T2527] device bridge0 left promiscuous mode [ 454.185709][ T2558] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.192661][ T2558] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.233368][ T2558] device bridge0 left promiscuous mode [ 454.267110][ T2560] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.280111][ T2560] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.297391][ T2560] device bridge0 left promiscuous mode [ 454.570376][ T2564] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.577241][ T2564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.584479][ T2564] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.591431][ T2564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.730438][ T2564] device bridge0 entered promiscuous mode [ 455.459126][ T2588] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.470689][ T2588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.478511][ T2588] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.486240][ T2588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.569203][ T2588] device bridge0 entered promiscuous mode [ 456.056217][ T2593] device syzkaller0 entered promiscuous mode [ 456.127642][ T683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.523901][ T2613] device wg2 left promiscuous mode [ 456.533353][ T2613] device wg2 entered promiscuous mode [ 457.421865][ T2627] device syzkaller0 entered promiscuous mode [ 457.630728][ T2625] device syzkaller0 entered promiscuous mode [ 458.539176][ T2643] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.549569][ T2643] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.558746][ T2643] device bridge0 left promiscuous mode [ 458.589436][ T2646] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.598439][ T2646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.616437][ T2646] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.625699][ T2646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.701373][ T2646] device bridge0 entered promiscuous mode [ 458.724644][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 459.308386][ T2668] device syzkaller0 entered promiscuous mode [ 459.328221][ T2663] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.335113][ T2663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.342317][ T2663] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.349155][ T2663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.369940][ T2663] device bridge0 entered promiscuous mode [ 459.547679][ T2669] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.560350][ T2669] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.725579][ T2669] device bridge0 left promiscuous mode [ 459.752511][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 459.765983][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.772847][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.779973][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.786826][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.794094][ T2675] device bridge0 entered promiscuous mode [ 459.882377][ T2682] device syzkaller0 entered promiscuous mode [ 459.906685][ T2684] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.920377][ T2684] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.034623][ T2684] device bridge0 left promiscuous mode [ 461.083608][ T2693] device syzkaller0 entered promiscuous mode [ 461.115605][ T2699] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.122596][ T2699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.129702][ T2699] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.136487][ T2699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.143689][ T2699] device bridge0 entered promiscuous mode [ 461.149645][ T2704] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.156565][ T2704] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.164441][ T2704] device bridge0 left promiscuous mode [ 461.178502][ T2703] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.187532][ T2703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.200463][ T2703] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.208044][ T2703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.229377][ T2703] device bridge0 entered promiscuous mode [ 461.417658][ T2708] device syzkaller0 entered promiscuous mode [ 461.437107][ T2711] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.449410][ T2711] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.481839][ T2711] device bridge0 left promiscuous mode [ 461.852503][ T2714] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.859459][ T2714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.866604][ T2714] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.873459][ T2714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.881292][ T2714] device bridge0 entered promiscuous mode [ 462.661069][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 463.465354][ T2751] device wg2 left promiscuous mode [ 463.474176][ T2751] device wg2 entered promiscuous mode [ 464.537490][ T2764] device syzkaller0 entered promiscuous mode [ 465.498974][ T2770] device syzkaller0 entered promiscuous mode [ 465.519390][ T2778] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.526332][ T2778] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.533522][ T2778] device bridge0 left promiscuous mode [ 465.545788][ T2776] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.558420][ T2776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.574238][ T2776] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.583070][ T2776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.606776][ T2776] device bridge0 entered promiscuous mode [ 466.123048][ T2782] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.130026][ T2782] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.271858][ T2782] device bridge0 left promiscuous mode [ 466.554651][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.567653][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.584722][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.594724][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.623970][ T2781] device bridge0 entered promiscuous mode [ 466.841672][ T2793] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.848595][ T2793] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.882612][ T2793] device bridge0 left promiscuous mode [ 468.207128][ T2800] device syzkaller0 entered promiscuous mode [ 468.512063][ T2801] device syzkaller0 entered promiscuous mode [ 469.219138][ T2815] device syzkaller0 entered promiscuous mode [ 470.949199][ T2840] device syzkaller0 entered promiscuous mode [ 473.567286][ T2863] device syzkaller0 entered promiscuous mode [ 479.828788][ T2953] device syzkaller0 entered promiscuous mode [ 479.965813][ T2963] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.972855][ T2963] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.982616][ T2963] device bridge0 left promiscuous mode [ 480.015403][ T2960] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.023407][ T2960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.040903][ T2960] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.049371][ T2960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.132771][ T2960] device bridge0 entered promiscuous mode [ 481.357598][ T2982] device syzkaller0 entered promiscuous mode [ 482.433136][ T2995] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.448586][ T2995] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.476156][ T2995] device bridge0 left promiscuous mode [ 482.881528][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.893566][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 482.901813][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.909752][ T2997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 482.926215][ T2997] device bridge0 entered promiscuous mode [ 487.598455][ T3079] device syzkaller0 entered promiscuous mode [ 493.830215][ T3110] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.837080][ T3110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.844240][ T3110] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.851083][ T3110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.899699][ T3110] device bridge0 entered promiscuous mode [ 494.279304][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 494.327117][ T3118] device syzkaller0 entered promiscuous mode [ 495.915367][ T3137] device syzkaller0 entered promiscuous mode [ 500.024134][ T3183] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.130071][ T3183] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.291065][ T3183] device bridge_slave_0 entered promiscuous mode [ 500.390444][ T3183] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.397317][ T3183] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.421652][ T3183] device bridge_slave_1 entered promiscuous mode [ 502.479798][ T2655] device bridge_slave_1 left promiscuous mode [ 502.488536][ T2655] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.604893][ T2655] device bridge_slave_0 left promiscuous mode [ 502.655745][ T2655] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.793442][ T2655] device veth1_macvtap left promiscuous mode [ 502.822429][ T2655] device veth0_vlan left promiscuous mode [ 503.015905][ T3238] device syzkaller0 entered promiscuous mode [ 503.080054][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 503.087336][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 503.094611][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 503.102724][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 503.110693][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.117525][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 503.125526][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 503.134345][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 503.142353][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.149194][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.156748][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 503.334516][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 503.343396][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 503.351357][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 503.359347][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 503.375561][ T3183] device veth0_vlan entered promiscuous mode [ 503.667020][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 503.700819][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 503.709180][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 503.871226][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.879246][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.926615][ T620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 504.198852][ T683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 504.222113][ T683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 504.335133][ T3183] device veth1_macvtap entered promiscuous mode [ 504.366976][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 504.375622][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 504.551959][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 504.622825][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 506.158137][ T3258] device bridge0 entered promiscuous mode [ 506.955049][ T3263] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.962189][ T3263] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.052097][ T3263] device bridge0 left promiscuous mode [ 507.062981][ T3262] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.071980][ T3262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 507.090812][ T3262] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.099981][ T3262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 507.122974][ T3262] device bridge0 entered promiscuous mode [ 512.280852][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.287804][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.510551][ T3300] device bridge0 left promiscuous mode [ 512.620660][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.627652][ T3301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 512.634787][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.641644][ T3301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 512.800234][ T3301] device bridge0 entered promiscuous mode [ 514.505436][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.516345][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.529292][ T3321] device bridge0 left promiscuous mode [ 514.541987][ T3326] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.552533][ T3326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.559726][ T3326] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.566555][ T3326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.573737][ T3326] device bridge0 entered promiscuous mode [ 514.902354][ T3330] device syzkaller0 entered promiscuous mode [ 515.032359][ T28] audit: type=1400 audit(1726793884.860:114): avc: denied { write } for pid=3340 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 515.211101][ T3345] bond_slave_1: mtu less than device minimum [ 515.218309][ T3343] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.225511][ T3343] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.237212][ T3343] device bridge0 left promiscuous mode [ 515.698639][ T3346] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.705547][ T3346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.712740][ T3346] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.719485][ T3346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.730982][ T3346] device bridge0 entered promiscuous mode [ 516.036684][ T3349] device syzkaller0 entered promiscuous mode [ 516.046423][ T3353] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.053604][ T3353] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.060645][ T3353] device bridge0 left promiscuous mode [ 517.689867][ T3389] device wg2 entered promiscuous mode [ 518.826448][ T3397] device syzkaller0 entered promiscuous mode [ 519.107936][ T3409] device syzkaller0 entered promiscuous mode [ 520.844781][ T3420] device syzkaller0 entered promiscuous mode [ 521.941764][ T28] audit: type=1400 audit(1726793891.790:115): avc: denied { create } for pid=3426 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 522.238602][ T3429] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.247452][ T3429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 522.259372][ T3429] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.267434][ T3429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 522.317197][ T3429] device bridge0 entered promiscuous mode [ 522.570097][ T638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 522.621449][ T28] audit: type=1400 audit(1726793892.470:116): avc: denied { create } for pid=3438 comm="syz.2.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 525.372308][ T3492] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.379219][ T3492] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.581620][ T3492] device bridge0 left promiscuous mode [ 526.149242][ T3507] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.156237][ T3507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.163333][ T3507] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.170185][ T3507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.244069][ T3507] device bridge0 entered promiscuous mode [ 527.132441][ T683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 527.994983][ T3531] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.001925][ T3531] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.216895][ T3531] device bridge0 left promiscuous mode [ 530.710997][ T3556] FAULT_INJECTION: forcing a failure. [ 530.710997][ T3556] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 530.858728][ T3556] CPU: 1 PID: 3556 Comm: syz.2.685 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 530.868195][ T3556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 530.878094][ T3556] Call Trace: [ 530.881209][ T3556] [ 530.884085][ T3556] dump_stack_lvl+0x151/0x1b7 [ 530.888590][ T3556] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 530.893882][ T3556] ? pick_next_task_fair+0xa22/0xc80 [ 530.899004][ T3556] dump_stack+0x15/0x1c [ 530.902998][ T3556] should_fail_ex+0x3d0/0x520 [ 530.907512][ T3556] should_fail+0xb/0x10 [ 530.911502][ T3556] should_fail_usercopy+0x1a/0x20 [ 530.916362][ T3556] _copy_from_user+0x1e/0xc0 [ 530.920801][ T3556] __sys_bpf+0x23b/0x7f0 [ 530.924865][ T3556] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 530.930165][ T3556] ? __kasan_check_write+0x14/0x20 [ 530.935108][ T3556] ? fpregs_restore_userregs+0x130/0x290 [ 530.940579][ T3556] __x64_sys_bpf+0x7c/0x90 [ 530.944838][ T3556] x64_sys_call+0x87f/0x9a0 [ 530.949168][ T3556] do_syscall_64+0x3b/0xb0 [ 530.953424][ T3556] ? clear_bhb_loop+0x55/0xb0 [ 530.958073][ T3556] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 530.963799][ T3556] RIP: 0033:0x7f294b37def9 [ 530.968051][ T3556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.987503][ T3556] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 530.995738][ T3556] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 531.003549][ T3556] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 531.011365][ T3556] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 531.019174][ T3556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.026985][ T3556] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 531.034801][ T3556] [ 531.249263][ T3565] device sit0 entered promiscuous mode [ 531.262706][ T3571] syz.2.689[3571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.262773][ T3571] syz.2.689[3571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.313406][ T3572] FAULT_INJECTION: forcing a failure. [ 531.313406][ T3572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 531.437313][ T28] audit: type=1400 audit(1726793901.260:117): avc: denied { create } for pid=3561 comm="syz.3.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 531.581923][ T3572] CPU: 0 PID: 3572 Comm: syz.2.689 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 531.591562][ T3572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 531.601543][ T3572] Call Trace: [ 531.604665][ T3572] [ 531.607448][ T3572] dump_stack_lvl+0x151/0x1b7 [ 531.611963][ T3572] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 531.617270][ T3572] dump_stack+0x15/0x1c [ 531.621276][ T3572] should_fail_ex+0x3d0/0x520 [ 531.625758][ T3572] should_fail+0xb/0x10 [ 531.629749][ T3572] should_fail_usercopy+0x1a/0x20 [ 531.634610][ T3572] _copy_from_user+0x1e/0xc0 [ 531.639035][ T3572] get_user_ifreq+0xd5/0x230 [ 531.643464][ T3572] sock_do_ioctl+0x1a7/0x450 [ 531.647889][ T3572] ? has_cap_mac_admin+0x3c0/0x3c0 [ 531.652837][ T3572] ? sock_show_fdinfo+0xa0/0xa0 [ 531.657528][ T3572] ? selinux_file_ioctl+0x3cc/0x540 [ 531.662557][ T3572] sock_ioctl+0x455/0x740 [ 531.666722][ T3572] ? sock_poll+0x400/0x400 [ 531.670982][ T3572] ? __fget_files+0x2cb/0x330 [ 531.675491][ T3572] ? security_file_ioctl+0x84/0xb0 [ 531.680437][ T3572] ? sock_poll+0x400/0x400 [ 531.684687][ T3572] __se_sys_ioctl+0x114/0x190 [ 531.689202][ T3572] __x64_sys_ioctl+0x7b/0x90 [ 531.693630][ T3572] x64_sys_call+0x98/0x9a0 [ 531.697879][ T3572] do_syscall_64+0x3b/0xb0 [ 531.702134][ T3572] ? clear_bhb_loop+0x55/0xb0 [ 531.706645][ T3572] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 531.712376][ T3572] RIP: 0033:0x7f294b37def9 [ 531.716628][ T3572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 531.736071][ T3572] RSP: 002b:00007f294c1e9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.744402][ T3572] RAX: ffffffffffffffda RBX: 00007f294b536130 RCX: 00007f294b37def9 [ 531.752220][ T3572] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 000000000000000a [ 531.760022][ T3572] RBP: 00007f294c1e9090 R08: 0000000000000000 R09: 0000000000000000 [ 531.767836][ T3572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.775645][ T3572] R13: 0000000000000000 R14: 00007f294b536130 R15: 00007fff36aeefd8 [ 531.783463][ T3572] [ 531.799545][ T3569] device wg2 left promiscuous mode [ 532.391370][ T3582] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.398242][ T3582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.405401][ T3582] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.412136][ T3582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.419724][ T28] audit: type=1400 audit(1726793902.260:118): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 532.840171][ T3582] device bridge0 entered promiscuous mode [ 532.952369][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 533.212423][ T3596] device veth0_vlan left promiscuous mode [ 533.321139][ T3596] device veth0_vlan entered promiscuous mode [ 533.680092][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 533.704429][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 533.773376][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 535.124351][ T3615] FAULT_INJECTION: forcing a failure. [ 535.124351][ T3615] name failslab, interval 1, probability 0, space 0, times 1 [ 535.150605][ T3615] CPU: 1 PID: 3615 Comm: syz.1.700 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 535.160156][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 535.174109][ T3615] Call Trace: [ 535.177934][ T3615] [ 535.181126][ T3615] dump_stack_lvl+0x151/0x1b7 [ 535.186840][ T3615] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 535.193071][ T3615] dump_stack+0x15/0x1c [ 535.197346][ T3615] should_fail_ex+0x3d0/0x520 [ 535.201871][ T3615] ? dup_task_struct+0x5a/0x7d0 [ 535.206538][ T3615] __should_failslab+0xaf/0xf0 [ 535.211135][ T3615] should_failslab+0x9/0x20 [ 535.215474][ T3615] kmem_cache_alloc_node+0x3e/0x2d0 [ 535.220507][ T3615] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 535.225555][ T3615] dup_task_struct+0x5a/0x7d0 [ 535.230148][ T3615] ? __kasan_check_write+0x14/0x20 [ 535.235098][ T3615] copy_process+0x5c3/0x3530 [ 535.239609][ T3615] ? cgroup_rstat_updated+0xe5/0x370 [ 535.244730][ T3615] ? set_task_rq_fair+0xd0/0xd0 [ 535.249417][ T3615] ? update_curr+0x5f0/0x5f0 [ 535.253927][ T3615] ? update_curr+0x36a/0x5f0 [ 535.258357][ T3615] ? idle_dummy+0x10/0x10 [ 535.262522][ T3615] ? pick_next_task_fair+0xa22/0xc80 [ 535.267741][ T3615] kernel_clone+0x229/0x890 [ 535.272080][ T3615] ? create_io_thread+0x180/0x180 [ 535.276942][ T3615] ? _raw_spin_unlock+0x4c/0x70 [ 535.281629][ T3615] ? __schedule+0xd8f/0x1560 [ 535.286052][ T3615] __x64_sys_clone+0x231/0x280 [ 535.290740][ T3615] ? __do_sys_vfork+0x110/0x110 [ 535.295427][ T3615] ? fpregs_restore_userregs+0x130/0x290 [ 535.300894][ T3615] ? switch_fpu_return+0xe/0x10 [ 535.305579][ T3615] x64_sys_call+0x1b0/0x9a0 [ 535.309918][ T3615] do_syscall_64+0x3b/0xb0 [ 535.314171][ T3615] ? clear_bhb_loop+0x55/0xb0 [ 535.318688][ T3615] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 535.324413][ T3615] RIP: 0033:0x7f6878d7def9 [ 535.328666][ T3615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.348195][ T3615] RSP: 002b:00007f6879b1ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 535.356438][ T3615] RAX: ffffffffffffffda RBX: 00007f6878f35f80 RCX: 00007f6878d7def9 [ 535.364248][ T3615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 535.372061][ T3615] RBP: 00007f6879b20090 R08: 0000000000000000 R09: 0000000000000000 [ 535.379874][ T3615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 535.387683][ T3615] R13: 0000000000000000 R14: 00007f6878f35f80 R15: 00007ffda4625ec8 [ 535.395498][ T3615] [ 535.684154][ T28] audit: type=1400 audit(1726793905.520:119): avc: denied { ioctl } for pid=3614 comm="syz.1.700" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x745a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 537.037932][ T3649] FAULT_INJECTION: forcing a failure. [ 537.037932][ T3649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.125688][ T3649] CPU: 0 PID: 3649 Comm: syz.3.708 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 537.135344][ T3649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 537.145321][ T3649] Call Trace: [ 537.149080][ T3649] [ 537.153491][ T3649] dump_stack_lvl+0x151/0x1b7 [ 537.162973][ T3649] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 537.168275][ T3649] ? vfs_write+0xbb3/0xeb0 [ 537.172524][ T3649] ? __kasan_slab_free+0x11/0x20 [ 537.177296][ T3649] dump_stack+0x15/0x1c [ 537.182167][ T3649] should_fail_ex+0x3d0/0x520 [ 537.189358][ T3649] should_fail+0xb/0x10 [ 537.193343][ T3649] should_fail_usercopy+0x1a/0x20 [ 537.198291][ T3649] _copy_from_user+0x1e/0xc0 [ 537.202716][ T3649] __sys_bpf+0x23b/0x7f0 [ 537.206796][ T3649] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 537.212000][ T3649] ? __ia32_sys_read+0x90/0x90 [ 537.216600][ T3649] ? debug_smp_processor_id+0x17/0x20 [ 537.221890][ T3649] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 537.227795][ T3649] __x64_sys_bpf+0x7c/0x90 [ 537.232047][ T3649] x64_sys_call+0x87f/0x9a0 [ 537.236386][ T3649] do_syscall_64+0x3b/0xb0 [ 537.240638][ T3649] ? clear_bhb_loop+0x55/0xb0 [ 537.245150][ T3649] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 537.250887][ T3649] RIP: 0033:0x7f29d9f7def9 [ 537.255308][ T3649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.274837][ T3649] RSP: 002b:00007f29dad28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.283175][ T3649] RAX: ffffffffffffffda RBX: 00007f29da135f80 RCX: 00007f29d9f7def9 [ 537.290978][ T3649] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 537.298788][ T3649] RBP: 00007f29dad28090 R08: 0000000000000000 R09: 0000000000000000 [ 537.306880][ T3649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.320221][ T3649] R13: 0000000000000000 R14: 00007f29da135f80 R15: 00007ffc3c158bb8 [ 537.334321][ T3649] [ 537.369545][ T3654] FAULT_INJECTION: forcing a failure. [ 537.369545][ T3654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.392410][ T3654] CPU: 1 PID: 3654 Comm: syz.3.709 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 537.402502][ T3654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 537.412384][ T3654] Call Trace: [ 537.415514][ T3654] [ 537.418285][ T3654] dump_stack_lvl+0x151/0x1b7 [ 537.422970][ T3654] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 537.428264][ T3654] ? vfs_write+0xbb3/0xeb0 [ 537.432515][ T3654] ? __kasan_slab_free+0x11/0x20 [ 537.437290][ T3654] dump_stack+0x15/0x1c [ 537.441381][ T3654] should_fail_ex+0x3d0/0x520 [ 537.449940][ T3654] should_fail+0xb/0x10 [ 537.454929][ T3654] should_fail_usercopy+0x1a/0x20 [ 537.459854][ T3654] _copy_from_user+0x1e/0xc0 [ 537.464398][ T3654] __sys_bpf+0x23b/0x7f0 [ 537.469893][ T3654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 537.475188][ T3654] ? __ia32_sys_read+0x90/0x90 [ 537.483798][ T3654] ? debug_smp_processor_id+0x17/0x20 [ 537.491616][ T3654] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 537.497686][ T3654] __x64_sys_bpf+0x7c/0x90 [ 537.507012][ T3654] x64_sys_call+0x87f/0x9a0 [ 537.512260][ T3654] do_syscall_64+0x3b/0xb0 [ 537.516784][ T3654] ? clear_bhb_loop+0x55/0xb0 [ 537.521382][ T3654] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 537.527104][ T3654] RIP: 0033:0x7f29d9f7def9 [ 537.531354][ T3654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.550982][ T3654] RSP: 002b:00007f29dad28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.559227][ T3654] RAX: ffffffffffffffda RBX: 00007f29da135f80 RCX: 00007f29d9f7def9 [ 537.567028][ T3654] RDX: 000000000000004c RSI: 0000000020000240 RDI: 000000000000000a [ 537.574839][ T3654] RBP: 00007f29dad28090 R08: 0000000000000000 R09: 0000000000000000 [ 537.586284][ T3654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.598018][ T3654] R13: 0000000000000000 R14: 00007f29da135f80 R15: 00007ffc3c158bb8 [ 537.608662][ T3654] [ 537.720858][ T3658] device veth0_vlan left promiscuous mode [ 537.799725][ T3658] device veth0_vlan entered promiscuous mode [ 537.916978][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.925614][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.934346][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.610305][ T2655] device bridge_slave_1 left promiscuous mode [ 538.650903][ T2655] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.690436][ T2655] device bridge_slave_0 left promiscuous mode [ 538.707303][ T2655] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.737780][ T2655] device veth1_macvtap left promiscuous mode [ 538.747346][ T2655] device veth0_vlan left promiscuous mode [ 538.854481][ T3683] device veth0_vlan left promiscuous mode [ 538.957135][ T3683] device veth0_vlan entered promiscuous mode [ 538.973891][ T28] audit: type=1400 audit(1726793908.820:120): avc: denied { tracepoint } for pid=3684 comm="syz.2.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 541.088226][ T28] audit: type=1400 audit(1726793910.930:121): avc: denied { create } for pid=3700 comm="syz.2.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 541.625115][ T3713] FAULT_INJECTION: forcing a failure. [ 541.625115][ T3713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.638024][ T3713] CPU: 0 PID: 3713 Comm: syz.2.724 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 541.647428][ T3713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 541.657338][ T3713] Call Trace: [ 541.660449][ T3713] [ 541.663228][ T3713] dump_stack_lvl+0x151/0x1b7 [ 541.668179][ T3713] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 541.673624][ T3713] ? __kasan_check_write+0x14/0x20 [ 541.678530][ T3713] dump_stack+0x15/0x1c [ 541.683094][ T3713] should_fail_ex+0x3d0/0x520 [ 541.687671][ T3713] should_fail+0xb/0x10 [ 541.691663][ T3713] should_fail_usercopy+0x1a/0x20 [ 541.696537][ T3713] _copy_from_user+0x1e/0xc0 [ 541.700950][ T3713] perf_copy_attr+0x163/0x880 [ 541.705461][ T3713] __se_sys_perf_event_open+0xd7/0x3d60 [ 541.710843][ T3713] ? __kasan_check_write+0x14/0x20 [ 541.715789][ T3713] ? mutex_unlock+0xb2/0x260 [ 541.720307][ T3713] ? __mutex_lock_slowpath+0x10/0x10 [ 541.725479][ T3713] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 541.730895][ T3713] ? fput+0x15b/0x1b0 [ 541.734716][ T3713] ? __ia32_sys_read+0x90/0x90 [ 541.739398][ T3713] ? debug_smp_processor_id+0x17/0x20 [ 541.745215][ T3713] __x64_sys_perf_event_open+0xbf/0xd0 [ 541.750508][ T3713] x64_sys_call+0x7de/0x9a0 [ 541.754846][ T3713] do_syscall_64+0x3b/0xb0 [ 541.759095][ T3713] ? clear_bhb_loop+0x55/0xb0 [ 541.763610][ T3713] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 541.769339][ T3713] RIP: 0033:0x7f294b37def9 [ 541.773606][ T3713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.795787][ T3713] RSP: 002b:00007f294c20a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 541.804026][ T3713] RAX: ffffffffffffffda RBX: 00007f294b536058 RCX: 00007f294b37def9 [ 541.811923][ T3713] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000200 [ 541.819821][ T3713] RBP: 00007f294c20a090 R08: 0000000000000000 R09: 0000000000000000 [ 541.827637][ T3713] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 541.837317][ T3713] R13: 0000000000000000 R14: 00007f294b536058 R15: 00007fff36aeefd8 [ 541.849969][ T3713] [ 542.411261][ T28] audit: type=1400 audit(1726793912.260:122): avc: denied { cpu } for pid=3717 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 544.480735][ T3765] device veth0_vlan left promiscuous mode [ 544.578481][ T3765] device veth0_vlan entered promiscuous mode [ 544.950249][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.958278][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.065512][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 548.236886][ T3835] FAULT_INJECTION: forcing a failure. [ 548.236886][ T3835] name failslab, interval 1, probability 0, space 0, times 0 [ 548.350193][ T3835] CPU: 0 PID: 3835 Comm: syz.2.758 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 548.359660][ T3835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 548.369646][ T3835] Call Trace: [ 548.372764][ T3835] [ 548.375549][ T3835] dump_stack_lvl+0x151/0x1b7 [ 548.380139][ T3835] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 548.385440][ T3835] ? __kasan_check_write+0x14/0x20 [ 548.390382][ T3835] dump_stack+0x15/0x1c [ 548.394461][ T3835] should_fail_ex+0x3d0/0x520 [ 548.398972][ T3835] ? kernfs_fop_write_iter+0x151/0x410 [ 548.404265][ T3835] __should_failslab+0xaf/0xf0 [ 548.408954][ T3835] should_failslab+0x9/0x20 [ 548.413295][ T3835] __kmem_cache_alloc_node+0x3d/0x250 [ 548.418502][ T3835] ? kernfs_fop_write_iter+0x151/0x410 [ 548.423795][ T3835] __kmalloc+0xa3/0x1e0 [ 548.427790][ T3835] kernfs_fop_write_iter+0x151/0x410 [ 548.432999][ T3835] vfs_write+0x902/0xeb0 [ 548.437073][ T3835] ? __kasan_slab_free+0x11/0x20 [ 548.441849][ T3835] ? file_end_write+0x1c0/0x1c0 [ 548.446533][ T3835] ? mutex_lock+0xb1/0x1e0 [ 548.450787][ T3835] ? bit_wait_io_timeout+0x120/0x120 [ 548.455910][ T3835] ? __fdget_pos+0x2e2/0x390 [ 548.460334][ T3835] ? ksys_write+0x77/0x2c0 [ 548.464588][ T3835] ksys_write+0x199/0x2c0 [ 548.468754][ T3835] ? __ia32_sys_read+0x90/0x90 [ 548.473441][ T3835] ? debug_smp_processor_id+0x17/0x20 [ 548.478646][ T3835] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 548.484549][ T3835] __x64_sys_write+0x7b/0x90 [ 548.488976][ T3835] x64_sys_call+0x2f/0x9a0 [ 548.493229][ T3835] do_syscall_64+0x3b/0xb0 [ 548.497495][ T3835] ? clear_bhb_loop+0x55/0xb0 [ 548.502001][ T3835] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 548.507728][ T3835] RIP: 0033:0x7f294b37def9 [ 548.511999][ T3835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.531509][ T3835] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.539750][ T3835] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 548.547561][ T3835] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000a [ 548.555369][ T3835] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 548.563275][ T3835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.571514][ T3835] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 548.579418][ T3835] [ 548.909784][ T3851] FAULT_INJECTION: forcing a failure. [ 548.909784][ T3851] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.953685][ T3851] CPU: 1 PID: 3851 Comm: syz.0.760 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 548.963253][ T3851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 548.973152][ T3851] Call Trace: [ 548.976272][ T3851] [ 548.979045][ T3851] dump_stack_lvl+0x151/0x1b7 [ 548.983560][ T3851] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 548.989039][ T3851] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 548.994319][ T3851] ? __wake_up_klogd+0xd5/0x110 [ 548.999012][ T3851] dump_stack+0x15/0x1c [ 549.002997][ T3851] should_fail_ex+0x3d0/0x520 [ 549.007517][ T3851] should_fail+0xb/0x10 [ 549.011512][ T3851] should_fail_usercopy+0x1a/0x20 [ 549.016374][ T3851] _copy_to_user+0x1e/0x90 [ 549.020615][ T3851] simple_read_from_buffer+0xc7/0x150 [ 549.025823][ T3851] proc_fail_nth_read+0x1a3/0x210 [ 549.030686][ T3851] ? proc_fault_inject_write+0x390/0x390 [ 549.036237][ T3851] ? fsnotify_perm+0x470/0x5d0 [ 549.040845][ T3851] ? security_file_permission+0x86/0xb0 [ 549.046304][ T3851] ? proc_fault_inject_write+0x390/0x390 [ 549.051794][ T3851] vfs_read+0x26c/0xad0 [ 549.057232][ T3851] ? kernel_read+0x1f0/0x1f0 [ 549.065303][ T3851] ? mutex_lock+0xb1/0x1e0 [ 549.073997][ T3851] ? bit_wait_io_timeout+0x120/0x120 [ 549.079283][ T3851] ? __fdget_pos+0x2e2/0x390 [ 549.090387][ T3851] ? ksys_read+0x77/0x2c0 [ 549.096389][ T3851] ksys_read+0x199/0x2c0 [ 549.103114][ T3851] ? _raw_spin_trylock_bh+0x190/0x190 [ 549.109486][ T3851] ? vfs_write+0xeb0/0xeb0 [ 549.113723][ T3851] ? debug_smp_processor_id+0x17/0x20 [ 549.118927][ T3851] ? perf_trace_sys_enter+0x30/0x140 [ 549.124131][ T3851] __x64_sys_read+0x7b/0x90 [ 549.128468][ T3851] x64_sys_call+0x28/0x9a0 [ 549.132717][ T3851] do_syscall_64+0x3b/0xb0 [ 549.136969][ T3851] ? clear_bhb_loop+0x55/0xb0 [ 549.141483][ T3851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 549.147212][ T3851] RIP: 0033:0x7effd237c93c [ 549.151465][ T3851] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 549.170996][ T3851] RSP: 002b:00007effd30fc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 549.183398][ T3851] RAX: ffffffffffffffda RBX: 00007effd2536058 RCX: 00007effd237c93c [ 549.194774][ T3851] RDX: 000000000000000f RSI: 00007effd30fc0a0 RDI: 0000000000000004 [ 549.204896][ T3851] RBP: 00007effd30fc090 R08: 0000000000000000 R09: 0000000000000000 [ 549.212861][ T3851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.220675][ T3851] R13: 0000000000000001 R14: 00007effd2536058 R15: 00007ffd7f7315b8 [ 549.228499][ T3851] [ 550.160719][ T3873] syz.1.768[3873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.160801][ T3873] syz.1.768[3873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.195732][ T3871] FAULT_INJECTION: forcing a failure. [ 550.195732][ T3871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 550.241025][ T3873] syz.1.768[3873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.241095][ T3873] syz.1.768[3873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.272490][ T3871] CPU: 0 PID: 3871 Comm: syz.3.767 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 550.292980][ T3871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 550.302878][ T3871] Call Trace: [ 550.305997][ T3871] [ 550.308779][ T3871] dump_stack_lvl+0x151/0x1b7 [ 550.313293][ T3871] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 550.318584][ T3871] ? enqueue_hrtimer+0xca/0x250 [ 550.323272][ T3871] dump_stack+0x15/0x1c [ 550.327269][ T3871] should_fail_ex+0x3d0/0x520 [ 550.334779][ T3871] should_fail+0xb/0x10 [ 550.338805][ T3871] should_fail_usercopy+0x1a/0x20 [ 550.343670][ T3871] _copy_from_user+0x1e/0xc0 [ 550.348096][ T3871] __sys_bpf+0x23b/0x7f0 [ 550.352172][ T3871] ? clockevents_program_event+0x22f/0x300 [ 550.357816][ T3871] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 550.363023][ T3871] ? __sched_clock_gtod_offset+0x100/0x100 [ 550.368669][ T3871] ? debug_smp_processor_id+0x17/0x20 [ 550.373869][ T3871] __x64_sys_bpf+0x7c/0x90 [ 550.378123][ T3871] x64_sys_call+0x87f/0x9a0 [ 550.382544][ T3871] do_syscall_64+0x3b/0xb0 [ 550.386966][ T3871] ? clear_bhb_loop+0x55/0xb0 [ 550.394169][ T3871] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.402910][ T3871] RIP: 0033:0x7f29d9f7def9 [ 550.407296][ T3871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.433433][ T3871] RSP: 002b:00007f29dad28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 550.445796][ T3871] RAX: ffffffffffffffda RBX: 00007f29da135f80 RCX: 00007f29d9f7def9 [ 550.459484][ T3871] RDX: 0000000000000038 RSI: 0000000020000300 RDI: 000000000000001a [ 550.473504][ T3871] RBP: 00007f29dad28090 R08: 0000000000000000 R09: 0000000000000000 [ 550.489281][ T3871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.497628][ T3871] R13: 0000000000000000 R14: 00007f29da135f80 R15: 00007ffc3c158bb8 [ 550.509280][ T3871] [ 550.681605][ T28] audit: type=1400 audit(1726793920.530:123): avc: denied { create } for pid=3883 comm="syz.2.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 550.732637][ T3885] syz.2.772[3885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.732694][ T3885] syz.2.772[3885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.739061][ T3882] FAULT_INJECTION: forcing a failure. [ 550.739061][ T3882] name failslab, interval 1, probability 0, space 0, times 0 [ 550.770299][ T3882] CPU: 1 PID: 3882 Comm: syz.1.771 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 550.779759][ T3882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 550.789652][ T3882] Call Trace: [ 550.792772][ T3882] [ 550.795549][ T3882] dump_stack_lvl+0x151/0x1b7 [ 550.800066][ T3882] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 550.805357][ T3882] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 550.811000][ T3882] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 550.816987][ T3882] dump_stack+0x15/0x1c [ 550.820978][ T3882] should_fail_ex+0x3d0/0x520 [ 550.825501][ T3882] ? getname_flags+0xba/0x520 [ 550.830013][ T3882] __should_failslab+0xaf/0xf0 [ 550.834696][ T3882] should_failslab+0x9/0x20 [ 550.839033][ T3882] kmem_cache_alloc+0x3b/0x2c0 [ 550.843643][ T3882] getname_flags+0xba/0x520 [ 550.847972][ T3882] __x64_sys_mkdirat+0x7c/0xa0 [ 550.852574][ T3882] x64_sys_call+0x6c6/0x9a0 [ 550.856913][ T3882] do_syscall_64+0x3b/0xb0 [ 550.861165][ T3882] ? clear_bhb_loop+0x55/0xb0 [ 550.865678][ T3882] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.871407][ T3882] RIP: 0033:0x7f6878d7def9 [ 550.875663][ T3882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.895102][ T3882] RSP: 002b:00007f6879b20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 550.903350][ T3882] RAX: ffffffffffffffda RBX: 00007f6878f35f80 RCX: 00007f6878d7def9 [ 550.911155][ T3882] RDX: 00000000000001ff RSI: 0000000000000000 RDI: ffffffffffffff9c [ 550.918965][ T3882] RBP: 00007f6879b20090 R08: 0000000000000000 R09: 0000000000000000 [ 550.926781][ T3882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.934589][ T3882] R13: 0000000000000000 R14: 00007f6878f35f80 R15: 00007ffda4625ec8 [ 550.942408][ T3882] [ 550.992979][ T3887] FAULT_INJECTION: forcing a failure. [ 550.992979][ T3887] name failslab, interval 1, probability 0, space 0, times 0 [ 551.005341][ T3897] FAULT_INJECTION: forcing a failure. [ 551.005341][ T3897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 551.028690][ T3887] CPU: 1 PID: 3887 Comm: syz.0.770 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 551.042440][ T3887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 551.054621][ T3887] Call Trace: [ 551.057983][ T3887] [ 551.066313][ T3887] dump_stack_lvl+0x151/0x1b7 [ 551.071482][ T3887] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 551.076732][ T3887] ? do_sys_openat2+0xb4/0x890 [ 551.081679][ T3887] dump_stack+0x15/0x1c [ 551.085767][ T3887] should_fail_ex+0x3d0/0x520 [ 551.090285][ T3887] ? getname_flags+0xba/0x520 [ 551.094786][ T3887] __should_failslab+0xaf/0xf0 [ 551.099535][ T3887] should_failslab+0x9/0x20 [ 551.104335][ T3887] kmem_cache_alloc+0x3b/0x2c0 [ 551.113342][ T3887] ? enqueue_hrtimer+0xca/0x250 [ 551.121248][ T3887] ? __hrtimer_run_queues+0x46b/0xad0 [ 551.126639][ T3887] getname_flags+0xba/0x520 [ 551.130973][ T3887] getname+0x19/0x20 [ 551.134691][ T3887] do_sys_openat2+0xe0/0x890 [ 551.139136][ T3887] ? do_sys_open+0x220/0x220 [ 551.143552][ T3887] ? kvm_sched_clock_read+0x18/0x40 [ 551.148578][ T3887] ? sched_clock+0x9/0x10 [ 551.152755][ T3887] ? sched_clock_cpu+0x71/0x2b0 [ 551.157436][ T3887] __x64_sys_openat+0x243/0x290 [ 551.162132][ T3887] ? __ia32_sys_open+0x270/0x270 [ 551.166893][ T3887] ? debug_smp_processor_id+0x17/0x20 [ 551.172099][ T3887] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 551.178000][ T3887] x64_sys_call+0x6bf/0x9a0 [ 551.182340][ T3887] do_syscall_64+0x3b/0xb0 [ 551.186591][ T3887] ? clear_bhb_loop+0x55/0xb0 [ 551.191107][ T3887] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 551.196833][ T3887] RIP: 0033:0x7effd237def9 [ 551.201089][ T3887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.220582][ T3887] RSP: 002b:00007effd311d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 551.228773][ T3887] RAX: ffffffffffffffda RBX: 00007effd2535f80 RCX: 00007effd237def9 [ 551.236585][ T3887] RDX: 00000000000026e1 RSI: 0000000020000540 RDI: ffffffffffffff9c [ 551.244399][ T3887] RBP: 00007effd311d090 R08: 0000000000000000 R09: 0000000000000000 [ 551.252295][ T3887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.260190][ T3887] R13: 0000000000000000 R14: 00007effd2535f80 R15: 00007ffd7f7315b8 [ 551.268007][ T3887] [ 551.285145][ T3897] CPU: 1 PID: 3897 Comm: syz.1.777 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 551.294616][ T3897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 551.304505][ T3897] Call Trace: [ 551.307630][ T3897] [ 551.310403][ T3897] dump_stack_lvl+0x151/0x1b7 [ 551.314916][ T3897] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 551.320218][ T3897] ? vfs_write+0xbb3/0xeb0 [ 551.324571][ T3897] ? __kasan_slab_free+0x11/0x20 [ 551.329410][ T3897] dump_stack+0x15/0x1c [ 551.333402][ T3897] should_fail_ex+0x3d0/0x520 [ 551.337924][ T3897] should_fail+0xb/0x10 [ 551.341995][ T3897] should_fail_usercopy+0x1a/0x20 [ 551.346854][ T3897] _copy_from_user+0x1e/0xc0 [ 551.352326][ T3897] __sys_bpf+0x23b/0x7f0 [ 551.356401][ T3897] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 551.361621][ T3897] ? __ia32_sys_read+0x90/0x90 [ 551.366298][ T3897] ? debug_smp_processor_id+0x17/0x20 [ 551.371505][ T3897] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 551.377407][ T3897] __x64_sys_bpf+0x7c/0x90 [ 551.381657][ T3897] x64_sys_call+0x87f/0x9a0 [ 551.385999][ T3897] do_syscall_64+0x3b/0xb0 [ 551.390251][ T3897] ? clear_bhb_loop+0x55/0xb0 [ 551.394763][ T3897] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 551.400664][ T3897] RIP: 0033:0x7f6878d7def9 [ 551.404917][ T3897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.424361][ T3897] RSP: 002b:00007f6879b20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 551.432608][ T3897] RAX: ffffffffffffffda RBX: 00007f6878f35f80 RCX: 00007f6878d7def9 [ 551.440417][ T3897] RDX: 0000000000000050 RSI: 0000000020000240 RDI: 000000000000000a [ 551.448227][ T3897] RBP: 00007f6879b20090 R08: 0000000000000000 R09: 0000000000000000 [ 551.456126][ T3897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.463935][ T3897] R13: 0000000000000000 R14: 00007f6878f35f80 R15: 00007ffda4625ec8 [ 551.471757][ T3897] [ 552.440139][ T3922] FAULT_INJECTION: forcing a failure. [ 552.440139][ T3922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 552.453864][ T3922] CPU: 0 PID: 3922 Comm: syz.1.780 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 552.471794][ T3922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 552.488740][ T3922] Call Trace: [ 552.491862][ T3922] [ 552.494641][ T3922] dump_stack_lvl+0x151/0x1b7 [ 552.499145][ T3922] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 552.504449][ T3922] ? avc_denied+0x1b0/0x1b0 [ 552.508781][ T3922] dump_stack+0x15/0x1c [ 552.512773][ T3922] should_fail_ex+0x3d0/0x520 [ 552.517286][ T3922] should_fail+0xb/0x10 [ 552.521536][ T3922] should_fail_usercopy+0x1a/0x20 [ 552.526395][ T3922] _copy_from_user+0x1e/0xc0 [ 552.530825][ T3922] sk_setsockopt+0x2cf/0x3160 [ 552.535340][ T3922] ? sockopt_capable+0x60/0x60 [ 552.539939][ T3922] ? selinux_socket_setsockopt+0x260/0x360 [ 552.545582][ T3922] ? __fget_files+0x2cb/0x330 [ 552.550094][ T3922] sock_setsockopt+0x59/0x70 [ 552.554523][ T3922] __sys_setsockopt+0x423/0x8b0 [ 552.559203][ T3922] ? fput+0x15b/0x1b0 [ 552.563026][ T3922] ? __ia32_sys_recv+0xb0/0xb0 [ 552.567625][ T3922] ? debug_smp_processor_id+0x17/0x20 [ 552.572831][ T3922] __x64_sys_setsockopt+0xbf/0xd0 [ 552.577692][ T3922] x64_sys_call+0x1a2/0x9a0 [ 552.582032][ T3922] do_syscall_64+0x3b/0xb0 [ 552.586284][ T3922] ? clear_bhb_loop+0x55/0xb0 [ 552.590796][ T3922] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 552.596538][ T3922] RIP: 0033:0x7f6878d7def9 [ 552.600777][ T3922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 552.620397][ T3922] RSP: 002b:00007f6879ade038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 552.628725][ T3922] RAX: ffffffffffffffda RBX: 00007f6878f36130 RCX: 00007f6878d7def9 [ 552.636539][ T3922] RDX: 0000000000000049 RSI: 0000000000000001 RDI: 0000000000000004 [ 552.644348][ T3922] RBP: 00007f6879ade090 R08: 0000000000000004 R09: 0000000000000000 [ 552.652170][ T3922] R10: 0000000020000540 R11: 0000000000000246 R12: 0000000000000001 [ 552.659978][ T3922] R13: 0000000000000001 R14: 00007f6878f36130 R15: 00007ffda4625ec8 [ 552.667784][ T3922] [ 552.968762][ T3931] syz.3.784[3931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.968836][ T3931] syz.3.784[3931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.215449][ T3949] FAULT_INJECTION: forcing a failure. [ 554.215449][ T3949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 554.248266][ T3949] CPU: 1 PID: 3949 Comm: syz.2.787 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 554.257818][ T3949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 554.267709][ T3949] Call Trace: [ 554.270839][ T3949] [ 554.273615][ T3949] dump_stack_lvl+0x151/0x1b7 [ 554.278128][ T3949] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 554.283432][ T3949] dump_stack+0x15/0x1c [ 554.287571][ T3949] should_fail_ex+0x3d0/0x520 [ 554.292088][ T3949] should_fail+0xb/0x10 [ 554.296074][ T3949] should_fail_usercopy+0x1a/0x20 [ 554.300935][ T3949] _copy_from_user+0x1e/0xc0 [ 554.305368][ T3949] get_user_ifreq+0xd5/0x230 [ 554.309783][ T3949] sock_do_ioctl+0x1a7/0x450 [ 554.314210][ T3949] ? has_cap_mac_admin+0x3c0/0x3c0 [ 554.319160][ T3949] ? sock_show_fdinfo+0xa0/0xa0 [ 554.323845][ T3949] ? selinux_file_ioctl+0x3cc/0x540 [ 554.328878][ T3949] sock_ioctl+0x455/0x740 [ 554.333045][ T3949] ? sock_poll+0x400/0x400 [ 554.337303][ T3949] ? __fget_files+0x2cb/0x330 [ 554.341807][ T3949] ? security_file_ioctl+0x84/0xb0 [ 554.346752][ T3949] ? sock_poll+0x400/0x400 [ 554.351005][ T3949] __se_sys_ioctl+0x114/0x190 [ 554.355529][ T3949] __x64_sys_ioctl+0x7b/0x90 [ 554.360031][ T3949] x64_sys_call+0x98/0x9a0 [ 554.364284][ T3949] do_syscall_64+0x3b/0xb0 [ 554.368535][ T3949] ? clear_bhb_loop+0x55/0xb0 [ 554.373050][ T3949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 554.378779][ T3949] RIP: 0033:0x7f294b37def9 [ 554.383032][ T3949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 554.408422][ T3949] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.417131][ T3949] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 554.425521][ T3949] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000009 [ 554.433328][ T3949] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 554.441135][ T3949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 554.448944][ T3949] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 554.456760][ T3949] [ 555.412882][ T3976] syz.2.793[3976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.412963][ T3976] syz.2.793[3976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.501470][ T3976] device wg2 entered promiscuous mode [ 557.191569][ T4000] FAULT_INJECTION: forcing a failure. [ 557.191569][ T4000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.224953][ T4000] CPU: 0 PID: 4000 Comm: syz.2.799 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 557.244110][ T4000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 557.261549][ T4000] Call Trace: [ 557.264763][ T4000] [ 557.267529][ T4000] dump_stack_lvl+0x151/0x1b7 [ 557.272135][ T4000] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 557.277427][ T4000] ? dump_stack+0x9/0x1c [ 557.281508][ T4000] dump_stack+0x15/0x1c [ 557.285515][ T4000] should_fail_ex+0x3d0/0x520 [ 557.290014][ T4000] should_fail+0xb/0x10 [ 557.294004][ T4000] should_fail_usercopy+0x1a/0x20 [ 557.298870][ T4000] _copy_from_user+0x1e/0xc0 [ 557.303381][ T4000] br_ioctl_stub+0x2f7/0x940 [ 557.307805][ T4000] ? has_cap_mac_admin+0x3c0/0x3c0 [ 557.312768][ T4000] ? enqueue_hrtimer+0xca/0x250 [ 557.317437][ T4000] ? br_dev_read_uargs+0x3f0/0x3f0 [ 557.322384][ T4000] ? __mutex_lock_slowpath+0xe/0x10 [ 557.327417][ T4000] ? mutex_lock+0x130/0x1e0 [ 557.331784][ T4000] ? bit_wait_io_timeout+0x120/0x120 [ 557.336877][ T4000] ? selinux_file_ioctl+0x3cc/0x540 [ 557.341913][ T4000] ? br_dev_read_uargs+0x3f0/0x3f0 [ 557.346860][ T4000] sock_ioctl+0x291/0x740 [ 557.351033][ T4000] ? sock_poll+0x400/0x400 [ 557.355281][ T4000] ? __fget_files+0x2cb/0x330 [ 557.359793][ T4000] ? security_file_ioctl+0x84/0xb0 [ 557.364824][ T4000] ? sock_poll+0x400/0x400 [ 557.369081][ T4000] __se_sys_ioctl+0x114/0x190 [ 557.373591][ T4000] __x64_sys_ioctl+0x7b/0x90 [ 557.378022][ T4000] x64_sys_call+0x98/0x9a0 [ 557.382369][ T4000] do_syscall_64+0x3b/0xb0 [ 557.386618][ T4000] ? clear_bhb_loop+0x55/0xb0 [ 557.391226][ T4000] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 557.396957][ T4000] RIP: 0033:0x7f294b37def9 [ 557.401203][ T4000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.420765][ T4000] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.441071][ T4000] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 557.455991][ T4000] RDX: 0000000020000080 RSI: 00000000000089a0 RDI: 000000000000000a [ 557.466745][ T4000] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 557.474810][ T4000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.482787][ T4000] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 557.490523][ T4000] [ 558.505644][ T4023] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.512740][ T4023] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.545841][ T4022] FAULT_INJECTION: forcing a failure. [ 558.545841][ T4022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.570066][ T4022] CPU: 1 PID: 4022 Comm: syz.2.805 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 558.579532][ T4022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 558.589565][ T4022] Call Trace: [ 558.592634][ T4022] [ 558.595500][ T4022] dump_stack_lvl+0x151/0x1b7 [ 558.602013][ T4022] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 558.611159][ T4022] dump_stack+0x15/0x1c [ 558.615474][ T4022] should_fail_ex+0x3d0/0x520 [ 558.616596][ T4023] device bridge0 left promiscuous mode [ 558.620483][ T4022] should_fail+0xb/0x10 [ 558.620512][ T4022] should_fail_usercopy+0x1a/0x20 [ 558.620531][ T4022] _copy_from_user+0x1e/0xc0 [ 558.641993][ T4022] get_user_ifreq+0xd5/0x230 [ 558.646593][ T4022] sock_do_ioctl+0x1a7/0x450 [ 558.651104][ T4022] ? sock_show_fdinfo+0xa0/0xa0 [ 558.655788][ T4022] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 558.661779][ T4022] ? do_vfs_ioctl+0x121/0x29a0 [ 558.666373][ T4022] ? __se_sys_ioctl+0x108/0x190 [ 558.671061][ T4022] sock_ioctl+0x455/0x740 [ 558.675232][ T4022] ? sock_poll+0x400/0x400 [ 558.679480][ T4022] ? __fget_files+0x2cb/0x330 [ 558.683997][ T4022] ? security_file_ioctl+0x84/0xb0 [ 558.688941][ T4022] ? sock_poll+0x400/0x400 [ 558.693193][ T4022] __se_sys_ioctl+0x114/0x190 [ 558.697707][ T4022] __x64_sys_ioctl+0x7b/0x90 [ 558.702140][ T4022] x64_sys_call+0x98/0x9a0 [ 558.706387][ T4022] do_syscall_64+0x3b/0xb0 [ 558.710643][ T4022] ? clear_bhb_loop+0x55/0xb0 [ 558.715243][ T4022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 558.721150][ T4022] RIP: 0033:0x7f294b37def9 [ 558.725508][ T4022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.745036][ T4022] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.753364][ T4022] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 558.761174][ T4022] RDX: 0000000020000900 RSI: 0000000000008914 RDI: 000000000000000c [ 558.768993][ T4022] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 558.776796][ T4022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.784607][ T4022] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 558.792424][ T4022] [ 558.814127][ T4018] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.825805][ T4018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 558.840056][ T4018] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.849805][ T4018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 558.871936][ T4018] device bridge0 entered promiscuous mode [ 559.830195][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 560.210757][ T4045] FAULT_INJECTION: forcing a failure. [ 560.210757][ T4045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.330255][ T4045] CPU: 0 PID: 4045 Comm: syz.2.812 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 560.339728][ T4045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 560.349614][ T4045] Call Trace: [ 560.352737][ T4045] [ 560.355514][ T4045] dump_stack_lvl+0x151/0x1b7 [ 560.360028][ T4045] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 560.365329][ T4045] ? _kstrtol+0x150/0x150 [ 560.369490][ T4045] ? avc_has_perm_noaudit+0x348/0x430 [ 560.374695][ T4045] dump_stack+0x15/0x1c [ 560.378688][ T4045] should_fail_ex+0x3d0/0x520 [ 560.383202][ T4045] should_fail+0xb/0x10 [ 560.387198][ T4045] should_fail_usercopy+0x1a/0x20 [ 560.392053][ T4045] strncpy_from_user+0x24/0x2b0 [ 560.396739][ T4045] bpf_prog_load+0x1fb/0x1bf0 [ 560.401255][ T4045] ? map_freeze+0x3a0/0x3a0 [ 560.405600][ T4045] ? selinux_bpf+0xcb/0x100 [ 560.409932][ T4045] ? security_bpf+0x82/0xb0 [ 560.414272][ T4045] __sys_bpf+0x52c/0x7f0 [ 560.418438][ T4045] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 560.423648][ T4045] ? __ia32_sys_read+0x90/0x90 [ 560.428251][ T4045] ? debug_smp_processor_id+0x17/0x20 [ 560.433453][ T4045] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 560.439357][ T4045] __x64_sys_bpf+0x7c/0x90 [ 560.443608][ T4045] x64_sys_call+0x87f/0x9a0 [ 560.447946][ T4045] do_syscall_64+0x3b/0xb0 [ 560.452201][ T4045] ? clear_bhb_loop+0x55/0xb0 [ 560.456712][ T4045] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 560.462442][ T4045] RIP: 0033:0x7f294b37def9 [ 560.466790][ T4045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.486230][ T4045] RSP: 002b:00007f294c22b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 560.494617][ T4045] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37def9 [ 560.502992][ T4045] RDX: 0000000000000090 RSI: 0000000020000100 RDI: 0000000000000005 [ 560.520750][ T4045] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 560.528638][ T4045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 560.536449][ T4045] R13: 0000000000000001 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 560.544266][ T4045] [ 560.688565][ T4050] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.695635][ T4050] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.725990][ T4050] device bridge0 left promiscuous mode [ 562.188971][ T4079] device veth0_vlan left promiscuous mode [ 562.265629][ T4079] device veth0_vlan entered promiscuous mode [ 562.373469][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 562.402071][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 562.484131][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 562.489178][ T4093] FAULT_INJECTION: forcing a failure. [ 562.489178][ T4093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.620395][ T4093] CPU: 1 PID: 4093 Comm: syz.3.827 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 562.629862][ T4093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 562.639756][ T4093] Call Trace: [ 562.642885][ T4093] [ 562.645656][ T4093] dump_stack_lvl+0x151/0x1b7 [ 562.650172][ T4093] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 562.655476][ T4093] ? _kstrtol+0x150/0x150 [ 562.659630][ T4093] ? avc_has_perm_noaudit+0x348/0x430 [ 562.664848][ T4093] dump_stack+0x15/0x1c [ 562.668829][ T4093] should_fail_ex+0x3d0/0x520 [ 562.673351][ T4093] should_fail+0xb/0x10 [ 562.677337][ T4093] should_fail_usercopy+0x1a/0x20 [ 562.682199][ T4093] strncpy_from_user+0x24/0x2b0 [ 562.686891][ T4093] bpf_prog_load+0x1fb/0x1bf0 [ 562.691402][ T4093] ? map_freeze+0x3a0/0x3a0 [ 562.699437][ T4093] ? selinux_bpf+0xcb/0x100 [ 562.708097][ T4093] ? security_bpf+0x82/0xb0 [ 562.716019][ T4093] __sys_bpf+0x52c/0x7f0 [ 562.720528][ T4093] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 562.725881][ T4093] ? __ia32_sys_read+0x90/0x90 [ 562.730413][ T4093] ? debug_smp_processor_id+0x17/0x20 [ 562.737797][ T4093] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 562.749565][ T4093] __x64_sys_bpf+0x7c/0x90 [ 562.755482][ T4093] x64_sys_call+0x87f/0x9a0 [ 562.761359][ T4093] do_syscall_64+0x3b/0xb0 [ 562.768368][ T4093] ? clear_bhb_loop+0x55/0xb0 [ 562.773084][ T4093] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 562.780015][ T4093] RIP: 0033:0x7f29d9f7def9 [ 562.784322][ T4093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 562.804054][ T4093] RSP: 002b:00007f29dad28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 562.812377][ T4093] RAX: ffffffffffffffda RBX: 00007f29da135f80 RCX: 00007f29d9f7def9 [ 562.820188][ T4093] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 562.828003][ T4093] RBP: 00007f29dad28090 R08: 0000000000000000 R09: 0000000000000000 [ 562.835905][ T4093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 562.843716][ T4093] R13: 0000000000000000 R14: 00007f29da135f80 R15: 00007ffc3c158bb8 [ 562.851536][ T4093] [ 566.281589][ T4133] FAULT_INJECTION: forcing a failure. [ 566.281589][ T4133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.448987][ T28] audit: type=1400 audit(1726793936.290:124): avc: denied { create } for pid=4134 comm="syz.3.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 566.489460][ T4133] CPU: 0 PID: 4133 Comm: syz.2.839 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 566.509163][ T4133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 566.519512][ T4133] Call Trace: [ 566.522633][ T4133] [ 566.525411][ T4133] dump_stack_lvl+0x151/0x1b7 [ 566.529927][ T4133] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 566.535221][ T4133] ? __local_bh_enable_ip+0x58/0x80 [ 566.540256][ T4133] dump_stack+0x15/0x1c [ 566.544247][ T4133] should_fail_ex+0x3d0/0x520 [ 566.548856][ T4133] should_fail+0xb/0x10 [ 566.561898][ T4133] should_fail_usercopy+0x1a/0x20 [ 566.567026][ T4133] _copy_to_user+0x1e/0x90 [ 566.578011][ T4133] simple_read_from_buffer+0xc7/0x150 [ 566.583464][ T4133] proc_fail_nth_read+0x1a3/0x210 [ 566.588322][ T4133] ? proc_fault_inject_write+0x390/0x390 [ 566.593789][ T4133] ? fsnotify_perm+0x470/0x5d0 [ 566.598391][ T4133] ? security_file_permission+0x86/0xb0 [ 566.603779][ T4133] ? proc_fault_inject_write+0x390/0x390 [ 566.609250][ T4133] vfs_read+0x26c/0xad0 [ 566.613234][ T4133] ? kernel_read+0x1f0/0x1f0 [ 566.617659][ T4133] ? mutex_lock+0xb1/0x1e0 [ 566.622437][ T4133] ? bit_wait_io_timeout+0x120/0x120 [ 566.627553][ T4133] ? __fdget_pos+0x2e2/0x390 [ 566.631977][ T4133] ? ksys_read+0x77/0x2c0 [ 566.636143][ T4133] ksys_read+0x199/0x2c0 [ 566.640223][ T4133] ? __ia32_sys_recv+0xb0/0xb0 [ 566.644824][ T4133] ? vfs_write+0xeb0/0xeb0 [ 566.649076][ T4133] ? debug_smp_processor_id+0x17/0x20 [ 566.654283][ T4133] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 566.660182][ T4133] __x64_sys_read+0x7b/0x90 [ 566.664522][ T4133] x64_sys_call+0x28/0x9a0 [ 566.668780][ T4133] do_syscall_64+0x3b/0xb0 [ 566.673026][ T4133] ? clear_bhb_loop+0x55/0xb0 [ 566.677628][ T4133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 566.683354][ T4133] RIP: 0033:0x7f294b37c93c [ 566.687609][ T4133] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 566.707058][ T4133] RSP: 002b:00007f294c22b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 566.715304][ T4133] RAX: ffffffffffffffda RBX: 00007f294b535f80 RCX: 00007f294b37c93c [ 566.723103][ T4133] RDX: 000000000000000f RSI: 00007f294c22b0a0 RDI: 0000000000000005 [ 566.730944][ T4133] RBP: 00007f294c22b090 R08: 0000000000000000 R09: 0000000000000000 [ 566.738900][ T4133] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 566.746711][ T4133] R13: 0000000000000000 R14: 00007f294b535f80 R15: 00007fff36aeefd8 [ 566.754534][ T4133] [ 568.140005][ C0] sched: RT throttling activated [ 570.171306][ T28] audit: type=1400 audit(1726793940.020:125): avc: denied { create } for pid=4177 comm="syz.3.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 573.076021][ T4198] FAULT_INJECTION: forcing a failure. [ 573.076021][ T4198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.200089][ T4198] CPU: 0 PID: 4198 Comm: syz.0.857 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 573.209559][ T4198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 573.219451][ T4198] Call Trace: [ 573.222578][ T4198] [ 573.225438][ T4198] dump_stack_lvl+0x151/0x1b7 [ 573.229968][ T4198] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 573.235249][ T4198] dump_stack+0x15/0x1c [ 573.239237][ T4198] should_fail_ex+0x3d0/0x520 [ 573.243752][ T4198] should_fail+0xb/0x10 [ 573.247744][ T4198] should_fail_usercopy+0x1a/0x20 [ 573.252606][ T4198] _copy_from_user+0x1e/0xc0 [ 573.257032][ T4198] kstrtouint_from_user+0xc2/0x180 [ 573.261979][ T4198] ? kstrtol_from_user+0x180/0x180 [ 573.266927][ T4198] ? __kasan_check_read+0x11/0x20 [ 573.271786][ T4198] proc_fail_nth_write+0xa6/0x290 [ 573.276646][ T4198] ? selinux_file_permission+0x2bb/0x560 [ 573.282114][ T4198] ? proc_fail_nth_read+0x210/0x210 [ 573.287147][ T4198] ? fsnotify_perm+0x6a/0x5d0 [ 573.291665][ T4198] ? security_file_permission+0x86/0xb0 [ 573.297042][ T4198] ? proc_fail_nth_read+0x210/0x210 [ 573.302166][ T4198] vfs_write+0x41d/0xeb0 [ 573.306254][ T4198] ? __kasan_check_read+0x11/0x20 [ 573.311110][ T4198] ? file_end_write+0x1c0/0x1c0 [ 573.315786][ T4198] ? mutex_lock+0xb1/0x1e0 [ 573.320136][ T4198] ? bit_wait_io_timeout+0x120/0x120 [ 573.325692][ T4198] ? __fdget_pos+0x2e2/0x390 [ 573.330117][ T4198] ? ksys_write+0x77/0x2c0 [ 573.334371][ T4198] ksys_write+0x199/0x2c0 [ 573.338540][ T4198] ? __ia32_sys_read+0x90/0x90 [ 573.343136][ T4198] ? debug_smp_processor_id+0x17/0x20 [ 573.348343][ T4198] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 573.354257][ T4198] __x64_sys_write+0x7b/0x90 [ 573.358675][ T4198] x64_sys_call+0x2f/0x9a0 [ 573.362925][ T4198] do_syscall_64+0x3b/0xb0 [ 573.367179][ T4198] ? clear_bhb_loop+0x55/0xb0 [ 573.371690][ T4198] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 573.377419][ T4198] RIP: 0033:0x7effd237c9df [ 573.381670][ T4198] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 573.401116][ T4198] RSP: 002b:00007effd311d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 573.409358][ T4198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007effd237c9df [ 573.417168][ T4198] RDX: 0000000000000001 RSI: 00007effd311d0a0 RDI: 0000000000000006 [ 573.424983][ T4198] RBP: 00007effd311d090 R08: 0000000000000000 R09: 0000000000000000 [ 573.432792][ T4198] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 573.440603][ T4198] R13: 0000000000000000 R14: 00007effd2535f80 R15: 00007ffd7f7315b8 [ 573.448419][ T4198] [ 577.879949][ T4229] device sit0 entered promiscuous mode [ 578.176922][ T4242] syz.0.871[4242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.210836][ T4241] device sit0 entered promiscuous mode [ 581.235242][ T4244] device wg2 left promiscuous mode [ 581.245946][ T4242] device wg2 entered promiscuous mode [ 581.430150][ T4258] syz.2.876 (4258) used greatest stack depth: 19656 bytes left [ 583.834181][ T4290] FAULT_INJECTION: forcing a failure. [ 583.834181][ T4290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 584.006443][ T4290] CPU: 1 PID: 4290 Comm: syz.0.886 Not tainted 6.1.93-syzkaller-00012-g8a268cb981a6 #0 [ 584.016013][ T4290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 584.025908][ T4290] Call Trace: [ 584.029030][ T4290] [ 584.031806][ T4290] dump_stack_lvl+0x151/0x1b7 [ 584.036318][ T4290] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 584.041614][ T4290] ? vfs_write+0xbb3/0xeb0 [ 584.045863][ T4290] ? __kasan_slab_free+0x11/0x20 [ 584.050647][ T4290] dump_stack+0x15/0x1c [ 584.054631][ T4290] should_fail_ex+0x3d0/0x520 [ 584.059144][ T4290] should_fail+0xb/0x10 [ 584.063136][ T4290] should_fail_usercopy+0x1a/0x20 [ 584.067997][ T4290] _copy_from_user+0x1e/0xc0 [ 584.072435][ T4290] __sys_bpf+0x23b/0x7f0 [ 584.076506][ T4290] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 584.081720][ T4290] ? __ia32_sys_read+0x90/0x90 [ 584.086314][ T4290] ? debug_smp_processor_id+0x17/0x20 [ 584.091524][ T4290] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 584.097462][ T4290] __x64_sys_bpf+0x7c/0x90 [ 584.101674][ T4290] x64_sys_call+0x87f/0x9a0 [ 584.106013][ T4290] do_syscall_64+0x3b/0xb0 [ 584.110270][ T4290] ? clear_bhb_loop+0x55/0xb0 [ 584.114780][ T4290] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 584.120509][ T4290] RIP: 0033:0x7effd237def9 [ 584.124764][ T4290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 584.144725][ T4290] RSP: 002b:00007effd311d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 584.153055][ T4290] RAX: ffffffffffffffda RBX: 00007effd2535f80 RCX: 00007effd237def9 [ 584.160866][ T4290] RDX: 0000000000000038 RSI: 0000000020000300 RDI: 000000000000001a [ 584.168852][ T4290] RBP: 00007effd311d090 R08: 0000000000000000 R09: 0000000000000000 [ 584.176748][ T4290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.184560][ T4290] R13: 0000000000000000 R14: 00007effd2535f80 R15: 00007ffd7f7315b8 [ 584.192375][ T4290] SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 loop exited with status 7 SYZFAIL: repeatedly failed to execute the program proc=4 req=751 state=3 status=7 (errno 32: Broken pipe) [ 586.950755][ T4104] device bridge_slave_1 left promiscuous mode [ 586.956681][ T4104] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.964068][ T4104] device bridge_slave_0 left promiscuous mode [ 586.969983][ T4104] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.977501][ T4104] device veth1_macvtap left promiscuous mode [ 587.820785][ T4104] device bridge_slave_1 left promiscuous mode [ 587.826728][ T4104] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.834092][ T4104] device bridge_slave_0 left promiscuous mode [ 587.840063][ T4104] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.847614][ T4104] device bridge_slave_1 left promiscuous mode [ 587.853562][ T4104] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.860645][ T4104] device bridge_slave_0 left promiscuous mode [ 587.866538][ T4104] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.874219][ T4104] device bridge_slave_1 left promiscuous mode [ 587.880174][ T4104] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.887207][ T4104] device bridge_slave_0 left promiscuous mode [ 587.893236][ T4104] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.901050][ T4104] device veth1_macvtap left promiscuous mode [ 587.907108][ T4104] device veth1_macvtap left promiscuous mode [ 587.912946][ T4104] device veth0_vlan left promiscuous mode [ 587.918718][ T4104] device veth1_macvtap left promiscuous mode